Vous êtes sur la page 1sur 61

Master of Computer Applications (MCA) Regulations and Curriculum

(Effective from the Batch Admitted in the Academic Year 2008-2009)

PG DEPARTMENT OF COMPUTER SCIENCE AND COMPUTER APPLICATIONS SACRED HEART COLLEGE (AUTONOMOUS), TIRUPATTUR VELLORE DT, TAMILNADU.

1. Programme Objectives
The broad objective of MCA programme is to prepare graduate students for productive careers in software industry and academia by providing an outstanding environment for teaching and research in the core and selected areas of the discipline. The programme aims to prepare the students for the industry by imparting the required technical and soft skills along with knowledge in fundamentals of computing and applications. Special thrust is given to industrial experience by exposing the students to industrial practices with real-time software projects. The first semester aims at imparting basics of computing with proficiency in a programming language. From the second semester, the students are asked to select an area of specialization and develop their technical expertise along with software engineering practices. Technical knowledge and skills are imparted by participating in project works, paper works, field works and workshops along with regular lecture, tutorial and practical sessions.

2. Eligibility for Admission


Candidates who have passed the under mentioned degree examinations in any recognized institution or as equivalent thereto, provided they have undergone the programmes under 10+2+3 pattern. a. B.C.A/B.E.S./B.Sc. in Computer Science /Mathematics/Physics/Statistics/Applied Sciences with Mathematics as one of the subjects at the Higher Secondary level (i.e., in +2 level of the 10+2 pattern) OR b. B.Com. /Bachelor of Bank Management / B.B.A. / B.L.M. / B.A. Corporate Secretaryship / B.A. Economics / Any other Bachelors Degree in any discipline with Business Mathematics and Statistics or Mathematics / Statistics in main/allied level OR c. B.E./B.Tech or M.B.A

3. Duration of the Programme


To fulfill the requirements for acquiring MCA, a student may clear all the courses in a minimum of three years and a maximum of 6 years.

4. Medium of Instruction
The medium of instruction is only in English.

5. Credit System
The College follows the Credit System for its programmes. Each credit is worth 30 hours of student study time, comprising all learning activities. Thus, a four-credit course involves 120 study hours. This helps the student to understand the academic effort one has to put into successfully complete a course.

6. Recognition
The program is approved by All India Council for Technical Education (AICTE), New Delhi and affiliated to Thiruvalluvar University, Vellore, Tamil Nadu. The University has granted autonomy to Sacred Heart College to frame the curriculum, conduct the courses and evaluate the students as per the need of the industries.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 1

7. Program Structure
Sem Code Subject Problem Solving and Algorithms Structured and Object Oriented Programming Computer Organization Business Processes Numerical and Statistical Methods for Computing Programming Lab Communication Skills Information Literacy I Data Structures and its Applications Internet Concepts and Web Design Software Processes Mathematics for Computing Technology Elective I Technology Lab I Software Documentation Information Literacy II Operating Systems Computer Networks Data Base Systems Software Engineering Technology Elective II Software Project I Quantitative Aptitude Development Information Literacy III Human Rights Object-Oriented Analysis and Design Advanced Database Systems Microprocessor and its Applications Technology Elective III Domain Elective I Software Project II Industry Interface Design and Analysis of Algorithms Open Source Technologies Computer Graphics Technology Elective IV Domain Elective II Software Project-III Soft Skills Development Information Literacy V Software Project IV Total L 3 3 3 3 3 15 3 3 2 3 3 14 3 3 3 3 3 15 2 3 3 3 3 3 17 3 3 3 3 3 15 6 MCA602J 76 T 1 2 1 1 5 1 1 1 1 4 1 1 1 1 1 5 1 1 1 3 1 1 1 3 20 P 2 8 10 2 2 2 6 12 2 2 6 10 2 2 2 4 10 2 2 2 6 12 30 84 O 4 2 6 2 4 2 8 4 2 6 4 4 2 2 4 4 28 25 25 25 25 25 40 100 100 75 75 75 75 75 60 100 25 25 25 25 25 25 40 100 75 75 75 75 75 75 60 25 25 25 25 25 40 100 100 75 75 75 75 75 60 25 25 25 25 25 40 100 100 75 75 75 75 75 60 CA 25 25 25 25 25 40 100 100 SEM 75 75 75 75 75 60 MKS 100 100 100 100 100 100 100 100 800 100 100 100 100 100 100 100 100 800 100 100 100 100 100 100 100 100 800 100 100 100 100 100 100 100 100 800 100 100 100 100 100 100 100 100 800 100 4100 CD 3 4 3 4 3 4 2 1 24 4 4 4 3 3 3 2 1 24 3 3 4 3 4 4 2 1 24 2 3 4 3 3 3 4 2 24 3 4 4 4 3 4 1 1 24 15 135

MCA110T MCA111T MCA112T


1

MCA113T MCA114T MCA115P MCA116W MCA117L MCA210T MCA211T MCA212I MCA213T MCA214# MCA215P MCA216W MCA217L MCA310T MCA311T MCA312T MCA313T MCA314# MCA315J MCA316W MCA317L VE1001 MCA410T MCA411T MCA412T MCA413# MCA455? MCA414J MCA415W MCA510T MCA511T MCA512T MCA513# MCA553? MCA514J MCA515W MCA516L

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 2

TECHNOLOGY ELECTIVES (#) (Choose Stream A or B. 3 Listed Courses of the Stream will be dealt in 2nd, 3rd, 4th and 5thSemesters) STREAM A :: MICROSOFT TECHNOLOGIES MCA214A Visual Programming using Visual Basic MCA314A Window Applications using .NET MCA413A Web Applications Using .NET MCA513A Enterprise Applications using .NET STREAM B :: JAVA TECHNOLOGIES MCA214B Object Oriented Programming using Java MCA314B Enterprise Java Programming MCA413B Advanced Enterprise Java Programming MCA513B Java Frameworks

DOMAIN ELECTIVE (?)


(Choose Stream A,B or C. One Course each will be conducted in 4 and 5 Semesters from the list below)
th th

STREAM A :: SCIENTIFIC DOMAIN MCA455A Linux and Network Programming MCA553A Mobile Computing STREAM B :: BUSINESS DOMAIN MCA455B Accounting and Financial Management MCA553B Electronic Commerce STREAM C :: RESEARCH DOMAIN MCA455C Research DomainI MCA553C Research Domain II

7.1 CODING SCHEME


MCA Programme Code X Semester Number 1-6 XX Course Serial Number 01-50 for Core Papers 51-99 for Domain Electives X Course Type*

*Course Type : TTheory, PPractical, WWorkshop, JProject, FField Work, L- Library Work, I- Integrated Theory/Practical, A to E Electives. Note: Courses based on Workshops and Fieldworks are organized by the Placement Cell and Consultancy Cell during weekends and holidays. For the courses, which are of the nature Field Work, Library Work or Workshop, grading shall be given in each semester, instead of marking. However, the score sheet for each semester shall contain only marks, computed by converting Grades. The paper Software Process in II Semester is considered as an integrated paper of Theory cum Practical with a practical examination at the end of the semester. Two continuous assessment tests are conducted during the semester, along with the submission of mandatory reports All Practical sessions shall have programming exercises in the first 6 weeks, for the remaining weeks students shall be assigned a single project-based activity covering various techniques of the Technology stream to which the student belongs.
MCA Curriculum 2008 CBCS Batch 2nd Revision Page 3

MCA110T

PROBLEM SOLVING AND ALGORITHMS

3-1-0-0:100

1. PROGRAMMING TECHNIQUES Steps Involved in Computer Programming Problem Definition Outlining The Solution Flow Chart Developing Algorithms Efficiency of Algorithms. 2. FUNDAMENTAL ALGORITHMS Exchanging the Values Counting Summation of Set of Number Factorial Computation Sine Computation Fibonacci Sequence Reversing the Digits of an Integer Base Conversion Character to Number Conversion. 3. FACTORING METHODS Finding the Square Root of a Number Smallest Divisor of an Integer GCD of Two Integers Generating Prime Numbers Computing the Prime Factors of an Integer Generation of PseudoRandom Numbers Raising a Number to a Large Power Computing the Nth Fibonacci Number. 4. ARRAY TECHNIQUES Array Order Reversal Array Counting Or Histogramming Finding The Maximum Number In A Set Removal of Duplicates from an Ordered Array Partitioning an Array Finding The k Smallest Element Longest Monotone Subsequence. 5. MERGING, SORTING AND SEARCHING Two-Way Merge - Sorting by Selection, Exchange, Insertion, Partitioning and Binary Search Hash Searching. TEXTBOOKS Unit I Ravi L, Lecture Notes: Programming Techniques, School of Computing, Sacred Heart College, Tirupattur, 2007 Unit II -V Dromey R G, How to Solve it by Computer , Prentice Hall of India, 1997 REFERENCES Michael Schneider, Steven W. Weingart, David M. Perlman, An Introduction to Programming and Problem Solving with Pascal, Wiley Eastern Limited, New Delhi, 1982. Note : Every algorithm discussed in this course shall be implemented using structured paradigm of C++ programming language which is taught in the course MCA111T.
th

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 4

MCA111T

STRUCTURED AND OBJECT ORIENTED PROGRAMMING` 3-2-0-0:100

1. STRUCTURED PROGRAMMING I Programming Languages Programming Paradigms - Background of C++ - First Program in C++ Structure of C++ Program - Data Types - Basic Data Types User Defined Data Types Expressions Tokens, Keywords and Identifiers Constants and Variables - Operators Statements Assignment Input Output Objects Manipulators -Control Structures Selection Statement Iteration Statements Arrays and Strings. 2. STRUCTURED PROGRAMMING - II Structures, Unions and Enumerations Functions Function Prototyping Call by Value, Call by Reference- Inline Functions- Recursion - Pointers - Default Arguments - Passing arrays to Functions Passing Structures to Functions Function Overloading Using Pointers as Function Arguments and Parameters - File I/O File Classes File Operations Random Access 3. CLASSES AND OBJECTS Characteristics of Object Orient Programming - Classes and Objects Data Members - Member Functions - Constructors and Destructors Friend Functions Friend Classes Static Class Members Object Pointers. 4. INHERITANCES AND POLYMORPHISM Operator Overloading Inheritance Protected Members Inheriting Multiple Base Classes Virtual Base Classes Polymorphism Virtual Functions Virtual Base Classes Dynamic versus Static Binding. 5. TEMPLATES AND EXCEPTION HANDLING Templates Generic Functions Applying Generic Functions Generic Classes - Exception handling Standard Template Library Container Classes Lists Maps Algorithms String. TEXTBOOK Balagurusamy E, Object Oriented Programming with C++, Tata McGraw Hill, 2006. REFERENCES Andrew C. Staugaard JR, Structured and Object-Oriented Problem Solving Using C++, Third Edition, Prentice Hall, 2002 Herbert Schildt, C++: The Complete Reference, Third Edition, Tata McGraw Hill, 1999 Yashavant Kanethkar, Let us C++, BPB Publications, 1999. Bruce Eckel, Thinking in C++, Second Edition, Pearson Education, 2001.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 5

MCA112T

COMPUTER ORGANIZATION

3-1-0-0:100

1. INTRODUCTION TO DIGITAL DESIGN Data Representation Data Types Complements Representations - Fixed Point, Integer, Floating Point, Decimal Point Arithmetic Addition, Subtraction - Binary Codes- Logic Gates, Boolean Algebra, Map Simplification Combinational Circuits: Half-Adder, Full Adder- Flip Flops - Sequential Circuits. 2. DIGITAL COMPONENTS - REGISTER TRANSFER & MICRO OPERATIONS ICs Decoders Multiplexers Registers Shift Registers Binary Counters Memory Unit Register Transfer Language Register Transfer Bus and Memory Transfers Arithmetic, Logic and Shift Micro Operations- Arithmetic Logic Shift Unit. 3. COMPUTER ORGANIZATIONS AND PROGRAMMING Instruction Codes Computer Registers Computer Instructions Timing And Control Instruction Cycle Memory Reference Instructions I/O And Interrupt Machine Language Assembly Language Assembler - Program Loops Programming Arithmetic And Logic Operations Subroutines I/O Programming. 4. INPUT OUTPUT ORGANIZATION Peripheral Devices Input-Output Interface Asynchronous Data Transfer Modes of Transfer Priority Interrupt DMA IOP Serial Communication. 5. MEMORY ORGANIZATIONS AND CPU Memory Hierarchy Main Memory Auxiliary Memory Associative Memory Cache Memory Virtual Memory Memory Management Hardware CPU: General Register Organization Control Word Stack Organization Instruction Format Addressing Modes Data Transfer and Manipulation Program Control. TEXTBOOK Morris M Mano, Computer System Architecture, Prentice Hall of India, 3 Edition, 2004. REFERENCES John. P. Hayes, Computer Architecture and Organization, Tata McGraw Hill, 1996 Hamacher V C , Computer Organization, Tata McGraw Hill,1996
rd

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 6

MCA113T

BUSINESS PROCESSES

3-0-2-0:100

1. ORGANIZATIONAL STRUCTURE Types of Business Organizations - Organizational Structures Definition Complexity Formalization Size Technology Culture - Forms and Outcomes - Explanations of Structures Case Studies 2. ORGANIZATIONAL OUTCOMES Organizational Power and Power Outcomes - Leadership and Decision Making - Communication and Organizational Change - Organizational Environments and Effects - Inter and Intra Organizational Relationships - Organizational Effectiveness - Case Studies 3. BUSINESS PROCESS RE-ENGINEERING Business Process Re-engineering (BPR)-Meaning Types Process - Impetrative for Survival Strategic Approach - Implementing Business Process Re-engineering - Methodology and Steps - Indian Scenario of Implementing BPR - Case Studies 4. BPR AND IT INDUSTRY BPR and Information Technology Process - People View and Perspectives - Empowering People through IT - Managing Change in the Global Environment - BPR Re-discovering Indian Paradigm Need of Re-engineering - Case Studies 5. E-BUSINESS PROCESS E-Business - E-business Vs. E-commerce E-business Trends E-Business Patterns E-business Design - Architecture - Application Areas (CRM, ERP, SCM and Selling) Business Intelligence - Case Studies TEXTBOOKS Unit I & II Richard H Hall and Pamela S. Tolbert, Organizations Structures, Processes and Outcomes, Pearson Education, 2006 Unit III & IV Jayaraman M S , Business Process Re-engineering, Tata McGraw Hill Publications, 2001 Unit V Ravi Kalakota and Marcia Robinson,e-Business 2.0 Roadmap for Success, Pearson Education, 2005 REFERNCES Gareth Jones, Organizational Theory, Design and Change, Pearson Education, 4th Edition, 2004 Dave Chaffey, E-business and E-Commerce Pearson Education, 2nd Edition, 2003.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 7

BUSINESS APPLICATIONS LAB CUSTOMER RELATIONSHIP MANAGEMENT (CRM) 1. Contact Management 2. Lead Management 3. Self Service CRM 4. Survey Management 5. Contract Management ENTERPRISE RESOURCE PLANNING (ERP) 1. Inventory Control 2. Order Tracking 3. Customer Service 4. Finance 5. Human Resources SUPPLY CHAIN MANAGEMENT (SCM) 1. Customer Service Management 2. Demand Management 3. Order Fulfillment 4. Supplier relationship management 5. Returns Management 6. Product development and Commercialization 7. Manufacturing flow management/support 8. Performance Measurement ELECTRONIC COMMERCE (E-COM) 1. Funds Transfer 2. Goods Transfer 3. Services transfer 4. Data Transfer

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 8

MCA114T NUMERICAL AND STATISTICAL METHODS FOR COMPUTING 3-1-0-0:100 1. ALGEBRAIC, TRANSCENDENTAL & SYSTEM OF EQUATIONS Bisection Method Regula Falsi Method Successive Approximation Method Newton Raphson Method Secant Method. Solution to System of Equations Direct Methods: Gauss Elimination Method Gauss Jordan Method Crouts Method. Iterative Methods: Gauss Jacobi and Gauss Seidal Method. 2. NUMERICAL DIFFERENTIATION, INTEGRATION Interpolation, Differentiation and Integration Difference Table Newtons Forward and Backward Interpolation Lagranges Interpolation Differentiation Formulae Trapezoidal and Simpons Rule. 3. STATISTICAL MEASURES Mean Median Mode Standard Deviation Variance Correlation Linear Regression Prediction Interval Multiple Regression Probability Random Variables Characteristics Moment Generation Function. 4. PROBABILITY AND DISTRIBUTIONS Standard Distributions (Binomial, Poisson and Normal) Chi-square t and F distributions Parato Distribution Integrating the Normal Distribution with Simpsons Rule Integrating the Chi-square Distribution with Simpsons Rule Integrating t-Distribution with Simpsons Rule. 5. TESTING OF HYPOTHESIS Tests For Normality: Large Sample Tests Based on Normal Distribution Chi-Square Tests Small Sample Tests Based on t And F Distributions ANOVA: One Way and Two Way Classifications. TEXT BOOKS Grewal B.S, Numerical Methods in Engineering and Science, Khanna Publishers, 6 Edition, New Delhi. Gupta S.C and Kapoor V.K, Fundamentals of Applied Statistics, Sultan Chand and Sons, 3 Edition, 2003.
rd th

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 9

MCA115P PROGRAMMING LAB 1. Data types, Expressions, Control structures and I/O 2. Arrays 3. String Handling 4. Functions, Inline functions and default arguments 5. Function overloading 6. Pointers 7. Classes and Objects 8. Friend functions and friend classes 9. Static members 10. Operator Overloading 11. Inheritance 12. Virtual functions 13. Exception Handling 14. Files 15. Templates and STL

0-0-8-0:100

Note : Practical exercises should be in the ratio of 40% for Structured Programming and 60% for Object-oriented programming.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 10

MCA116W

COMMUNICATION SKILLS

0-0-0-4:100

1. THE PROCESS OF COMMUNICATION Communication - Process of Communication Barriers to Communication Types of Communication Written Vs. Oral Communication Types of Face to Face Interactions Characteristics and Convention of Conversation Conversational Problems of Second/ Foreign Language Users Conversation and Other Speech Events. 2. TELEPHONE TECHNIQUES, JOB APPLICATION AND INTERVIEWS Commonly used Phrases in Telephone Conversation Conference Calls -Writing and Leaving a Message Contracted Forms - Applying for a Job Curriculum Vitae Useful Words Preparing for an Interview - Listening Speaking Asking Questions. 3. GROUP DISCUSSIONS AND MANAGING ORGANISATIONAL STRUCTURE Types of Group Discussions - Success in a Group Discussion Speaking - Ability to Influence and Lead - The Role of a Manager Leadership Writing Reports. 4. MEETINGS Successful Meeting One to One Meetings Opening, Middle and Close Editing Listening Criteria for Successful Meeting Reporting Verbs Writing Memos - Stress according to Part of Speech Taking Notes Preparing Minutes Using the Passive Voice 5. PRESENTATION AND NEGATIATION SKILLS Verbs Often Required in Presentations - Importance of Body Language in Presentation Preparing an Outline of a Presentation Structure of a Presentation Visual Aids Ending the Presentation Podium Panic Emphasizing the Important Words - Process of Negotiation Effective Negotiations Note: Workshops will be conducted using presentations based on industry training methods.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 11

MCA210T

DATA STRUCTURES AND ITS APPLICATIONS

3-1-2-0:100

1. ORDERED LIST AND POLYNOMIALS Abstract Data Types Arrays - Representation of Arrays - Operations on Arrays - Ordered ListPolynomial Representation Polynomial Addition Polynomial Multiplication -Sparse Matrices. 2. LISTS, STACK AND QUEUE Singly Linked Lists - Circular Linked Lists - Doubly Linked Lists - General Lists-Stacks Queues Evaluation of Expressions-Multiple Stacks and Queues. 3. TREES Trees - Binary Trees - Binary Tree Traversals - Binary Tree Representations - Binary Search Trees Threaded Binary Trees Additional Binary Tree Operations- Heaps Selection Trees- Set Representation. 4. GRAPHS Representations of Graphs - Graphs Implementation - Graph Traversals - Application of Graph Traversals - Minimum Cost Spanning Trees - Shortest path Problems Activity Networks. 5. HASHING AND ADVANCED TREES Symbol Table Static Hashing : Hash Tables Hashing Functions Overflow Handling - AVL Trees 2-3 Trees - Red-Black Trees B-Trees- Splay Trees. TEXT BOOKS Horwitz E, Sahni S and Mehta, Fundamentals of Data Structures in C++, Galgotia, 1999. Gregory L. Heileman, Data Structures, Algorithms and Object Oriented Programming, McGraw Hill International Edition, 1996. REFERNCES Robert Kruse & Clovis L. Tondo, Data Structures and Program Design in C, Prentice Hall, 2 Edition, 1991. Weiss, Data Structures and Algorithm Analysis in C, Addison Wesley, 2 Edition, 1997.
nd nd

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 12

MCA211T 1. INTERNET CONCEPTS

INTERNET CONCEPTS AND WEB DESIGN

3-1-2-0:100

Internet Concepts Domain Name Service e-mail concepts Sending & Receiving files by e-mailOnline Chatting, Messaging and Conferencing Concepts Usenet Newsgroup Concepts World Wide Web Concepts Web Security: Privacy and Site Blocking- Browsers : IE, Netscape, Opera Web Servers: IIS, Apache 2. HTML Web Technologies HTML - Structure of a Page Dynamic and Static Pages Basic Document Structure Attribute Groups Text Formatting Presentational, Phrase Elements Lists - Editing Text - Character Entities for Special Characters Links and Navigation - Links Directories and Directory Structures Creating Links Colors, Images and Objects Using Images as Links Tables Basic Table Elements and Attributes Advanced Tables Accessibility issues with Tables. 3. ADVANCED HTML Forms Form Controls Label - structuring forms Focus- Frames The Frameset, Frame No-frames elements Creating Links between Frames Nested Framesets- Depreciated and Browser Specific Mark up Fonts- Backgrounds Formatting Links Lists Tables- Miscellaneous Attributes Cascading Style Sheets CSS CSS properties Text Formatting Text Pseudo-Classes Selectors Lengths - Percentages More CSS Backgrounds Lists Tables - Outlines- Positioning with CSS Page Layout Design Issues. 4. SCRIPTING LANGUAGES VB Script Purpose - Client Side Script Vs Server Side Script - Program Structure Data Types and Variables Procedures - Conditional Looping Functions Constants Events Methods Objects Operators Statements - Validation Scripts - Error Handling and Debugging. JavaScript Learning Java script Adding a Script to Web Page Document object Model Variables OperatorsFunctions Conditional Statements Looping Built-in Objects: String, Date, Array, Boolean, Math JavaScript Validation Cookies - Animation 5. DREAM WEAVER Internet Environment Dream Weaver Interface Importing Graphics Using Templates - Links Tables Library - Frames Functionality with Behaviors Layers Animation Forms. TEXTBOOKS Unit I Margaret Levine Young, Internet-The Complete Reference, McGraw Hill, 2nd Edition. (Chapters: 1,2,5,7,9,10,11,17 & 20) Unit II & III Jon Ducket, Web Programming with HTML, CSS & JavaScript , Wiley Publishing, 2005. Unit IV Matt Childs, et al VBScript in a Nutshell: A desktop Quick Reference , Shroff Publishers, 1st Edition, 2000. Unit V Julia Pryor Belinski, Charles F. Belinski, Scott J. Wilson, Dream Weaver 4 [Inside Macromedia], Onward Press, 2002.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 13

WEB SOLUTIONS LAB HTML 1. Creating HTML page and Run 2. Font tag, colors and images 3. Hyperlinks, Lists in HTML 4. Tables 5. Physical and Logical Tags 6. Forms Controls 7. Frames with tags 8. CSS JAVA SCRIPT 1. Data types and variables, operators 2. Conditional Statements and Looping 3. Functions 4. Strings, Date and Time 5. Array and Math 6. Cookies 7. Debugging JavaScript 8. Handling Mouse Events 9. Develop Digital Clock & Calculator 10. Web Page with forms and Validations 11. Authentication and Verifications 12. Events Handling VBSCRIPT 1. Basics of VBSCRIPT. 2. Data Types & Variables 3. Procedures, Conditional, Looping 4. Functions, Date, Time 5. Constants, Events, Methods, Objects, Operators 6. Validation 7. Error Handling
DREAM WEAVER

1. Basics of Dream weaver 2. Create Web Pages 3. Menus 4. Layers and Dynamic Layer. 5. Site Manager 6. Check-in Check-out the pages using Site Manager 7. Tables, Images, Text Formatting 8. HTML Tags in Dream Weaver

Note: It is recommended that more focus is given to JavaScript than VBScript for application development.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 14

MCA212I

SOFTWARE PROCESSES

2-0-2-2:100

1. INTRODUCTION TO SOFTWARE ENGINEERING Evolving Role of Software Legacy Software Software Myths - Generic View of Process: Software Engineering - Layered technology Process Framework CMMI Process Patterns Process Assessment Personal and Team Process Models Process Technology Product and Process. 2. PERSONAL SOFTWARE STRATEGY Personal Software Process Strategy - Logic for a Software Engineering Discipline Software Process Process Maturity Logic and Productivity of PSP - Baseline Process PSP Process Elements PSPO Process, Measures and Project Plan Summary Time and Defect Recording Log Measurement Overview Fundamental Process Measures Goal Question - Metric Paradigm General PSP objectives, Goals and Questions GQM example Gathering data Baseline for your Personal Process. 3. PLANNING PROCESS Planning Process- Contents of a Software Plan Planning a Software Project Quality Plan -Measuring Software Size - Size measures & framework Counting standard LOC counts and counters Reuse considerations Line of code Accounting Calculating Productivity Estimating software size: Background Popular estimating methods Proxy-based estimating the PROBE size estimating method Object categories Estimating considerations - Resource and schedule estimating: Resource planning Estimating development time Combining multiple estimates Using multiple regression Schedule Estimating Earned value tracking Estimating accuracy 4. SOFTWARE DESIGN AND QUALITY Design and code reviews- Personal reviews Reviews principles Design review principles Review measures Check lists Relationship between reviews and inspections -Software Quality Management Economics of software qualityDeveloping a quality strategyProcess Benchmarking Yield Management Defect removal strategies Defect prevention strategies - Design process Design quality Structuring design processDesign notationDesign TemplatesFunctional specification template State specification template Logic specification template Operational scenario template Using templates in design Design Guidelines 5. SOFTWARE VERIFICATION Design Verification Design Standards Verification Methods Verifying the Object state machine Program tracing Verifying program correctness Comments on verification methods - Scaling up the personal software process: Using abstractions Stages of product size Developing large-scale programs Potential problem with abstractions Development strategy PSP3 Defining the software process Software process basics Process definition Defining process phases Process development considerations Process evolution Development Process. TEXTBOOKS Unit I Roger S Pressman, Software Engineering, Fourth Edition, McGraw Hill International Edition, New Delhi, 1997 Units II - V Watts S. Humphrey, A Discipline for Software Engineering, Pearson Education, 2001

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 15

MCA213T 1. LOGIC

MATHEMATICS FOR COMPUTING

3-1-0-0:100

Statements Connectives Truth tables Normal forms Predicate calculus Inference Theory for Statement calculus and predicate calculus. 2. COMBINATORICS Mathematical Induction Pigeonhole principle Principle of inclusion and exclusion. 3. RECURSIVE FUNCTIONS Recurrence relation Solution of recurrence relation using characteristic polynomial and using generating function Recursive functions Primitive recursive functions, Computable and non computable functions 4. ALGEBRAIC STRUCTURES Groups Definition and examples only Cyclic groups Permutation group (Sn and Dn) Subgroups Homomorphism and Isomorphism Cossets Lagranges Theorem Normal subgroups Cayleys representation theorem. 5. LATTICES Partial order relations, Poset Lattices, Hasse diagram Boolean algebra TEXT BOOKS Unit I Tremblay J.P. and Manohar R., Discrete Mathematical Structures with applications to Computer Science, McGraw Hill International Edition, 1987. (Chapter 1, All sections excluding 1-2.5, 1-2.12, 1-2.13, 1-2.15, 1-3.6, 1-4.4) Unit II Kenneth H. Rosen, Discrete Mathematics and Its Applications, 4th Edition, Tata McGraw Hill, 2002. (Chapter 3, Sections 3.1, 3.2, Chapter 4 , Section 4.2) Unit III Venkataraman M K, Discrete Mathematics, National Publishing Co., 2000, (Chapter 5, Sections 5.1-5.7) Unit IV Sundaresan V, Ganapathy Subramanian K.S & Ganesan K, Discrete Mathematics, New Revised Edition, 2001. (Chapter 4, Section 4.3) Unit V Alan Doerr and Kenneth Levasseur, Applied Discrete Structures for Computer Science, Galgotia Publications (P) Ltd., 1992. (Chapter 13, Sections 13.1-13.3)

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 16

MCA214A 1. INTRODUCTION

TE I: VISUAL PROGRAMMING USING VISUAL BASIC

3-1-0-0:100

Starting and Exiting VB - Using Project Explorer- Forms- Properties Window - Using Toolbox Projects - Printing projects - Building and running applications - Adding code and using events- Naming Conventions - Using variables - Scope - Subroutines and functions - VB Controls - Label, Text box, Command button, Frame, Check box, Option button, List box, Combo box, Drive list box, File list box, Formatting controls, Control arrays and Tab order. 2. STRINGS AND DIALOG BOXES Strings, Numbers - Math Functions - Random numbers using control statements - Selection and Iteration Statements - Dialogue boxes Message Box function - Input box function -Common dialogue control Print dialogue boxes and Show Help method 3. MENUS AND GRAPHICS Menus and Printing in VB Applications - Print form method - Printers collection- Printer object- VB Graphics and Multimedia - Picture box and image controls - Drawing controls - Lines and shapes Multimedia control - An audio CD player - Playing video chips 4. OLE AND ACTIVEX Objects and VB -OLE for outside objects: Linking and embedding - Using the OLE control - Saving Object contents - Working with objects - Programming with objects - Collections - The object browser Traversing the object browser. ActiveX controls - Need for ActiveX - Adding ActiveX controls to a project - ActiveX automation - Creating your own ActiveX controls: Designing the controls - Making the ActiveX control 5. ODBC, REPORTS AND INTERNET CONTROLS Database Connection - VB or Access - VB database universe form builders Abound, Master Detail forms - ODBC, Crystal Reports -VBX and Engine -Custom Control properties -Adding Internet Access - Internet Controls - Encapsulation controls - Internet Explorer Controls- ActiveX documents - HTML and VB script - VB to Java - Internet application types TEXT BOOK Units I - III Scott Warner, "Teach yourself VB 6 ", Tata McGraw Hill, 3rd edition, 1999. (Chapter 1-9) Units III - V Greg Perry, SAMS Teach Yourself VB 6 in 21 Days, 1st edition, SAMS Publishing, 1998 (Chapter 14,16,17,19) Unit V Karen Waterson "VB Database Programming", Wesley Publishing Company, 1994. (Chapter 5, 7) REFERENCES Noel Jerke, Visual Basic 6-The Complete Reference, Tata McGraw Hill, 1999

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 17

MCA214B 1. BASICS

TE I: OBJECT ORIENTED PROGRAMMING USING JAVA

3-1-0-0:100

OOP and Java - Objects and Classes, Encapsulation, Inheritance, Polymorphism, Java Language, The Primaries Character Set, Tokens, Constants, Variables, Operators and Expressions, Library Methods, Strings, I/O Streams, Formatting the Output values, Control Statements If, Switch, While, Do-Whilefor. 2. ARRAYS AND OO FEATURES One, Two dimensional Arrays, Methods General form, invoking, method overloading, recursion, Classes and objects General form, creation, constructors, constructor overloading, copy constructor, this keyword, Static members, finalize method, Inner class and anonymous classes, Inheritance inheriting, abstract classes and final classes, Interfaces structure, implementation, interface inheritance. 3. PACKAGES, APPLETS AND THREADING Packages Package Hierarchy, Import Statement, Hiding the Classes, Access Control Modifiers, Applets Life Cycle, Applet Class, Syntax of Applet Tag, Methods in Graphics Class, Threading Life Cycle, Creating and Running, Methods in Thread Class, Priority Thread, Synchronization, Dead Lock, Inter Thread Communication, Applets Involving Threads. 4. AWT AND EXCEPTION HANDLING Events, Listeners, Event Handling Methods, Inheritance of Control Classes, Labels, Button Control, Check Box Control, Radio Button, Choice Control, List Control, Scroll Bars, Layouts and Panel, Windows and Frames, Menus and Dialogs, Mouse Events and Listeners, Adapter Class and Inner Class, Exception Handling Default Exception User Defined Exception Handling, Exception and Error Classes, Catch Block Searching Pattern, Throw and Throws. 5. NETWORKING, JDBC AND FILES Networks, Domain Names and Protocols, Layers in Network Communication, Ports, TCP, Server Socket Class, Socket Class, UDP Approach, JDBC Establishing Connection, Creating Tables, Enter Data, Table Updation, Use Of Prepared Statement, Obtaining Metadata, Using Transactions, Files Creation, Reading/Writing Characters/Bytes/Primitive Data Types, Random Access Files. TEXT BOOK Muthu C, Programming in Java, Thompson Learning, 2004. REFERENCES Herbert Schildt, The Complete Reference Java 2, 4 Edition, Tata McGraw Hill, 2001. Keyur Shah, Gateway to Java Programmer Sun Certification, Tata Mc Graw Hill 2002. Balaguruswamy, Programming with JAVA, 2 Edition, Tata McGraw Hill, 1999
nd th

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 18

MCA215P

TECHNOLOGY LAB I

0-0-6-0:100

STREAM A : VISUAL PROGRAMMING USING VISUAL BASIC 1. Label, text box, command, option, radio, list box, combo box 2. Drive list box and directory list box and file list box 3. Control array 4. Common dialog control and dialog boxes 5. String handling 6. Menus 7. Printer object 8. Graphics and multimedia 9. OLE 10. Active X Controls 11. ADODC 12. ADODB 13. Reports 14. Internet controls STREAM B : OBJECT ORIENTED PROGRAMMING USING JAVA 1. I/O Streams 2. Method Overloading and Overriding 3. Class and Objects 4. Static members 5. Inheritance and Interfaces 6. Packages 7. Applets 8. AWT 1 with controls, panels, 9. AWT 2 with menus and layouts 10. Inter thread communication and deadlock avoidance. 11. Exception Handling 12. Socket programming 13. JDBC 14. Files

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 19

MCA216W

SOFTWARE DOCUMENTATOIN

0-0-0-4:100

1. INTRODUCTION TO SOFTWARE DOCUMENTATION Understanding Task orientation Principles of Software Documentation Theory Behind Task Orientation Forms of Software Documentation Processes of Software Documentation 2. FORMS OF SOFTWARE DOCUMENTATION Writing to Teach (Tutorials) Writing to Guide (Procedures) Writing to Support (Reference) 3. PROCESS OF SOFTWARE DOCUMENTATION Analyzing Your Users Planning and Writing your Documents Getting Useful Reviews Conducting Usability Tests Editing and Fine Tuning 4. TOOLS FOR SOFTWARE DOCUMENTATION Designing for Task Orientation Laying out Pages and Screens Getting the Language Right Using Graphics Effectively Designing Indexes 5. SYSTEM DOCUMENTATION Requirements Document - System Architecture Description of Functionality and Interfaces - Program Source Code Listings - Validation Documents - System Maintenance Guide. 6. USER DOCUMENTATION Functional Description - Installation Document - Introductory Manual - Reference Manual - System Administrator's Guide 7. CASE WORK TEXT BOOK Thomas T. Barker, "Writing Software Documentation, A Task-Oriented Approach", Second Edition, Pearson Education, 2004 Note: Workshops will be conducted using presentations based on industry training methods.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 20

MCA310T 1. INTRODUCTION

OPERATING SYSTEM

3-1-0-0:100

Definition of OS -Mainframe System-Desktop Systems-Multi processor System-Distributed-ClusteredReal time Systems-Handheld Systems-Operating System Structure-System Components-ServicesSystem Calls-System Programs-System Design and Implementation. Case Study: History, Design Principles and kernel Modules of Linux Systems. 2. PROCESS MANAGEMENT Concepts-Process Scheduling-Operations on Processes-Co-operating Processes-Inter Process Communication-CPU Scheduling-Scheduling Concepts-Criteria-Scheduling Algorithms-Multiprocessor Scheduling-Real time Scheduling. Case Study: IPC and Process Scheduling in Linux System 3. PROCESS SYNCHRONIZATION Critical Section-Synchronization Hardware-Semaphores-Problems of Synchronization-Critical RegionsMonitors-Deadlocks-Characterization-Handling Deadlocks-Deadlock Prevention-Avoidance-DetectionDeadlock Recovery. Case Study: Process Management in Linux System 4. MEMORY MANAGEMENT Storage Hierarchy-Storage Management Strategies-Contiguous-Non Contiguous Storage AllocationSingle User-Fixed Partition-Variable Partition-Swapping-Virtual Memory-Basic Concepts-Multilevel Organization-Block Mapping-Paging-Segmentation-Page Replacement Methods-Locality-Working Sets. Case Study:Memory Management in Linux System 5. I/O AND FILE SYSTEMS Disk Scheduling-File Concepts-File System Structure-Access Methods-Directory Structure-ProtectionDirectory Implementation-Allocation Methods-Free Space Management-Case Study: Linux System. Case Study: File System in Linux System TEXT BOOK Silberschatz and Galvin, Operating System Concepts, 6 Edition, John Wiley & Sons, Inc., 2004 REFERENCES Milankovic M, Operating System Concepts and Design, 2 Edition, McGraw Hill, 1992 P.C.Bhatt, An Introduction to Operating Systems-Concepts and Practice, Prentice Hall Of India, 2004 H.M.Deitel, An Introduction to Operating Systems, 2 Edition, Pearson Education, 2002
nd nd th

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 21

MCA311T COMPUTER NETWORKS 3-1-0-0:100 1. INTRODUCTION Introduction to networks and communication media: Uses network hardware network software Reference models example networks network standardization Physical Layer: Basis for data communication transmission media wireless transmission telephone systems satellite Communication. 2. DATA LINK LAYER Data link layer: Data link layer design issues Error detection and correction methods Elementary data link protocols Sliding window protocols Verification methods Channel allocation Multiple access protocols IEEE 302 standards. 3. NETWORK LAYER Network layer: Network design issues Routing algorithms Congestion control algorithms Internetworking Network layer in the internet. 4. TRANSPORT LAYER Transport layer: Transport service Transport protocols Internet transport protocols UDP TCP Performance issues. 5. APPLICATION LAYER Application layer: Application layer design issues Domain name system Electronic mail WWW multimedia Other applications Network security Basic cryptography DES-RSA. TEXT BOOK Andrews S.Tanenbaum, Computer Networks, 4 Edition, Prentice Hall of India / Pearson Education, 2003. REFERENCES Behrouz Forouzan, Data communication and Networking, 2 Edition, Tata McGraw Hill, 2006 William Stallings, Data and Computer Communications, 2 Edition, Prentice Hall of India / Pearson Education, 2006. Kundu Sudakshina, Computer Networks, Prentice Hall Of India, 2006 ISRD Group, Data communication and Computer Networks, Prentice Hall of India, 2006. Singh Brijendra, Data Communications and Computer Networks, 2 Edition, Prentice Hall of India, 2006.
nd nd nd th

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 22

MCA312T

DATABASE SYSTEMS

3-1-2-0:100

1. RELATIONAL DATABASES Relational Model SQL Advanced SQL Other Relational languages. 2. DATABASE DESIGN Database design and E-Resource Model Relational Database Design Application Design and Development. 3. DATA STORAGE AND QUERYING Storage and File Structure Indexing and hashing Query Processing Query Optimization. 4. TRANSACTION MANAGEMENT Transaction Concurrency Control Recovery System. 5. CASE STUDY : Oracle (Only the concepts that are covered in Units I to IV ). TEXT BOOK Abraham Silberschatz, henry F. Korth and S. Sudarshan, Database System Concepts, McGraw-Hill International Edition, Fifth Edition, 2006. (Ch. 2-8, 11-17, 26-29) (Only the portions that are relevant to the concepts covered in chapters 2-8 and 11-17 and Appendix C). REFERENCE Fred Resource McFadden, Jeffery A Hoffer and Mary B. Prescott, Modern Database Management, Addison Wesley, YYYY. Elmasri and Navathe, Fundamentals of Databas Systems, Addison Welsey, YYYY. Jefrey D.Ulman and Jenifer Widom, A First Course in Database Systems, Pearson Education Asia,yyyy. Bipin Clock Desai, An Introduction to Database Systems, Galgotia Publications Pvt.Limited, YYYY. RDBMS LAB SQL 1. Simple Queries using DDL, DML and DCL 2. SQL Aggregate Functions 3. SET Operations 4. Views and Snapshots 5. Multiple Tables and Nested Queries PL/SQL 6. PL/SQL Block 7. Function and Procedure 8. Subprograms and Packages 9. Triggers 10. Cursors FORMS AND REPORT 9. Designing Oracle Forms using Menus and buttons 10. Developing Oracle Reports

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 23

MCA313T

SOFTWARE ENGINEERING

3-1-0-0:100

1. INTRODUCTION TO SOFTWARE ENGINEERING Basic Concept about Software Engineering, Professional and ethical responsibility Sociotechnical Systems - Software Processes - Process activities - Rational Unified Process - Computer-aided software engineering - Project Management - Risk management. 2. REQUIREMENTS ENGINEERING AND ANALYSIS MODEL Software Requirements: Functional and non-functional requirements - User requirements - System requirements - Requirements Engineering Process - System Models: Context models - Behavioral models - Data Models - Object models - Structured methods. 3. DESIGN Architectural Design - Reference architectures - Distributed Systems Architecture: Multiprocessor architectures, Client-server architectures, Distributed object architectures - Application Architectures Object-oriented Design - Design evolution - User Interface Design. 4. SOFTWARE DEVELOPMENT AND TESTING Rapid Software Development - Agile methods, Extreme programming, Rapid application development, and Software prototyping - Component-based Software Engineering - Verification and Validation Software Testing - Test case design, Test automation. 5. PEOPLE, QUALITY AND CONFIGURATION Managing People - People Capability Maturity Model - Software Cost Estimation Quality Management - Quality assurance and standards- Quality planning- Quality control- Software measurement and metrics - Configuration Management - CASE tools for configuration management. TEXT BOOK Ian Sommerville, Software Engineering, 8th Edition, Addison Wesley, 2007. Unit I : Ch. 1, 2, 3, 4, 5 Unit II : Ch. 6, 7, 8 Unit III: Ch. 11, 12, 13, 14, 16 Unit IV: Ch. 17, 19, 22, 23 Unit V : Ch. 25, 26, 27, 29 REFERENCE Roger Pressman , Software Engineering A practitioners Approach, Sixth Edition, McGraw- Hill International Edition, 2005.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 24

MCA314A

TE II: WINDOWS APPLICATION USING .NET

3-1-2-0:100

1. INTRODUCING MICROSOFT .NET Introduction Common Language Runtime Base Class Library Assemblies Garbage Collection Visual Studio Integrated Development Environment Types of .NET Applications Data Types Variables Constants Type Conversion Operators Precedence Punctuators Expressions Control Statements- Creating Arrays Creating Enumerations Creating Structures Creating Collections Methods. 2. OBJECT ORIENTED PROGRAMMING Object Oriented Programming Basic Principles of Object Oriented Programming Member Access Modifiers - Defining a Class Creating Objects Constructors Static Members Inheritance Abstract Classes Interfaces Multiple Inheritance - Polymorphism Operator Overloading 3. WINDOWS FORMS Introduction Working with Multiple Forms Setting the Startup Form Adding Controls Setting Properties Showing and Hiding Controls Creating a Message Box Controls - Panel Picture Box Progress Bar Timer Menus Built in Dialog Boxes Folder Browser Open File Save File Font Color Print Tree View. 4. EVENTS, DELEGATES, THREADS, REMOTING AND REFLECTIONS Events and Delegates Using Delegate declarations and Instances Declaring a delegate Creating a delegate instance Using delegates Enabling Notifications with Events Declaring Subscribing Unsubscribing Calling Threads Constructing a simple Thread Lock Construct Class Monitor Dead Lock Synchronization Remoting - Reflections 5. ACCESSING DATA USING ADO.NET DataBases Basic SQL Statements Working with ADO.NET Overview of ADO.NET Objects DataGridView Control Accessing Data Using Server Explorer Creating a New Data Connection Accessing Data using Data Adapters and Datasets Previewing Data from Data Adapters Connecting to an MS Jet Database Data Binding Simple Data Binding Complex Data Binding Implementing Data Binding. TEXTBOOKS David S Platt, Introducing Microsoft .NET, Prentice Hall of India, New Delhi, 2006. Richard Wiener, Modern Software Development Using C#.NET, Thomson, 2007. REFERENCE Vikas Gupta, .NET Programming Course Kit, DreamTech Press, New Delhi, 2008. Microsoft ADO .Net Step by Step, Prentice Hall of India Private Limited, New Delhi, 2006. Jeffrey Richter , Applied Microsoft .NET Framework Programming,,Microsoft Press, 2002.

NOTE: PSP 1.0 shall be adhered to assess the performance of students in the practical lab

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 25

MCA314B

TE II: ENTERPRISE JAVA PROGRAMMING

3-1-2-0:100

1. WEBIFYING APPLICATIONS Evolution of Web Applications CGI, Application Servers Enterprise Edition EJB, Servlets, JSP, JDBC, JMS, Java Transaction Support, JNDI, Java Mail, IDL RMI, XML, J2EE Connector, JBoss Server Running Jboss server - Deploying an application on JBoss, Functional Architecture ObjectsTiers- Webifying Existing Applications Multiple Clients RMI java.rmi.server package, Naming Class, RMI Security Manager Class, RMI Exceptions, Creating RMI Client and Server Classes. Case Study: Using ANT. 2. SERVLETS Servlets Life Cycle Sharing Information Initializing a Servlet Writing Service Methods Filtering Request and Responses Invoking other web resources accessing the web context maintaining client state finalizing a servlet 3. JAVA SERVER PAGES (JSP) JSP Technology JSP Page, Life Cycle, Creating Static Content, Dynamic Content, Expression Language, Java Beans Components, Using Custom Tags, Reusing the Contents, Transferring Control to another web component, Including an Applet, Setting Properties, Java Server Pages Documents Creating JSP Document 4. JAVA SERVER PAGES STANDARD TAG LIBRARY Using JSTL, Core Tag library, XML Tag library, Internationalization Tag Library, SQL Tag Library, Functions, Custom Tags in JSP Pages, Type of Tags, Encapsulating reusable content using tag files, Tag library descriptors, Simple Tag handlers, JSP Scripting - Scriptlets. 5. INTEGRATING SERVLETS AND JSP: MVC ARCHITECTURE Need for MVC Frameworks - MVC with request dispatcher Beans to represent the data, Writing Servlets to handle requests Working with Beans-Summarizing the MVC code, interpreting relative URL-Data sharing approaches- forwarding requests from JSP pages. TEXTBOOKS Unit I Paco Gomez and Peter Zadrozny, Professional Java 2 Enterprise Edition with BAE WebLogic Server, Wrox Press, 2001. (Ch. 1) C. Muthu, Programming in Java Thomson Learning, 2004. (Ch. 20) Norman Richard and Sam Griffith Jr, Jboss A Developers NoteBook, OReilly Media (Ch. 1, 2) Unit II, III & IV : Stephanie Bodoff etl., The J2EETM Tutorial, Pearson Education, 2005.(Ch 12, 13, 14, 15, 16) Unit V : Marty Hall, Larry Brown, Core Servlets and Java Server Pages, Second Edition, Pearson Education,2004. (Ch. 15) REFERENCE Lame Pekowsky, Java Server Pages, Pearson Education, 2004. Marty Hall, Larry Brown, Servlets and Java Server Pages, Pearson Education, 2005. James McGovern etl., Java Web Services Architecture, Elsevier, 2005. NOTE: PSP 1.0 shall be adhered to assess the performance of students in the practical lab.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 26

MCA316W

QUANTITATIVE APTITUDE DEVELOPMENT

0-0-0-4:100

1. NUMERICAL ABILITY Numbers, HCF and LCM, Decimal fractions, simplification, square roots and cube roots. 2. NUMERICAL ABILITY (CONTINUED) Averages, Problems on numbers, Problems on ages, Percentages, Profit and loss. 3. QUANTITATIVE ABILITY Ratio and proportion, Partnership, Time and work, Pipes and cisterns, Time and distance. 4. QUANTITATIVE ABILITY (CONTINUED) Problems on trains, Boats and streams, Simple interest, Compound interest, Races and games of skill 5. MATHEMATICAL ABILITY Calendar, Clocks, Stocks and Shares, Permutation and Combination, Probability. WORK BOOK R.S.Aggarwal, Quantitative Aptitude for Competitive Examinations, Seventh Edition, S.Chand and Co.Ltd, New Delhi, 2005. REFERENCE Barron, Guide for GMAT, Galgotia Publications, New Delhi, 2006. B.S.Sijwali and Indu Sijwali, Reasoning Verbal & Non Verbal, Arihant Publications Pvt.Ltd, Meerut, 2008. METHODOLOGY Quantitative Aptitude Development course shall be conducted for 15 sessions with duration of one hour for each session and 3 sessions for each unit. The examination components are divided into two namely, Continuous Internal Assessment (CA) and Semester Examination. The marks for each component are as follows. There shall be five problem-solving sessions for each unit with maximum of 8 marks. Problem Solving CA Question Paper Pattern for CA Examination : 40 Marks : 60 Marks The examination shall be conducted by online and the question shall contain two parts, Section A and Section B Section A contains 30 questions, 6 questions from each unit. The candidate is expected to answer all the questions. Each question carries 1 mark. All the questions are objective type. Section B contains 15 questions, 3 questions from each unit and all the questions are objective type. The candidate is expected to answer all the questions. Each question carries 2 marks.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 27

VE1001

HUMAN RIGHTS (Adopted from Thiruvalluvar University Curriculum)

2-0-0-0:100

UNIT-I Definition of Human Rights-nature Content, Legitimacy and Priority-Theories on Human RightsHistorical Development of Human Rights. UNIT-II International Human Rights- Prescription and Enforcement upto World War II Human Rights and the U.N.O. Universal Declaration of Human Rights International Covenant on Civil and political Rights international Covenant on Economic, Social and Cultural Rights and Optional Protocol. UNIT- III Human Rights Declarations U.N. Human Rights Declarations U.N. Human Commissioner. UNIT IV Amnesty international Human Rights and Helsinki process Regional Developments- European Human Rights System- African Human Rights System- International Human Rights in Domestic Courts. UNIT V Contemporary Issues on Human Rights: Childrens Rights- Womens Rights- Dalits Rights- Bonded Labour and Wages- Refugees- Capital Punishment. Fundamental Rights in the Indian Constitution Directive Principles of State Policy Fundamental Duties National Human Rights Commission. TEXTBOOK Prof. T.S.Ravi, Human Rights, Margham Publications, First Publication,2009. REFERENCE Ms. S. Bharathi, Essential Human Rights, Ozone Books, 2008.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 28

MCA410T

OBJECT-ORIENED ANALYSIS AND DESIGN

3-1-0-0:100

1. MODELING IN GENERAL Object Oriented Development Evidence for Usefulness of Object Oriented development - Modeling Concepts: Modeling Abstraction - The Three Models Overview of Unified Modeling Language and introduction to UML Diagrams. 2. CLASS MODELING Class Modeling: Object and Class Concepts Link and Association Concepts -Inheritance - Sample Class Model - Navigation of Class Models - Advanced Class Modeling: Advanced Object & Class Concepts - Association Ends -N-ary Associations Aggregation Abstract Classes - Multiple Inheritance Metadata Reification Constraints - Derived Data Packages. 3. DYNAMIC MODELING State Modeling: Events States Transitions & Conditions - State diagrams - State Diagram Behavior - Advanced State Modeling: Nested State Diagrams - Nested States Signal Generalization Concurrency - Sample State Model - Relation of Class & State Models - Interaction Modeling: Use Case Models - Sequence Models - Activity Models Advanced Interaction Modeling: Use Case Relationships - Procedural Sequence Models Special Constructs for Activity Models. 4. SYSTEM ANALYSIS Process Overview: Development Stages - Development Life Cycle - System Conception: Devising a System Concept - Elaborating a Concept- Preparing a problem Statement Domain Analysis: Overview of Analysis - Domain Class Model - Domain State Model Domain Interaction Model Iterating the Analysis - Application Analysis: Application Interaction Model -Application Class Model - State Model Operations. 5. SYSTEM DESIGN System Design: Overview of System Design - Estimating performance - Making a Reuse plan Breaking a System into Subsystems - Identifying Concurrency-Allocation of Subsystems - Management of Data Storage - Handling Global Resources - Choosing a Software Control Strategy - Handling Boundary Conditions -Setting Trade-off Priorities - Common Architectural Styles - Architecture of the ATM System - Class Design: Bridging the Gap - Realizing Use Cases - Designing Algorithms Recursing Downward Refactoring - Design Optimization - Reification of Behavior -Adjustment of Inheritance Organizing Class Design. TEXT BOOK Object-Oriented Modeling and Design with UML, Michael Blaha and James Rumbaugh, Prentice Hall of India Private Limited, New Delhi, 2006. REFERENCE Object-oriented Systems Development using UML, Ali Bahrami, McGraw Hill, Boston, 1999.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 29

MCA411T

ADVANCED DATABASE SYSTEMS

3-1-2-0:100

1. OBJECT -BASED DATABASES AND XML Object Based Databases and -XML 2. DATA MINING AND INFORMATION RETRIEVAL Data Analysis and Mining-Information Retrieval 3. SYSTEM ARCHITECTURE Database-System Architectures-Parallel Databases-Distributed Databases 4. OTHER TOPICS Advanced Application Development-Advanced Data Types and New Applications-Advanced Transaction Processing 5. CASE STUDIES : Oracle (Only the concepts that are covered in Units I to IV) TEXTBOOK Abraham Silberschatz, Henry F.Korth and S.Sudarshan, Database System Concepts, Fifth Edition, McGraw Hill International Edition, 2006. (Chapters 9, 10, 18-25, 26-29). REFERENCE Rajesh Narang, Object Oriented Interfaces and Databases, Prentice Hall of India Private Limited Fred R.McFadden Jeffery A Hoffer and Mary B.Prescott, Modern Database Management, Addison Wesley Elmasri and Navathe, Fundamentals of database System, Addison Wesley Jefrey D.Ulman and Jenifer Widom, A First Course in Database Systems, Pearson Education Asia Bipin.C.Desai, An Introduction to Database Systems, Galgotia Publications Pvt Limited C.S.R.Prabhu, Data Warehousing Concepts, Techniques, Products and Applications, Prentice Hall of India,Private Limited C.S.R.Prabhu, Object Oriented Database Systems, Prentice Hall of India Private Limited

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 30

MCA412T

MICROPROCESSOR AND ITS APPLICATIONS

3-0-2-0:100

1. INTRODUCTION General Architecture of a Microcomputer System Evolution of the Microprocessor Architecture 8086 internal architecture Software Model of the 8086 Microprocessor Memory Address Space and Data Organization Segment Registers and Memory Organization Instruction Pointer and Data Registers Generating a Memory Address. 2.PROGRAMMING IN 8086 8086 addressing modes Converting Assembly Language Instructions to Machine Code - 8086 Instruction Set Data Transfer Instructions Arithmetic Instructions Logic Instructions Shift Instructions Rotate Instructions Flag Control Instructions Compare and Jump Instructions Subroutine-Handling, Loop-Handling and String-Handling Instructions. 3. 8086 BASED SYSTEM & INTERRUPTS Minimum-mode and Maximum-Mode Systems System Clock and Bus Cycles Hardware Organization of the Memory Address Space Types of Interrupt Interrupt Address Pointer Table Interrupt Instructions External Hardware Interrupt Sequence 8259A Programmable Interrupt Controller Software Interrupts Non-Maskable Interrupt . 4. INTERFACING & APPLICATIONS Keyboard/Display Controller Software Programmable Timer/Counter DMA data transfer Microcomputer based industrial process control system Robotics & Embedded control Digital signal processing & Digital Filters. 5. CASE STUDY Multi-user/Multi-tasking Operating system 80286 microprocessor Real Mode & Protected Mode operation 80386 microprocessor 80386 modes 386 Virtual 8086 mode 80486 microprocessor Pentium microprocessors. TEXT BOOK UNIT I, II & III Walter A. Triebel and Avatar Singh,The 8088 and 8086 Microprocessors, Prentice Hall of India, 2002. UNIT IV & V Douglas V. Hall, Microprocessors and Interfacing Programming and Hardware, Tata McGraw-Hill, 1999. REFERENCE Barry B. Brey, The Intel Microprocessors, Prentice Hall of India, 2002. Ray A.K and Bhurchandi, Advance Microprocessors and Peripherals, Architecture Programming and Interfacing, McGraw Hill International, 2000. LAB EXERCISES 1. Addition and Subtraction 2. Multiplication and Division 3. Largest in an Array 4. Sorting and Searching 5. Computation of Factorial 6. Generation of Fibonacci Series 7. Computation of nCr 8. Computation of LCM and GCD 9. Clear the Screen 10. Moving string of characters on CRT
MCA Curriculum 2008 CBCS Batch 2nd Revision Page 31

MCA413A

TE-III: WEB APPLICATIONS USING .NET

3-0-2-0:100

1. INTRODUCING ASP.NET Developing ASP.NET Applications - ASP.NET File Types - The bin Directory Application Updates A Simple Application from Start to Finish -Behind the Scenes with HellowWorld.aspx - Code-Behind Web Form Inheritance Explained - Compiled Code-Behind Files Compiling Multiple Files into One Assembly - Importing Namespaces - Assembling Code-Behind Three Ways to code Web Forms - The Global.asax Code-Behind - Application Events Understanding ASP.NET Classes - ASP.NET Configuration - The Web.config File - Nested Configuration - Configuration file Section 2. WEB FORMS Web Form Fundamentals - A Simple Page Applet - The Problem With Response.Write - Server Controls - HTML Server Controls - ViewState - The HTML Control Classes Events - Event Handling Changes - The Currency Converter application-Adding Support for Multiple Currencies - Adding Linked Images - Setting Styles A Deeper Look at HTML control classes-HTML control events-The HTML control Base class-The HtmContainerControl Class-The HtmlInputControl Class-The Page class-The Controls collection-The HttpRequest Class-The HttpResponse Class-The ServerUtility ClassAssessing HTML Server controls 3. WEB CONTROLS Web Controls - Stepping Up to web Controls - Basic Web Control Classes - The web Control Tags The WebControl Base Class - Units Enumerated Values - Colors - Fonts List Controls - Table Controls - AutoPostBack and Web Control Events - How Postback Events Work - The Page Lifecycle The Greeting Card Applet - Validation and rich Controls- The Calendar Control-Formatting the Calendar-restricting Dates- The AdRotator control-The Wizard control-Validation-The Validation Controls -The Validation Process-The Validator Class-A Simple Validation Example Sever side example-Manual Validation-Understanding Regular Expressions-Literals and MetaCharacters-Finding a Regular expression- A Validated Customer Form other rich controls -.Data Bound Controls- Creating Master Pages-Applying Themes and Skins. 4. DATA ACCESS AND XML ADO.NET Data Access - About the ADO.NET Example - Obtaining the Sample Database - Simple Data Access - Simple Data Update - Importing the Namespaces - Creating a Connection - The Connection String SQL - Making the Connection - Defining the Select Command - Using a Command with a DataReader - Updating Data - Using Update - Insert - and Delete Commands - Accessing Disconnected Data - Selecting Disconnected Data - Selecting Multiple Tables - Modifying Disconnected Data - Modifying and Deleting Rows - Adding Information - to a DataSet - Updating Disconnected Data - The CommandBuilder - Updating a DataTable - Controlling Updates - An Update Example Using XML - XMLs Hidden Role in .NET - XML Basics - Attributes - Comments - The XML Classes - the XML TextWriter - The XML Text Reader - Working with XML Documents - Reading an XML Document - Searching an XML Document - XML Validation CreatingXML Schema XSD Documents - Validating an XML File. 5. CREATING AND USING WEB SERVICES Web Service Basics - Web Service Ingredients - Web Service Description Language SOAP ProtocolUDDI- Web Service Data Types- Creating Web Services -The StockQuote Web Service XML Namespace - Testing Your Web Service - State Management in ASP.NET ASP.NET Intrinsic objects Application State, Session State,Cookie,QueryString- The StockQuote Service with State Management Transactions - Caching - Security - Security with SOAP Headers- Consuming a Web Service Configuring a Web Service Client in Visual Studio .NET Creating a Web Reference in Visual Studio .NET - The Proxy Class - Creating a Proxy with WSDL.exe - Using the Proxy Class - Waiting and Timeouts - Connecting Through a Proxy - Using SOAP Headers -Crystal reports in ASP.NET

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 32

TEXT BOOKS Mathew MacDonald, ASP.NET: The Complete Reference, Tata McGraw Hill Publishing Company Ltd., New Delhi. Dino Eesposito,Introducing Microsoft ASP .NET 2.0, Prentice Hall of India, New Delhi 2006. REFERENCE Stephen Walther, ASP.NET 2.0 Unleashed Second Edition Pearson Education 2005 WEB REFERENCE www.asp.net www.asp101.com www.msdn.com

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 33

MCA413B

TE-III: ADVANCED ENTERPRISE JAVA PROGRAMMING

3-0-2-0:100

1. XML TECHNOLOGY XML benefits advantages of XML over HTML XML based standards structuring XML document using DTD XML schemas XML parsers DOM SAX presentation technologies - XSL XSLTXFORMS XHTML XLINK XPATH XQUERY 2. JAVA SERVER FACES (JSF) JSP Benefits - Framework roles - Simple JSF application - User Interface Component Model Navigational Model - Life Cycle of JSF page, Using JSF in JSP Pages Setting up a page - Using core Tags - Using HTML Tags - Using localized messages - Using Standard Converters - Registering Listeners on Components Standard Validators - Referencing a backing Bean method - Using custom objects, Writing component properties Performing Localization - Creating custom Converter Implementing an Event Listener - Creating a Custom Validate, - Writing Backing Bean methods 3. ENTERPRISE JAVA BEANS (EJB) Introduction to Enterprise Beans - Session Bean - Entity Bean - Message driven Bean Life Cycle of Enterprise Bean, Creation of Enterprise Bean, Creation of session Bean Handling Exceptions, Bean Managed Persistence, Container Managed Persistence Message Driven Bean Example Enterprise Java beans Query Language, Transactions - Container- Managed Transactions, Bean Managed Transactions Resource Connections. 4. JAVA MESSAGE SERVICE API Basic JMS API concepts JMS API programming model JMS client applications, Creating robust JMS applications, Using JMS API in J2EE application. 5. WEB SERVICES BUILDING BLOCKS Transport protocols for web services XML RPC - Header data type request and response message format - SOAP - specification message format SOAP header returning errors data types remote method call describing web services requirements for web services WSDL goals anatomy of WSDL web services policy anatomy of UDDI. TEXT BOOK Unit I Frank. P.Colyle,XML, Web Services and The Data Revolution, Second Edition, Pearson Education, 2002. Unit II, III & IV Stephaniew Bodoff Etl,The J2EETM Tutorial,Second Edition, Pearson Education, 2005. Unit II (Ch 17, 18, 19) Unit III (Ch 23, 24, 25, 26, 27, 28, 29, 30,31) Unit IV (Ch 33) PG-CS Page: 23 of 65 Unit V Sandeep Chatterjee, James Webber,Developing Enterprise Web Services, Pearson Education, 2004. REFERENCE James Mcgovern Etl.,Java Web Services Architecture, Elsiver, 2005. Lame Pekowsky,Java Server Pages, Pearson Education, 2004. Paco Gomez And Peter Zadrozny,Professional Java 2 Enterprise Edition with BAE Web Logic Server, Wrox Press, 2001. Ramesh Nagappan, Robert Skoczylas And Rima Patel Sriganesh, Developing Java Web Services, Wiley Publishing Inc., 2004.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 34

MCA455A

DE I: LINUX AND NETWORK PROGRAMMING

3-1-0-0:100

1. INTRODUCTION & FILE SYSTEM Overview of UNIX OS - File I/O File Descriptors File sharing - Files and directories File types File access permissions File systems Symbolic links - Standard I/O library Streams and file objects Buffering - System data files and information - Password file Group file Login accounting system identification. 2. PROCESSES Environment of a UNIX process Process termination command line arguments Process control Process identifiers - Process relationships terminal logins Signals -threads. 3. INTERPROCESS COMMUNICATION Introduction - Message passing (SVR4)- pipes FIFO message queues Synchronization (SVR4) Mutexes condition variables read write locks file locking record locking semaphores Shared memory(SVR4). 4. SOCKETS Introduction transport layer socket introduction - TCP sockets UDP sockets raw sockets Socket options - I/O multiplexing - Name and address conversions. 5. APPLICATIONS Debugging techniques - TCP echo client server - UDP echo client server - Ping - Trace route - Client server applications like file transfer and chat. TEXT BOOK W. Richard Stevens, Advanced Programming in the UNIX Environment, Addison Wesley, 1999. W. Stevens, Bill Fenner, Andrew Rudoff Unix Network Programming, Volume 1, The Sockets Networking API, Third Edition, Pearson Education, 2003. REFERENCE Meeta Gandhi, Tilak Shetty and Rajiv Shah, The C Odyssey Unix The open Boundless C, First Edition, BPB Publications, 1992.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 35

MCA455B

DE I: ACCOUNTING AND FINANCE MANAGEMENT

3-1-0-0:100

1. PRINCIPLES OF ACCOUNTING Introduction Accounting Concepts and Convention Principles of Double Entry Journals Ledgers Trail Balance. 2. FINAL ACCOUNT Final Accounts Trading Accounting Profit and Loss Accounting Balance Sheet (Simple Adjustments only). 3. DEPRECIATION Depreciation Meaning Causes Objectives Methods Straight Line Methods Diminishing Balanced Methods. 4. NATURE AND SCOPE OF COST ACCOUNTING Cost Accounting: Nature and Scope Objectives, advantages and Limitations Financial Accounting Vs. Cost Accounting. Costing System: Types of Costing and Cost classification Cost Sheet and Tenders. 5. BUDGETING Budget and Budget Control Meaning Objectives Uses and Limitations Essentials of a Successful Budgetary Control Preparation of Sales Production Cash and Flexible Budgets. TEXT BOOK Reddy and Murthy, Financial Accounting, Margham Publication,YYYY. Reddy and Murthy, Cost and Management Accounting, Margham Publication.YYYY. REFERENCE Gupta R.L & M. Radhaswamy, Advanced Accounts (Vol.II), New Delhi, Sultan Chand Sons, 1991. Man Mohan & S.N. Goyal, Principles of Managements Accounting, Agra, Sahithya Bhawan 1987. Hingoram, N.I. & Ramanathan, A.R. management Accounting, Sultan Chand, New Delhi, Second Edition,1982 .

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 36

MCA415W

INDUSTRY INTERFACE

0-0-0-4:100

1. Submission of the Profile of the Organization Students are expected to submit the profile of the perspective Organization in which the fieldwork will be done. Students may take an introduction letter from the Department to introduce the objective of Industry Interface. Preferred Organization must be a registered one as a Company, Trust, service sector or government sector, having at least 50 employees and three years of market existence. There should be a well-defined existing business process, which needs to be computerized or improved upon. 2. Approval of the Selection of the Organization Based on the submitted profile, the Department shall approve the Industry Interface Site. 3. Sign-Off from the Organization Students must explain to the selected Organization what they are going to do during the course of their visits and should get the sign-off from the company based on the terms and conditions of the visit and deliverables. 4. Technical visits Students should study the following aspects during their each visits and submit the report to the department Visit 1 - Organizational system and Core business Visit 2 - Business process (in IEEE Format) Visit 3 - Subsystem I Visit 4 - Subsystem II Visit 5 - Subsystem III Each visit should take place on a different day. Recording the details of each visit is a must for the students. And the students should get the required acknowledgement from the Industry Interface Representatives and submit the same to the Placement Office. 5. Final report To make this visit really successful, students should make sure that they are proposing a software solution to the existing problem in the organization they visit. Based on this, final report should be prepared by the students. 6. Presentation of the Final Report Each student shall make a presentation (for 10 minutes) based on their reports given and explain the proposed solution. Clarifications shall be held for each presentation for at least 2 minutes. This resentation will be done in three groups of 20 students each. Evaluation Scheme 5 Reports x 10 Final Report Presentation of Report Companys Assessment

= 50 = 20 = 10 = 20

Total Marks = 100

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 37

MCA 510T

DESIGN AND ANALYSIS OF ALGORITHMS

3-1-0-0:100

1. ANALYSIS OF ALGORITHMS Models of Computation Algorithm and their Complexity Random Access Machines Computational Complexity of RAM Machines A Stored Program Model Abstractions of the RAM Turing Machine Mathematical Foundations Growth of Functions Summations Recurrences. 2. DIVIDE AND CONQUER AND GREEDY METHOD Divide and Conquer Multiplication of two n Bit Numbers Strassens Matrix Multiplication Greedy Method Knapsack Problem Huffman Code Traveling Salesperson. 3.DYNAMIC PROGRAMMING AND BACKTRACKING Dynamic Programming Chain Matrix Multiplication Traveling Salesperson 0/1 Knapsack Backtracking - Four Queens Problem Sum of Subsets Knapsack- Generations of all Clique of a Graph. 4. APPROXIMATION AND RANDOMIZED ALGORITHMS Approximation Algorithms Planar Graph Coloring Job Scheduling Bin Packing Randomized Algorithms Numerical Integration Primality Testing Majority Element. 5. BRANCH AND BOUND AND LOWER BOUND THEORY Branch and Bound Technique Assignment Problem Lower Bound Techniques Comparison Tree Sorting Searching Reduction Method Adversary Argument- Selection Median Finding. TEXTBOOK Basu.S.K, Design Methods and Analysis of Algorithms, Prentice Hall of India, New Delhi, 2005. Alfred Aho, John Hopcroft, Jeffrey Ullman, The Design and Analysis of Computer Algorithms, Pearson Education, Delhi, 2003. Thomas Cormen, Charles Leiserson, Ronald Rivest, Introduction to Algorithms, Prentice Hall of India, New Delhi, 1998. REFERENCE Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran,Fundamentals of Computer Algorithms, Galgotia Publications Pvt.Ltd., NewDelhi, 2001.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 38

MCA511T 1. INTRODUCTION

OPEN SOURCE TECHNOLOGIES

3-1-2-0:100

Introduction Web Server PHP Apache - Installation and Configuration - Installation on Unix systems - Installation on Windows systems - Data Types - Literals and Variables - Operators and Control Statements 2. ADVANCED PHP Functions - Arrays - Cookies - Sessions - COM/DOM Functions - XML Parsing - CURL, Client URL Library Functions - Date and Time Functions - Directory Functions- String Functions - Unicode Functions - Classes and Objects (PHP 5) - Security (Magic Quotes, Using Register Globals - User Submitted Data) Web Services handling Validations Send Mails CMS Systems 3. MySQL Introduction MySQL Features Functions references Statements and Syntax Commands PHP MySQL Functions Connections Fetch , Display, Close Connection Database driven applications 4. RUBY Introduction Installation and Configuration (Windows / Unix) Get Started Ruby Features Socket Programming Usage of TCP Server and TCP Socket Classes for Date and Time - Basic Networking - Port - Internet Addresses - Sockets - Socket classes - The Date Time Server and Client Web Services Ruby with MySQL, SMTP class Ruby on Rails Introduction 5. RAILS Getting Started - Architecture of Rails Applications - Installing and Configuration Rails - Building an Application - The Rails Framework - Web Services on Rails - The Basics - Relationships between Tables - Object Life Cycle - The Web, V2.0 - Action Mailer Securing Your Rails Application Deployment and Production TEXT BOOK Steven D. Nowicki, Alec Cove, Heow Eide-goodman ,Professional PHP, Wrox Press, 2004. Dave Thomas and David Heinemeier Hansson, with Leon Breedt, Mike Clark, James Duncan Davidson, Justin Gehtland, and Andreas Schwarz,Agile Web Development with Rails, Second Edition, The Pragmatic Programmers, 2006. REFERENCE Dave Thomas, Chad Fowler, Andy Hunt , Programming Ruby, Second Edition, , The Pragmatic Programmers, 2004. Bruce Tate, From Java To Ruby: Things Every Manager Should Know, The Pragmatic Programmers, 2006.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 39

1. http://rubyonrails.org/ 2. http://ruby-lang.org/ 3. www.rubyonrailscamp.com/ 4. www.rubyonrailswebhost.com/ 5. http://ruby.feedables.com/

LAB EXERCISES

PHP 1. Control Statements 2. Functions 3. Classes and Objects 4. Database Application with MYSQL

RUBY 5. Socket Programming 6. Ruby with MYSQL 7. Web Services

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 40

MCA 512T

COMPUTER GRAPHICS

3-1-2-0:100

1. INTRODUCTION Overview of Graphics System - Bresenham Technique Line Drawing and Circle Drawing Algorithms - DDA - Line Clipping - Text Clipping. 2. 2D TRANSFORMATIONS Two Dimensional Transformations Scaling and Rotations - Interactive Input Methods - Polygons Splines Bezier Curves - Window Viewport Mapping. 3. 3D TRANSFORMATIONS Three Dimensional Display Methods Three Dimensional Transformations Projections Parallel Projection - Perspective Projection Visible Surface Detection Methods - Visualization and Polygon Rendering. 4. ANIMATION Color Models XYZ-RGB-YIQ-CMY-HSV Models Animation Principles of Animation - Key Frame Systems - General Animation Functions - Morphing. 5. OPENGL OpenGL Command Syntax Drawing Geometric Objects Viewing and Modeling Transformations Specifying a Color and a Shading Model Drawing Pixels, Bitmaps, Fonts, and Images Texture Mapping. TEXT BOOKS UNIT I, II, III & IV Hearn D and Baker M.P, "Computer graphics C Version",2nd Edition, Pearson Education, 2004. UNIT V http://www.glprogramming.com/red/ REFERENCE Dave Shreiner, Mason Woo, Jackie Neider, Tom Davis, OpenGL Programming Guide: The Official Guide to Learning OpenGL, Addison-Wesley Professional, 2008. Shalini Govil, Pai, Principles of Computer Graphics, Theory and Practice Using OpenGL and Maya, Springer International Edition, 2008.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 41

LAB EXERCISES

1. Drawing Geometric Objects. 2. Viewing and Modeling Transformations. 3. Using Colors and Shading Models. 4. Using Glut Bitmap Fonts. 5. Handling Mouse and Keyboard Events. 6. Using Fog Techniques. 7. Using Lighting Effect. 8. Creating Transparent Effect. 9. Using Texture Mapping. 10. Working with Multiple Windows.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 42

MCA513A

TE IV : ENTERPRISES APPLICATION USING .NET

3-1-2-0:100

1. COMPONENT BASED PROGRAMMING Introduction Creating a Simple Component Properties and State Database Components Consuming the Database Component Enhancing the Component with Error Handling Aggregate Information Data Objects . 2. CUSTOM CONTROLS User Controls Creating a Simple User Control Visual Studio.NET Custom Control Support Independent User Controls Integrated User Controls User Control Events Limitations Deriving Custom Controls. 3. CACHING AND PERFORMANCE TUNING Designing for Scalability Profiling Caching - Output Caching Client Side Query Structuring Events Custom Caching Control Caching with HTTP Cache Policy Class Fragment Caching Data Caching A Simple Cache Test Caching to Provide Multiple Views. 4. IMPLEMENTING SECURITY Determining Security Requirements Restricted File Types Security Concepts ASP.NET Security Model Security Strategies Certificates SSL Forms Authentication Web.Config Settings Login Page User Lists Protecting User Passwords with Encryption Custom Roles Windows Authentication IIS Settings Web.Config Setting A windows Authentication Test. 5. ENTERPRISE LIBRARY AND DEPLOYMENT TOOLS Enterprise Library Developing Applications with Enterprise Library Design Blocks Caching Cryptography Data Access Exception Handling Logging Policy Injection Security Unity Validation Deployment Tools Development of Deployment Tools Choosing a Deployment Strategy Clickonce Update Strategy Deployment and Security. TEXT BOOK UNIT I,II,III &IV Matthew MacDonald,The Complete Reference ASP.NET,Tata McGrawHill, 2002. UNIT V http://msdn.microsoft.com/en-us/library/cc467894 http://msdn.microsoft.com/en-us/library/wh45kb66.aspx REFERENCE Stephen Walther, ASP.NET2.0 Unleashed , SAMS Publishing, 2006. http://msdn.microsoft.com/en-us/library/cc467894 http://msdn.microsoft.com/en-us/library/wh45kb66.aspx

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 43

MCA513B

TE IV : JAVA OPEN SOURCE FRAMEWORKS

3-1-2-0:100

1. STRUTS-I Introduction to Struts - Actions Beans Forms Properties Messages 2. STRUTS-II Advanced Action Exceptions - Manual Validation - Automatic Validation - Struts Tiles. 3. HIBERNATE-I Introduction - Object Relation Mapping - Collection Mapping - Association Mapping - Component Mapping 4. HIBERNATE-II Inheritance Mapping -Transactions and Concurrency HQL -Native SQL - Filtering Data 5. REPORTING & TESTING Jasper Report Features Reporting capabilities to java applications Creating JRXML report Creating Dynamic Database Report Working Report Layout and Design Introduction to Junit-Writing tests-What to test-Boundary conditions- Mock Objects- Properties of good test-testing on a project TEXTBOOK UNIT I & II Tutorials developed by Marty Hall, available at http://courses.coreservlets.com/CourseMaterials/struts.html. UNIT III & IV Hibernate Reference Documentation 3.3.1, Copyright 2004 Red Hat Middleware, LLC available at http://www.hibernate.org/hib_docs/v3/reference/en/html_single/. UNIT V David R. Heffelfinger, JasperReports for Java Developers Create, Design, Format, and Export Reports with the World's Most Popular Java Reporting Library, Packt publications, 2006. Andrew Hunt, David Thomas, Pragmatic Unit Testing in Java with Junit, Pragmatic Bookshelf, 2003 REFERENCE Minter Dave, Linwood Jeff, Beginning Hibernate, From Novice to Professional, Apress, 2006. Doray, Arnold, Beginning Apache, From Novice to Professional, Apress, 2006. Toffoli, Giulio, Definitive Guide to iReport, Apress, 2007. Beck, Kent , Junit Pocket Guide , O'Reilly Media,

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 44

MCA553A

DE - II : MOBILE COMPUTING

3-1-0-0:100

1. INTRODUCTION / FRAMEWORKS AND TOOLS Introduction to Mobile Computing: Introduction- Dimensions of mobile Computing- Condition of the mobile user- Architecture of mobile software applications, Frameworks and Tools : Centralized Frameworks and Tools- N-Tier Client-Server Frameworks- Publishing Frameworks Tools - java, BREW, WAP, Windows CE, Symbian EPOC, XML and UML basic 2.MULTICHANNEL USER INTERFACE DEVELOPMENT Generic User Interface Development : User Interface Development-Building Generic User InterfacesUsing UML for Modeling Generic User Interface Component-Xforms-Putting it all to work, Developing Mobile GUIs: A deeper Look at WAP, JWME, BREW, and Microsoft Platforms for mobile GUIs 3. MOBILE APPLICATIONS AND MULTIMODAL USER INTERFACES VUIs and Mobile Applications:Qualities of Speech-Voice Transcription-Voice Recognition-Text to Speech Technologies, Multichannel and Multimodal User Interfaces: Modeling Multichannel and Multimodal applications with Uml- Multimodal Content- Software and System Architectures for Delivering Multimodality- Internationalization and Localization- Evolving Definition of Multimodality 4.DIMENSIONS OF MOBILE APPLICATION DEVELOPMENT Mobile Agents and Peer-to-Peer Architectures: Mobile Agents-UML extensions for Mobile AgentsApplications of mobile agents to mobile applications and Implementation Tools-Solving mobile application development problems with mobile agents- Techniques for agent-based software-Peer to Peer applications for mobile computing, Wireless Connectivity: Mobile IP- SMS-Quality of Service 5.PUTTING THE PROJECT TOGETHER Mobile Development Process: Applying the wisdom methodology to mobile development- UML based development cycle for mobile applications, Architectural patterns for mobile applications, Mobile Application Development hurdles: Voice user interface hurdles- Hurdles with multimodal applications-Problems with building location-based applications- Power usage, Testing: Dimensions of mobility on software testing-Stress testing and Scalability issues-Testing location-based functionality, Case Study TEXT BOOK Req BFar, Mobile Computing Principles Designing and Developing Mobile Applications with UML and XML, Cambridge University Press, 2005. Unit 1 Ch. 1,2 Unit 2 Ch. 5,6 Unit 3 Ch. 7,8 Unit 4 Ch. 9,10 Unit 5 Ch. 15,17,18,19 REFERENCE Ivo Salmre, Writing Mobile Code: Essential Software Engineering for Building Mobile Applications, Addison-Wesley Professional, 2005. Valentino Lee, Heather Schneider, Robbi Schell, Mobile Applications: Architecture, Design, and Development, Prentice Hall PTR, 2004.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 45

MCA553B

DE - II : ELECTRONIC COMMERCE

3-1-0-0:100

1. INTRODUCTION Networks and Commercial Transactions - Internet and Other Novelties Electronic Transactions Today - Commercial Transactions - Establishing Trust - Internet Environment - Internet Advantage - World Wide Web. 2. SECURITY TECHNOLOGIES Why Internet Is Unsecure - Internet Security Holes - Cryptography: Objective - Codes and Ciphers Breaking Encryption Schemes - Data Encryption Standard - Trusted Key Distribution and Verification Cryptographic Applications - Encryption - Digital Signature Nonrepudiation and Message Integrity. 3. ELECTRONIC PAYMENT METHODS Traditional Transactions: Updating - Offline and Online Transactions - Secure Web Servers - Required Facilities - Digital Currencies and Payment Systems - Protocols for the Public Transport - Security Protocols - SET - Credit Card Business Basics. 4. ELECTRONIC COMMERCE PROVIDERS Online Commerce Options - Functions and Features - Payment Systems : Electronic, Digital and Virtual Internet Payment System - Account Setup and Costs - Virtual Transaction Process - InfoHaus - Security Considerations CyberCash: Model - Security - Customer Protection - Client Application - Selling through CyberCash. 5. ONLINE COMMERCE ENVIRONMENTS Servers and Commercial Environments - Payment Methods - Server Market Orientation - Netscape Commerce Server - Microsoft Internet Servers - Digital Currencies - DigiCash - Using Ecash - Ecash Client Software and Implementation - Smart Cards - The Chip - Electronic Data Interchange - Internet Strategies, Techniques and Tools. TEXT BOOK Pete Loshin, "Electronic Commerce", Fourth Edition, Firewall Media, An imprint of Laxmi publications Pvt. Ltd., New Delhi, 2004. REFERENCE Jeffrey F.Rayport and Bernard J. Jaworski, "Introduction to E-Commerce", Second Edition, Tata Mc-Graw Hill Pvt., Ltd., 2003. Greenstein, "Electronic Commerce", Tata Mc-Graw Hill Pvt., Ltd., 2000.

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 46

MCA 515W

SOFT SKILLS DEVELOPMENT

0-0-0-2:100

1. Leadership Skills: How to make a Leader? Challenges involved in Leadership How to lead with an effective communication? 2. Presentation Skills: Mock Presentation Framing for Presentation Preparing a presentation Delivering a Presentation Deliver & Review Presentation 3. Time Management Skills: Time planning and Prioritizing Key to set up Goals Efficiency in Time Management Action Planning 4. Stress Management: Understanding Stress Personality Type & its Implication on Stress Coping Strategies of Job Stress Stress and Job Performance 5. Assertiveness: How to be assertive? - Why Assertiveness is important? Is Assertiveness the best way to go? 3 parts of Assertive Communication 6. Decision Making: Stating the problem List of Option Weigh the possibleoutcomes Consider your values Make a decision Evaluate the Decision 7. Negotiation: Approaches, Issues and Common Biases Gender and Cultural Differences Improving Negotiation Skills 8. Self-Motivation: How to be Self Motivated? Reasons we lose Motivation Self Motivation Techniques 5 important Rules for Motivation

MCA Curriculum 2008 CBCS Batch 2nd Revision

Page 47

8. Information Literacy Courses


Purpose Information literacy is a set of abilities requiring individuals to recognize when information is needed and have the ability to locate, evaluate, and use effectively the needed information. Information is available through libraries, community resources, special interest organizations, media, and the Internetand increasingly, information comes to individuals in unfiltered formats, raising questions about its authenticity, validity, and reliability. In addition, information is available through multiple media, including graphical, aural, and textual, and these pose new challenges for individuals in evaluating and understanding it. Information literacy forms the basis for lifelong learning. It enables learners to master content and extend their investigations, become more self-directed, and assume greater control over their own learning. An information literate individual is able to: Determine the extent of information needed Access the needed information effectively and efficiently Evaluate information and its sources critically Incorporate selected information into ones knowledge base Use information effectively to accomplish a specific purpose Understand the economic, legal, and social issues surrounding the use of information, and access and use information ethically and legally Course Stages 1. At the beginning of a semester, the Supervisor (one of the faculty members is appointed for this course ) asks each student to submit a topic of interest from the defined scope of study, with the list of available resources (mainly refereed journals). The scope of study is limited for each semester as given below. Semester I Semester II Semester III Semester V : Application Software : System Software : Technology Focus : Focus on Domain Elective

2. Approval of Topics: The Supervisor reviews the topics given by the students and allots the topics ( by the second week) in such a manner that not more than three students to get the same topic. The Supervisor provides guidelines to the students to approach various resources and explore the topic 3. Problem Definition: To clarify and understand the requirements of the problem or task for which information is sought, each student is expected to define the problem of study (abstract) in 200 words and submit it online by the fourth week of the semester. Students must also include various references available on the topic. The work of each student must be unique, although all those who have the same topic can discuss and share ideas online through official discussion forum of the course. 4. Organizing/synthesizing: Examining the resources that were found, the information must be determined to be useful or not useful in solving the problem must be identified. The useful resources are selected and the inappropriate resources are rejected. Information, which has been selected, is organized and a schema of the final paper is presented to the supervisor by teh sixth week of the semester.

MCA Curriculum 2008 CBCS Batch 2nd Version

Page 48

5. Paper Submission: Each student submits the final paper online by the eighth week of the semester. It is mandatory that each student has participated in the online discussion forum along with the supervisor and other group members. 6. Presentation: Each student makes a presentation of the topic after the review by the supervisor and necessary corrections. The presentation is approved by the supervisor and is ready for
th th

presentation to the entire class from 10 to 15 week of the semester. While the Report is evaluated by the Supervisor as continuous assessment, the final presentation is evaluated by the Supervisor along with the peers. Evaluation Scheme 1. Report Topic Selection Problem Definition Paper Work Schema Survey of Literature Technical Exposition Summary of Discourse Bibliography & References 05 Marks 05 Marks 10 Marks 20 Marks 10 Marks 05 Marks 05 Marks

2. Presentation Evaluation by the Supervisor Evaluation by the Peers 20 Marks 20 Marks

Reference Information Literacy Competency Standards for Higher Education, American Library Association, 2000. http://www.ala.org/acrl/ilcomstan.html.

MCA Curriculum 2008 CBCS Batch 2nd Version

Page 49

9. Software Project [III, IV, V Semester]


The Project work carried out by the students in the Third, Fourth, and the Fifth semester of MCA is a Team Work. The Department decides the formation of the teams, having ut most three members for a group, basing on the technology specialization chosen by the students. Each team has to select a unique problem space for which the students will develop and enhance the solution space in three stages for MCA. The Initial solution for the problem will be obtained by applying the technology they learn in third semester. The Solution space is enhanced and stabilized by applying advanced technologies during the Fourth and Fifth semesters which they learn in the corresponding semesters. The solutions obtained in the Third, Fourth, and the Fifth semesters will be considered as separate projects for evaluation. Each student in a Team has to deal with a specific area in the problem. The report submitted at the end of each semester is an individual work and it has to be submitted as a PDF document. The students can not ordinarily change the project groups after a semester. For Personal reasons, if a student wants to break away from a group, he/she has to continue working on the same problem space as a single person. The group will follow Team Software Process (TSP) model strictly for project development. Each group is assigned a faculty member as Project Supervisor to monitor the progress of the project work. Each student has to get the approval for their preparations from their supervisors before each Lab Session. Phases of the Project work are Analysis, Design, Implementation, Testing Artifacts to be prepared during the Phases are: o Software Project Initiation Statement o System Study o Software Requirement Specification o Software Analysis and Design o Test Case Design Two Reviews will be conducted after the Design and Testing Phases respectively.

MCA Curriculum 2008 CBCS Batch 2nd Version

Page 50

Thirty minutes will be allotted for each team for the review: o 20 minutes for Presentation. o 10 minutes for Queries. Evaluation Components Project Supervisor (Continuous Internal Assessment) Lab Preparation Two Reviews Artifacts Submissions External Assessment Product Demonstration Project Report 50 Marks 30 Marks Total 80 Marks 20 Marks 30 Marks 30 Marks Total 80 Marks

An External Examiner will conduct the Viva Voce along with the respective Project Supervisor for 20 marks each. The average mark (for 100) of the Project Supervisor and the External Examiner will be calculated and submitted to the controller of examiner. If a student fails in in-house software project then the student has to perform the set of activities required for it outside the class hours. The student has to appear for the review fixed by the department and should also appear for the semester exam viva voce.

MCA Curriculum 2008 CBCS Batch 2nd Version

Page 51

10. Software Project Final Semester


The Project work can be either carried out in a R&D section of any Industry / University / Institute. A Coordinator will be appointed by the Head of the Department to coordinate the Project Work. Internal guides from the department will be assigned to the students. As soon as a student joins a institution for the project work, he/she has to send the contact details of the organization and the external guide to the department (to the Internal Guide & the Project coordinator). o Project title and the Platform o Address of the Organization (Phone number, Fax number, E-mail address, URL) o Address for Communication (where the student stays during the project) o Telephone / Mobile number (Personal) / Personal E-mail ID. The duration of the project should be at least four month. Periodically (weekly) the students should be send project Task Report to their internal guide through mail Two Reviews will be conducted before the Final Viva-Voce. The Project work should be an independent one; if the project is a part of a bigger project, the students work should have a few independent modules. If more than one student is working on parts of the same project (big enough to share) the report of each student should be different and not two copies of the same report. Evaluation Scheme o Internal Guide (Continuous Assessment) o External Examiner Project Report 80 Marks 80 Marks

An External Examiner will conduct the Viva Voce along with the respective Internal Guide for 20 marks each. The average mark (for 100) of the Internal Guide and the External Examiner will be calculated and submitted to the controller of examiner.

If a student fails in final semester software project then the student has to perform the set of activities required for it. The student has to appear for the review fixed by the department and should also appear for the semester exam viva voce.

MCA Curriculum 2008 CBCS Batch 2nd Version

Page 52

11. RESEARCH DOMAIN ELECTIVE COURSES FOR MCA


RESEARCH DOMAIN-I RESEARCH DOMAIN II 1. OVERVIEW As the Department specializes on selected technologies such as Grid Computing, Open Source Software Technology, Language Technology, eLearning and Semantic Technology, students are invited to join these research groups during their second semester and they are provided an intensive training between
nd rd

2 and 3 semesters. Each group of students is assigned a problem in the area of their research and asked to develop a
th th

solution during 4 and 5 semesters. For their final project, these students may continue their research project or be directly placed in related Research Centres or Companies for project work and recruitment. Based on the research focus and problems posed, the students are expected to prepare an individual
th th

technical report (at least 100 pages) on the field of their study. Theme for Technical Report in 4 and 5 semesters will be different. Based on the technical report, a written and oral examination is conducted. Each student is expected to publish a paper in one of the national conferences or journals. In these research papers, they will present the outcome of their experiments and analysis. This course aims to achieve an understanding of the research challenges by assigned readings, technical report writing, discussions and presentations on the qualitative and quantitative aspects of the subject under study. Two research outputs shall be submitted by the students as their Research Portfolio namely Technical Report and Research Survey. An input session is given on research methodology for the selected students. 2. COURSE ELEMENTS a. RESEARCH METHODOLOGY Input Sessions shall be given for the students (at least 10 hours) in each semester to know the methodology for research work and apply the same. Semester IV : Research Objectives Motivations - Types of research Research approaches Significance of Research Research process Criteria for good research - GOOD STYLE AND PUNCTUATION - Economy Tone Motivation Balance voice Analogies Reference and citation Quotation- Acknowledgement Grammar Beauty Titles and headings ParagraphingSentence structure Choice of words Jargon Formatting. Semester V : EDITING, WRITING AND RESEARCH EXPERIMENTATION -Consistency Proof reading Scope of a paper Organization research Project Finding Research Literature Research Planning Reflections on research - Designing experiments Measurements and coding contribution - Evaluation of papers Plagiarism Intellectual properties - Authorship, Contentorganization.

MCA Curriculum 2008 CBCS Batch 2nd Version

Page 53

b. TECHNICAL REPORT Based on the research focus and problems posed, the students are expected to prepare the individual Technical Report (at least 50 pages) on the field of their study. The Technical Report (TR) is a comprehensive understanding of the subject through which students communicate their study of the subject. TR should present core understanding of the subject developed logically along clearly identified perspective. The TR must include the Concepts, Technology, Tools, and Application of the expounded topic. This report is worth 50% of the course. Theme for Technical Report in 4th and 5th semesters are different. c. RESEARCH SURVEY Research Survey (RS) focuses on a research problem related to the selected field of work. Students should pick a problem, gather materials on the research done in the field, discuss the current state of understanding on the topic and describe particular areas where progress appears possible. This paper is worth 50% of the course. The evaluation of the research paper is done by external reviewers along with the internal supervisor. Each student is encouraged to publish the survey paper in one of the national conferences or journals. 3. TOPICS FOR RESEARCH STUDY To facilitate students into the area of research, potential topics for study in each chosen field are given below. The students can choose one of these topics or suggest a relevant topic in consultation with the Research Supervisor. a. eLearning Impact of Web 2.0 in eLearning - Use of Digital media in development of eLearning Content - Use of Learning Objects- Development and delivery of asynchronous eLearning - Authoring tools to design and produce interactive learning content - Content management systems for eLearning - eLearning Project Management - Use of design processes for eLearning - Development and delivery of synchronous eLearning - Rapid e-Learning design and development - Use of complex media for eLearning - Measurement of academic and business results of eLearning - Design of modular learning objects - Asynchronous e-Learning Learner assessment - Use of authoring tools for design and production - Content Management Systems and reuse of content - eLearning Project management - Use of design processes in eLearning - Synchronous e-Learning - Instructor training in synchronous delivery skills - Work-share e-Learning development - Customizing, Personalizing and re-purposing learning content - Instructor-led classroom-based learning - Mobile eLearning b. Decision Support System Taxonomies in Decision System - Decision Theory and Modeling - Decision Systems Specific Application (Clinical, Spatial, Market Analysis etc.) - Domain-independent Decision System - Web Intelligence - Impact of Supporting Disciplines for DS (Cognitive, Communication, Computer, Management, System, and Organization Sciences, Multi-criteria Decision Making and Psychology) Decision System Development Framework - Web-based Decision System - Spreadsheet-based Decision System - Web Intelligence - Architecture of Decision System - Data management system - Model management system - Knowledge Engine - Decision System Application (Clinical, Spatial, Economic, Educational etc.) - Relationships between DS Subspecialties and Reference Disciplines - Multi-Criteria Decision Making - Contributions of Cognitive and other supporting science to the Development of DS Emergency and Disaster Management DS -Business-process management - Service-oriented Decision computing - Requirements engineering for DS - Conceptual modeling - Agent-Oriented Decision Systems - Constraint Programming - Knowledge Representation and Reasoning for DS c. Semantic Web and Ontologies Describing Web Resources using RDF - Axiomatic Semantics for RDF and RDF Schema - Direct Inference System for RDF and RDFS - Querying in SPARQL Using Web Ontology Language for Intelligent Systems - Monotonic Rules - Description Logic Programs (DLP) - Semantic Web Rule
MCA Curriculum 2008 CBCS Batch 2nd Version Page 54

Language (SWRL) - Nonmonotonic Rules - Ontology Development Methods and MethodologiesMethods for Re-engineering Ontologies Ontology Learning Methods Ontology Merging Methods ONIONS FCA Merge PROMPT Ontology Mapping Methods Ontology Evaluation Methods. d. Knowledge Management Connective knowledge methods and tools - Distributed knowledge management - Inter-enterprise knowledge management - Knowledge clusters (knowledge items into clusters) - KM in Ambient Intelligence - KM in Community based Collaborative Workplaces (online communities) - KM in Mobile Technologies - Eco-Knowledge in Information environments - KM standards - Knowledge Repositories (Proprietary and Open) - Expert Systems - Content Management System as Knowledge Base - KM Search Engines - Information Theory - KM for Digital Economy - Interdisciplinary KM Application (Cognitive Science Groupware - Library & Information Science - Document Management -Organizational Science). 4. EVALUATION SCHEME The following guidelines shall be applied in evaluation of technical reports and Research Papers. For the Students admitted from the year 2008-2009:

Content Technical Report (TR) Research Survey (RS) Test (CA) Viva Voce Regularity TOTAL

Internal Marks

Semester Marks 30 Marks 30 Marks

20 Marks 5 Marks 25 Marks

15 Marks 75 Marks

Evaluation of Technical Report and Research Survey are done on the basis of their scientific merit, effective presentation, and appropriateness for assignment. Student is rewarded based on thorough analysis, originality, and insightfulness found in the Technical Report. Scientific merit includes correctness, significance, novelty, non-triviality, and completeness. Students shall individually and periodically meet their Research Guide and shall maintain Minutes of the Meeting (MoM) describing their following activities: Review of Task, Points for Discussion, Resource Document (Output) and Action Item. The Technical Report and Research Survey Paper shall be sent for blind review to at least two external subject experts. The Head of the Department nominates the external subject experts (who are interested in the area of study) to review the students work by sending the work to them by email. Research Domain subjects will not have term-end examination, instead they have viva voce conducted by a committee of two examiners after the review of their works by the External Review Committee. Remunerations for the committee members will be as per the university norms. The viva voce will be conducted on the same day/time while the other Domain elective semester examinations are being conducted. The duration of viva voce for each student shall be at least 15 minutes. (8 minutes for presentation and 7 minutes for question and answers)
MCA Curriculum 2008 CBCS Batch 2nd Version Page 55

The Head of the Department will finally submit the cumulative of the following marks to the COE: Technical Report, Research Survey, Viva Voce. If a candidate fails he/she has to redo the course by paying for the examination fee along with the students of next batch and select a topic from the list of topics published by the department. The following norms shall be applied to evaluate the technical report and research survey paper by the internal guide as well as the external review committee.
Rank A (Outstanding) 4 points B (Good) 3 points C (Satisfactory) 2 points D (Needs Work) 1 point

(Scoring)

Criterion Precise, concrete, complex thesis; highly coherent argument Good thesis, but could be more specific; focused argument, but may lapse occasionally Weak, simplistic, and/or unclear thesis; lack of a strong focus to argument Vague and/or sloppy thesis; completely unfocused discussion

Focus of argument

Depth of analysis

-- Explores issue thoroughly and intelligently -- Examines issue from multiple perspectives -- Explores ideas and develops a clear position with insight and persuasive examples

-- Explores issue adequately and with some insight -- Supports a defined position with good examples -- Argument and/or examples weak in places

-- Defines an issue, but explores it inadequately -- Use of examples is inconsistent and/or significantly lacking

-- Doesn't adequately define or explore an issue -- Very weak support: poor and/or lack of relevant examples -- Lack of thoughtful development

MCA Curriculum 2008 CBCS Batch 2nd Version

Page 56

Integration of sources

-- Smooth and judicious integration of info. in argument -- Sources clearly relate to and support thesis -- Effective analysis/critique of sources -- Excellent balance b/t quoting and paraphrasing; emphasis on latter

-- Good integration of sources -- Sources relate to and support thesis, but inconsistently -- Sources are analyzed, but inconsistently and/or insufficiently -- OK balance b/t quoting and paraphrasing

--Inconsistent and/or sloppy integration of sources -- Sources only marginally support thesis -- Insufficient analysis of sources -- Inadequate balance b/t quoting and paraphrasing (too much quoting)

-- Poor integration of too few sources -- Sources don't support thesis -- Sources are "plopped in" without analysis

Organizati on

-- Clear and logical throughout -- Clear and forceful intro. -- Excellent transitions -- Focused paragraphs

-- Basically clear, with some lapses possible -- Adequate intro. -- Good transitions, but used inconsistently -- Generally focused paragraphs, with some lapses

-- Unclear: reader must work to discern organization -- Weakly developed intro. -- Inadequate use of transitions -- Many unfocused paragraphs

--Poor overall organ. -- Very weak intro. -- Lack of transitions -- High % of unfocused paragraphs

Mechanics and Style

-- Writer's voice is clear and strong -- Highly readable, fluid prose -- Sophisticated writing style -- Excellent grammar -- Careful editing

-- Writer's voice is somewhat overshadowed by sources -- Readable, generally clear prose -- Good grammar, with some errors -- Fair editing

-- Writer's voice is unclear, hard to discern -- Prose is often difficult to read -- Significant # and frequency of grammatical errors -- Weak editing

-- Prose is consistently unclear and difficult to read -- High # of errors -- Editing is poor or completely lacking

MCA Curriculum 2008 CBCS Batch 2nd Version

Page 57

Document ation

-- Excellent quoting and paraphrasing technique -- MLA style used consistently and correctly -- Complete and error-free works cited list

-- Good quoting and paraphrasing technique, with some lapses -- MLA style generally used well, allowing a few mistakes -- Good, but not perfect, works cited list

-- Just adequate quoting and paraphrasing technique, but many errors -- Fair works cited list, but with several errors

-- Poor quoting and paraphrasing technique -- MLA style not used in text -- Works cited list not in MLA format, alphabetical order, etc.

Rank

A (Outstanding) 6 points

B (Good) 5 points

C (Satisfactory) 4 points

D (Needs Work) 3 point

(Scoring)

Quality of research

-- Relevant, timely, and varied sources -- Excellent balance b/t scholarly and mainstream works -- # of sources exceeds minimum

-- Relevant and timely sources, but may be limited in scope -- Sufficient balance b/t scholarly and mainstream works -- # of sources at or above min.

-- Sources significantly lack in timeliness, scope, or relevance -- Clear lack of thorough research --Over reliance upon popular works -- Min. # of sources consulted

-- Dated and/or irrelevant sources -- Lack of fundamental research -- Lack of scholarly sources -- Min. # or fewer sources consulted

MCA Curriculum 2008 CBCS Batch 2nd Version

Page 58

12. Evaluation & Certification


Maximum marks for each course is spelled out in the Programme Structure. The weightage of continuous internal assessment for the courses with end semester examination is 25%. Other courses such as Field Work, Workshops, Seminars and some Practicals have only internal assessment. 12.1 Continuous Assessment S. No. 1 Course Type Lectures with Tutorials Internal Components 2 CA Tests Paper Work Seminars / Tutorials 2 CA Tests Paper Work/Tutorials Lab Exercises Programming Lab Exercises CA Test Participation Technical Report Final Presentation Report Presentation Marks 15 05 05 10 05 10 30 10 20 40 40 60 40 Total 25

Lectures with Tutorials and Practical

25 40 100 100

3 4

Practical Field Work/Workshops/Seminar

Information Literacy

12.2 CA Tests The time duration for the examination is 2 Hrs. The question paper format is: Section A Answer ALL Questions. [Six questions] 6 x 3 = 18 Section B Answer ALL Questions. [Internal Choice, three questions] 3 x 9 = 27 Section C Answer any TWO Questions. [Two out of Three questions.] 2 x 15 = 30

12.3 End-Semester Examinations 12.3.1 Theory The time duration for the examination is 3 Hrs. The question paper format for the end-semester examination is: Section A Answer ALL Questions. [At least two question from each unit] 10 x 2 = 20 Section B Answer ALL Questions. [Internal Choice, one question from each unit] 5 x 5 = 25 Section C Answer THREE Questions out of FIVE questions. [Atleast one question from each unit] 3 x 10 = 30

MCA Curriculum 2008 CBCS Batch 2nd Version

Page 59

12.3.2 Practical Courses For each practical course, a question bank is prepared at the introduction of the course committee of utmost three staff members. by a

The Committee prepares the questions and reviews them through regular meetings in consultation with the Controller of Examinations. Utmost 3 meetings can be conducted for a single course. Office of the Controller of Examinations will provide sitting charges for the members of the committee. The Head of the Department will submit the Question Bank to the controller of Examinations within three months of the introduction of the course from the beginning of the new academic year. The Controller can select the questions for every batch of the practical examinations as per the number of candidates. Each question must be separated from the given questions provided by the Controller and must be pasted on the answer paper in such a way that, each answer paper is pasted with only one question. The answer paper pasted with question must be displayed, without showing the questions to the students. The students should select only one answer paper pasted with question and solve the problem. No question must be prescribed by the examiner, other than the questions provided by the Controller. All questions given for batch must be used for that batch only. Question Paper Pattern Time: 3 Hrs. Max. Marks: 50 + 10 (10 for Record)

Each student will get a single question to be answered. The question will have two subdivisions. (2 x 25 = 50) First part, shall contain questions from the exercise list and the second part will present an unexplored problem to be solved. The problem should be addressed using at least 3 technical features of the respective Technology stream. No more than three candidates should get the same question in a batch.

12.3.3 Software Project Work [I, II, III, and IV] Refer Section 10 and Section 11 for the Evaluation scheme. 12.3.4 Research Domain Refer Section 12 for the Evaluation scheme. 12.3.5 Valued added Courses from the placement cell [Communication Skills, Software Documentation and Quantitative Aptitude Techniques] If a student fails in any one of the courses then he/she has to apply for it in the subsequent semester and redo the set of activities required for it after getting the permission from the head of the department and the placement officer. If the student has a attendance below 55% then he has to redo the course along with the next batch. -End of Curriculum-

MCA Curriculum 2008 CBCS Batch 2nd Version

Page 60

Vous aimerez peut-être aussi