• Tidak ada hasil yang ditemukan

R20 MCA Syllabus JNTU HYDERABAD

N/A
N/A
Protected

Academic year: 2023

Membagikan "R20 MCA Syllabus JNTU HYDERABAD"

Copied!
61
0
0

Teks penuh

Foundations Logic and Proofs: Propositional logic, applications of propositional logic, propositional equivalence, predicates and quantifiers, nested quantifiers, rules of inference, introduction to proofs, proof methods and strategy. Introduction to C Language: Background, Simple C Programs, Identifiers, Basic Data Types, Variables, Constants, Input/Output, Operators. Data Structures: Introduction to Data Structures, Abstract Data Types, Linear List – Implementation of Singly Linked Lists, Insertion, Deletion and Lookup Operations on a Linear List, Stack-Operations, Array and Linked Stack Representations, Stack Applications, Queue-Operations, Arrays and related presentations.

Numbers - Introduction to numbers, integers, floating-point real numbers, complex numbers, operators, built-in functions, related modules. Exceptions as Strings, Generating Exceptions, Assertions, Standard Exceptions, *Creating Exceptions, Why Exceptions (Now)?, Why Exceptions at All?, Exceptions and the Sys Module, Related Modules Modules: Modules and Files, Namespaces, Import Modules, Import Module Features , built-in functions of module, packages, other features of modules.

For example, the formula doesn't make sense for negative exponents - if n is less than 0. Your program should print an error message if n<0, then go back and read the next pair of numbers without calculating the sum. The 2's complement is obtained by scanning it from right to left and complementing all the bits after the first occurrence of 1. Thus, the 2's complement is 11100 00100.

Write a python program to define a module and import a specific function in that module into another program. The contents of the first file must be entered and written to the second file. The program should print all unique words in the file in alphabetical order.

Introduction to database design: database design and ER diagrams, entities, attributes and entity sets, relationships and relationship sets, additional functions of the ER model, conceptual design with the ER model. Introduction to the relational model: integrity constraints about relationships, integrity constraint enforcement, querying relational data, logical database design, introduction to views, destroying/modifying tables and views. The aim of the course is to give the students a general overview of the concepts and fundamentals of computer networking.

To familiarize the students with the standard models for the layered approach to communication between machines in a network and the protocols of the different layers. Get the knowledge of the functions of each layer in the OSI and TCP/IP reference model. Introduction to data mining: introduction, what is data mining, definition, KDD, challenges, data mining tasks, data preprocessing, data cleaning, missing data, dimensionality reduction, feature subset selection, discretization and binaryzation, data transformation; Measures of Similarity and Inequality - Basics.

Web and Text Mining: Introduction, Web Mining, Web Content Mining, Web Structure Mining, We Use Mining, Text Mining – Unstructured Text, Discovery of Episode Rules for Texts, Hierarchy of Categories, Text Clustering. The aim of the course is to provide an understanding of the working knowledge of the techniques for estimation, design, testing and quality management of large software development projects. Introduction to Software Engineering: The Evolving Role of Software, Changing Nature of Software, Software Myths.

An overview of the process: Software engineering - a layered technology, a process framework, capability maturity model integration (CMMI), process models, process evaluation, personal and team process models. Product metrics: Software quality, analysis model metrics, design model metrics, source code metrics, testing metrics, maintainability metrics. Although the data is German, you should probably use it for this task.

Introduces the principles of inheritance and polymorphism; and demonstrates how they relate to the design of abstract classes. Try debugging step by step with a small program of about 10 to 15 lines that contains at least one if else condition and a for loop. Write a Java program to create an abstract class called Shape that contains two integers and an empty method called printArea().

Provide three classes named Rectangle, Triangle, and Circle, with each of the classes extending the Shape class. Each of the classes contains only the method printArea (), which prints the area of ​​the given shape. The division of Num1 and Num2 appears in the Result box when you click the Divide button.

If Num1 or Num2 were not an integer, the program would throw a number write exception. The first thread generates a random integer every 1 second and if the value is even, the second thread calculates the square of the number and prints it. If the value is odd, the third thread will print the value of the cube of the number.

The program lets the user select one of three lights: red, yellow or green with radio buttons. Write a Java program that handles all mouse events and displays the event name in the center of the window when a mouse event is fired (Using Adapter Classes). Write a Java program that handles all keyboard events and displays the event name in the center of the window when a mouse event is triggered (Use Adapter classes).

Introduction to PHP: Declaring variables, data types, arrays, arrays, operators, expressions, control structures, functions, Reading data from web form controls such as text boxes, radio buttons, lists, etc., Handling file uploads. XML: Introduction to XML, Defining XML tags, their attributes and values, Defining Document Types, XML Schemas, Document Object Model, XHTML Data Principle XML – DOM and SAX parsers in java. Introduction to Servlets: Common Gateway Interface (CGI), Lifecycle of a Servlet, Deploying a Servlet, Servlet API, Reading Servlet Parameters, Reading Initialization Parameters, Handling Http Requests and Responses, Use of cookies and sessions, connection to a JD database.

Introduction to JSP: Anatomy of JSP Pages, JSP Processing, Declarations, Directives, Expressions, Code Snippets, Implicit Objects, Using Beans in JSP Pages, Using Cookies and Sessions for Session Tracking, Connecting to a Database in JSP. Introduction to IoT: Definition and Characteristics of IoT, Physical Design of IoT - IoT Protocols, IoT Communication Models, IoT Communication APIs, IoT Enabled Technologies - Wireless Sensor Networks, Cloud Computing, Big Data Analytics, Communication protocols, embedded systems, IoT layers and domain-specific IoT propositions – home, city, environment, energy, retail, logistics, agriculture, industry, health and lifestyle. Introduction to Python: Python language features, data types, data structures, flow control, functions, modules, packaging, file handling, data/time operations, classes, exception handling, Python packages - JSON, XML, HTTPLib, URLLib, SMTPLib.

IoT Physical Devices and Endpoints: Introduction to Programming Raspberry PI-Interfaces (serial, SPI, I2C) – Python program with Raspberry PI with focus on interfacing external devices, controlling output, reading input from pins. IoT Physical Servers and Cloud Offerings: Introduction to Cloud Storage Models and Communication APIs Webserver – Web Server for IoT, Cloud for IoT, Python Web Application Framework Designing a Smooth API in the Internet. Christopher D Manning, Prabhakar Raghavan, Hinrich Schutze, An Introduction to Information Retrieval Cambridge University Press, England, 2009.

Ability to understand the state of the art research in the emerging topic of ad hoc and wireless sensor networks. Introduction to Ad Hoc Networks: Characteristics of MANETs, ​​Applications of MANETs and Challenges of MANETs. Introduction To Cybercrime: Introduction, Cybercrime And Information Security, Who Are Cybercriminals, Classifications Of Cybercrime And Cybercrime: The Legal Perspectives And The Indian Perspective, Cybercrime And The Indian ITA 2000, A Global Perspective On Cybercrime.

Create an Amazon EC2 instance and set up a web server on the instance and associate the IP address with the instance.

Paul Dietel and Harvey Deitel," Java How to Program", Prentice Hall of India, 8th ed.

Business Revenue Models: Revenue Models for Online Business, Changing Strategies: Revenue Models in Transition, Revenue Strategy Issues for Online Businesses, Creating an Effective Business

Various remedies available under the Information Technology Act for violation and commission of offenses in cyberspace. International best practices and various legal mechanisms to control various offenses in cyberspace. Introduction to Cyberspace: UNCITRAL Model Law - Information Technology Act, 2000 with recent amendments - Jurisdictional issues - Digital signatures - Regulation of - Certifying authorities - Cyber ​​Regulation Appellate Tribunal.

Online contracts: Formation of online contracts - E-banking transactions, online payment options, online advertising - Electronic and digital signatures - Tax issues in cyberspace - indirect taxation, tax evasion, double taxation, international taxation, permanent establishment - Protection of trade secrets and deceptive commercial practices. Cybercrime: understanding cybercrime - actus reus and mens rea - Types of crimes on the internet against persons, against property, against government - Digital evidence - investigation and trial of cybercrime in India - cyber arbitration, investigation into cyber conflict. Intellectual Property Rights (IPR) and Cyberspace: Copyright Issues on the Internet - Computer Software Protection, Caching, International Regime OSS, DMCA, Data Protection Directive - Trademark Issues on the Internet - Domain Name Registration, Domain Name Registration, Domain Name Dispute, ICANN, UDRP Policy, Linking, Framing , tagging - Database problems on the Internet.

The Concept of Privacy: Historical and Cultural Perspectives, Meaning and Scope of Privacy, Critiques of Privacy, Right to Privacy – Louis Brandeis and Samuel Warren, Modern Principles of Privacy Law, Legal Regimes to Protect Privacy, Privacy as a Legal Right , privacy – Human rights angle, threats to privacy in new technological regime, digital and internet privacy challenges. Assess the impact of the Internet and Internet technology on business-electronic commerce and electronic business. Understand the classifications of MIS, understanding of functional MIS and the various functionalities of these MIS.

Introduction to IS models and types of information systems: Nolan Phase Hypothesis, IS Strategic Network, Wards Model, Earl's Multiple Methodology, Critical Success Factors, Soft Systems Methodology, Socio-Technical Systems Approach (Mumford), End-of-Life Cycle Development System and Prototyping User calculation, application packages, outsourcing, method combination deployment. It enables students to learn the basics of Entrepreneurship and business development that will help them provide vision for their Start-up. Entrepreneurship Perspectives: Introduction to Entrepreneurship – Evolution - Concept of Entrepreneurship - Types of Entrepreneurs - Entrepreneurial Competencies, Capacity Building for Entrepreneurs.

Referensi

Dokumen terkait

Internet of Things IoT for Automated and Smart Applications 4.3 Supporting community involvement of people with different living functions by using a daily life database If we can