• Tidak ada hasil yang ditemukan

R19 MCA

N/A
N/A
Protected

Academic year: 2023

Membagikan "R19 MCA"

Copied!
99
0
0

Teks penuh

Foundations Logic and Proofs: Propositional logic, Applications of propositional logic, propositional equivalence, predicates and quantifiers, relative quantifiers, rules of inference, introduction to proofs, proof methods and strategies. The purpose of the course is to introduce the principles of computer organization and basic architectural concepts. Introduction to C Language: Background, simple C programs, identifiers, basic data types, variables, constants, input/output, operators.

Data Structures: Introduction to Data Structures, Abstract Data Types, Linear List – Implementation of Singly Linked Lists, Insertion, Deletion and Lookup Operations on a Linear List, Stack-Operations, Array and Linked Stack Representations, Stack Applications, Queue-Operations, Arrays and related presentations. Continuous probability distributions: continuous uniform distribution, normal distribution, areas under the normal curve, applications of normal distribution, normal approximation of binomial, gamma and exponential distribution, chi-square distribution, beta distribution, log normal distribution. Introduction to linear regression, simple linear regression model, least squares model and fitted model, properties of least squares estimators, inference of regression coefficients, prediction, selection of regression model, analysis of variance approach, test of linearity Regression: data with repeated observations, correlation.

Basics of communication - Principles of communication - Types of communication - Phases of communication - Verbal and non-verbal communication - Communication channels - Barriers to effective communication - Formal and informal expressions in different situations. CALL Lab: Introduction to Phonetics – Speech Sounds – Vowels and Consonants ICS Lab: Ice Breaker Activity and JAM Session.

Computer Assisted Language Learning (CALL) Lab

CALL Lab: Neutralizing the influence of mother tongue and conversation practice ICS Lab: Information transfer- Oral presentation skills.

Interactive Communication Skills (ICS) Lab

Of the 30 points, 20 points are awarded for daily work and 10 points for performing internal laboratory test(s). The end-of-year exam is taken by the relevant lecturer with the help of another member of staff from the same department of the same institution. The Fibonacci sequence is defined as follows: the first and second terms in the sequence are 0 and 1.

Write a C program to generate all prime numbers between 1 and n, where n is a value given by the user. Note: File name and n are given in command line.) 22. i) Write a program in C to display the contents of a file. ii) Write a C program to merge two files into a third file (ie the contents of the first file followed by the contents of the second are inserted into the third file). Write a C program that implements the following sort methods to sort the given list of integers in ascending order.

To introduce the connection of a computer to the Internet from home and the workplace and the effective use of the Internet, the use of web browsers, e-mail, newsgroups and discussion forums. Draw a block diagram of the CPU along with the configuration of each peripheral and submit it.

Every student should identify the peripherals of a computer, components in a CPU and its functions. Draw the block diagram of the CPU along with the configuration of each peripheral and submit

The IT Workshop is a training lab course to get training on computer hardware, Internet and World Wide Web, and productivity tools for documentation, spreadsheet calculations and presentation. To introduce a personal computer and its basic peripherals, the process of assembling a personal computer, installation of system software such as MS Windows, Linux and the required device drivers, hardware and software level troubleshooting process. To gain knowledge in awareness of cyber hygiene, that is to protect the personal computer from contamination with the viruses, worms and other cyber attacks.

To introduce the use of productivity tools in the design of professional word documents, excel spreadsheets and power point presentations using open office tools and LaTeX.

Every student should individually install operating system like Linux or MS windows on the personal computer. The system should be configured as dual boot with both windows and Linux

Exercises on Productivity Development

Exercises on Personality Development Skills

Exercises on Professional Etiquette and Communication

The output of the program should indicate whether or not the triangle is a right triangle (Recall from the Pythagorean Theorem that in a right triangle, the square of one side is equal to the sum of the squares of the other two sides). The contents of the first file must be inserted and written to the second file. The program should print all unique words in the file in alphabetical order.

Create an Android app that shows Hello + name of the user and run it on an emulator. Develop an application that shows names as a list and when you select a name it should show the details of the candidate on the next screen with a "Back" button. Develop an application that inserts some notifications in the Notification area and when a notification is inserted it should show a toast with details of the notification.

Develop an app that displays all phone contacts along with details like name, phone number, mobile number, etc. Discover interesting patterns, analyze supervised and unsupervised models, and evaluate the accuracy of algorithms. Data Analytics: Introduction to Analytics, Introduction to Tools and Environment, Use of Modeling in Business, Databases and Data Types and Variables, Data Modeling Techniques, Missing Imputation, etc.

To provide knowledge of concepts in software testing such as testing process, criteria, strategies and methodologies. Ability to understand the state of the art research in the emerging topic of Ad Hoc and Wireless Sensor Networks. Introduction to Ad Hoc Networks - Characteristics of MANETs, ​​Applications of MANETs and Challenges of MANETs.

Gain knowledge about the use and availability of tools to support an ethical hack 2. Gain knowledge about the strengths and weaknesses of Perl, PHP, TCL and Python; and choose an appropriate language to solve a given problem. Artificial Intelligence and SoftComputing- Behavioral and Cognitive Modeling of the Human Brain- Amit Konar, CRC Press, Taylor and Francis Group.

The aim of the course is to enrich the previous knowledge of database systems and expose the need for distributed database technology to confront the shortcomings of the centralized database systems. Demonstrate knowledge of the basic concepts of two-dimensional signal acquisition, sampling, and quantization.

Referensi

Dokumen terkait

Berdasarkan pada Gambar 3.2, secara prinsip, IoT Platform ini bekerja dengan mengambil data pengukuran di lingkungan menggunakan IoT Device, mengirimnya melalui IoT Platform

Internet of Things IoT for Automated and Smart Applications 4.3 Supporting community involvement of people with different living functions by using a daily life database If we can