This action might not be possible to undo. Are you sure you want to continue?
Proposed syllabus For T. Y. B. Sc. Computer Science (To be Implemented from June, 2010)
TYBSc Computer Science Syllabus
• There are 4 units in each paper. The detailed references of books are either mentioned at the respective topics or at the end of the paper. • It is expected that the question paper will have 5 questions as given below – Questions Q1 Q2 Q3 Q4 Q5 Term I Based on Units 1, 2, 3 & 4 Based on Unit 1 Based on Unit 2 Based on Unit 3 Based on Unit 4 Total Maximum Marks* (For Paper I, II,III &IV) 20 20 20 20 20 100 Maximum Marks* (For AC1 & AC2) 12 12 12 12 12 60
* In papers I to IV, maximum marks with options should be set for 30 marks with internal options and for AC1 & AC2, maximum marks with options should be set for 18 marks with internal options. • Syllabus details gives list of practicals with minimum number of practicals to be performed. • For the purpose of examination, the break-up of total marks of practical will be as follows – A) Main Subject Practical Examinations – Experiment I (Group I Practical) Experiment II (Group II Practical) Experiment III (Group III Practical) Experiment IV (Group IV Practical) Project Journal(Group I To III) & Viva voce on Journal
: : : :
45 marks 45 marks 45 marks 50 marks
15 marks --------------200 marks
B) Applied Component Practical Examination Experiment I (Group I AC) : Experiment II (Group II AC) : Journal(Group I & II) & Viva voce on Journal
35 marks 35 marks
10 marks --------------80 marks
Note : Each student must maintain a record of experiments and project performed as per syllabus and must bring a certified journal and project report duly signed by the teacher concerned and HOD at the time of final examination. • The Bachelor of Science BSc with Computer Science course has the status as one of the subject at the BSc course. It is further clarified that adequate laboratory staff are required for conduct BSc Computer Science practicals, on the same pattern as with the other science subjects such as physics, chemistry etc. For smooth conduct of practicals at FY, SY and TYBSc computer science, a minimum of 1 lab assistant and a minimum of 1 lab attendant be provided for each lab, each session, during entire period of laboratory practical session.
Subject Title Data Communication, Networking & Security
No. Of lectures 120 (4 lectures per week)
Theory Marks 100 (3 Hr Exam)
120 (4 lectures per week)
100 (3 Hr Exam)
Operating Systems & Linux
120 (4 lectures per week)
100 (3 Hr Exam)
DBMS II and Software Engineering
120 (4 lectures per week)
100 (3 Hr Exam)
Practical Marks Group I 50 Linux and Database (4 lab lectures per batch per week) Group II 50 Advanced Java (4 lab lectures per batch per week) Group III 50 Elements of Software Engineering and Project Management (4 lab lectures per batch per week) Group IV 50 Project (4 lab lectures per batch per week)
Applied Component Subject Title Principles of Web Design and Web Technologies No. Of lectures 60 (2 lectures per week) Theory Marks 60 (3 Hr Exam) Practical Marks Group I– AC 40 Web Technologies (2 lab lectures per batch per week) Group II. paper I and II (of 6 units) and group III and group IV practicals(of 6 units) course will form the course contents. .AC 40 Dot Net Technologies (2 lab lectures per batch per week) Total Marks AC I 100 AC II Dot Net Technologies 60 (2 lectures per week) 60 (3 Hr Exam) 100 Note: For students offering 3 units of computer science at TYBSc .
Selective Repeat ARQ. PPP Transition states Multiple Access – Random(CSMA). OSI & TCP/IP Models. Addressing Physical Layer – Signals. Bridged. Data Communication & Networking (Forouzan)– IV Edition Demo : 1. Checksum Data Link Control & Protocols – Framing. Concept of MBaseN Ethernet. Demo session can be either Physical/Audio-Video/Online Demo Unit I (30 lectures) Introduction . Concept of Virtual circuit networks. Block Coding. Crimping 3. QAM). Networking & Security Note : 1. 3G cellular telephony Connecting Devices – Repeaters. 2G. Addressing. Analog VS Digital. PCM. 3. Spanning tree algorithm. Cyclic codes. Types of errors. TDMA. data rate management). Stop-N-Wait ARQ. Students can be made familiar with practical aspects by conducting demo sessions 2.Data Communication. Cellular telephony. Digital. PPP. 5. Spread Spectrum – FHSS. Switched. Data Rate Limits. Datagram networks. Biphase). Cross cable and its use. Concept of Fast & Gigabit Ethernet Wireless LAN . Concept of 1G. CRC Polynomial & its degree. Transmission Modes. DSSS Transmission Media – Guided & Unguided Switching – Switching. Backbone networks. Ethernet frame. Simplest. Bridges. Detection VS Correction. Internet. Hidden. Token Passing). Piggybacking HDLC & PPP– HDLC Modes. Gateways. MAC. 2. Polar. Chapters (1. Polling. Linear Block codes(single parity check. Circuit-Switched Networks. Concept of VLAN Network Layer –Logical addressing. Demo of various types of cables[if available]. Synchronous TDM(time slots & frames. Stop-N-Wait. Transmission Impairment. WDM. Ethernet. Analog. Analog to Analog conversion Multiplexing – FDM.Introduction to WLAN(Architecture. Introduction to Bluetooth & Architecture. Routers. NAT. Intranet. bandwidth. Flow & Error Control. Controlled(Reservation. 7. Exposed Station Problem). HDLC Frames. structure of circuit switch & packet switch. interleaving. Protocols. 9) . Concepts of DSL & ADSL References 1. Two & Three layer Switches. IPv4 Addresses. Demo of installing NIC cards.PSK. Hubs. hamming codes). Networks. 8. Classful & Classless addresses. Channelization(FDMA. Analog Transmission – Digital to analog conversion(ASK. Min. Block Coding(4B/5B Encoding). Hamming Distance. 6. 4. topology. CDMA) Wired LAN – LLC. IPv6 Addressing. Full Duplex Ethernet. CRC Encoder & Decoder. switches] Unit II (30 lectures) Data Link Layer –Error correction & detection. Go Back N ARQ.FSK. Study of lab network [type of network.Paper I Data Communication. LAN Settings such as IP Address 2. Analog to digital conversion. Performance Digital Transmission – Line Coding (Unipolar.
BOOTP.DNS. 22. Proxy etc 2. 7. References: 1. security attacks. 26. Key Management Network Security: Security at Application Layer (E-MAIL. Intrusion detection (Host based. Firewall and Intrusion Detection: Firewalls and their types.4) . Data Communication & Networking (Forouzan)– IV Edition – Chapter(10. WWW. (1. Digital Signature. types of routing. 188.8.131.52. Remote Logging(Telnet). Cryptography: Traditional and Modern Symmetric-Key Ciphers. FTP. arp. 15. IPv4.5. 13. Asymmetric –Key Cryptography. traceroute etc [ commands will depend on OS ] 4. security services and mechanisms. Concepts of OSPF.1-18. routing tables. Transition from IPv4 to IPv6. Intruders. 3. IPv6 Protocol & Packet format.3. Security at Network Layer (IPSec). Behrouz A. 23. DES and AES. Useful Browser Settings Unit IV[30 lectures] Introduction: Introduction to system and network security. 6. QoS and Flow Characteristics Application Layer .1-10. 18. BF: “Cryptography & Network Security”. 10. route.Data traffic. BGP & Multicast Routing Transport Layer . Hacking. 8. 17.1. DNS addresses. DMZ. 12. Congestion.References 1. SMTP. Security at Transport Layer (SSL and TLS). netconfig. 21. ipconfig. Message Digest.1-5. 15. RIP. Security policies and plan.1-6. IPv4 VS IPv6.1-1. UDP.6. 11. HTTP References 1. Routing Protocols . 11. Malicious software and Internet Security: viruses and related threats. IDS. DHCP. 24.116. Study of commands such as ping.1-17.3. netstat. Closed Loop & Congestion control in TCP).1-13. Limitations of firewalls. Unicast Routing protocols. sharing files/folders and printers 3. TCP Congestion Control & Quality of Service. Accessing machines in networks. Forouzan.4. Subnet mask.Delivery. PGP and S/MIME).2. 27) Demo : 1. forwarding. Data Communication & Networking (Forouzan)– IV Edition (Chapters 20. modems/routers etc installed in lab] Unit III (30 lectures) Network layer protocol – Internetworking.Process to process delivery. routing. Unicast Routing. 25.4. Distributed).5.2. 14. 5. denial of service attacks. Gateway Address. 13.1-7. Networked.1-3.1-15. Study of network connectivity devices[switches. 16. Address Resolution protocols(ARP. Strategies for a secure network. RARP). 19) Demo : 1. Study of LAN Settings such as IP Addr. 8. Tata McGraw-Hill. Congestion Control(Open Loop. virus countermeasures. IPv4 protocol packet format. 11. RSA and ELGAMAL cryptosystems.4.
1-3.1-1. WS: “Network security essentials-applications and standards”. Computer Networks (4th Edition) .10.6.2. and Sybex Inc. 6.(1.3) 3.Andrew Tanenbaum 3. Enabling/Disabling ports 3. Antivirus software and its settings 2.3.1-6.5.2. 11.1-10. Introduction to cyber crime and cyber law Additional References 1. Networking Complete by Sybex Inc. 3.1-9. Tata McGrawHill. Setting firewalls. 8.4.Douglas Comer 2.2.1-11.1-8. 7. Atul Kahate. . 9. 2. AC: “Cryptography and Network Security”. Computer Networks and Internets (5th Edition) .1-2. Demo 1.1-184.108.40.206. Pearson Education. 5. William Stallings. Edition.1-5.
Creating Dynamic Content. Connecting to a Server. Ch 25 of Ref 4. Pane. References Ch 3 of Ref 2. Unified Expression Language. Types of JDBC Drivers. Steps involved in running the RMI application. JScrollPane. Ref 7 Ch 13 of Ref 5. Initializing a Servlet. Ch 4 of Ref 2 UNIT II: (30 Lectures) Threads and Multithreading. Transferring Control to Another Web Component. Servlet Life Cycle. Working with URL. Navigating the ResultSet object’s contents. Filtering Requests and Responses. Parameter Passing in Remote Methods. Including an Applet. Accessing Network interface parameters. Synchronizing threads. The JDBC Exception classes. The Example JSP Pages. JComponent Class. Ch 8 of Ref 2. Creating RMI application. Accessing the Web Context. Toolbars. Data Manipulation (using Prepared Statements. Sending E-Mail. Creating Static Content. Features of the Java Foundation Classes. Data navigation. Implementing Servers. . Ch15 of Ref 5. JavaBeans Components. JDBC Introduction. Tables and Trees. Scrollbars. Posting Form Data. Labels. Transactions. Ch 5 of Ref 2. Reusing content in JSP Pages. Thread-safe variables. Stored Procedures). JavaBeans Concepts. References Ch 5. Ch 9 of Ref 6. RMI Architecture. Overview of Networking. Menus. Socket Programming. Using NetBeans GUI Builder Writing a Simple Bean. Manipulating records of a ResultSet object through User Interface . Using Custom tags. Buttons. Ch 11 of Ref 6 Ch 16 of Ref 5. Implementing Action interface. Ref 7 Unit III: (30 lectures) What Is a Servlet? The Example Servlets. The Life Cycle of a JSP Page. Cookies. Joins. Ch 11 of Ref 6. Dialog Boxes. Overview of Understanding the Sockets Direct Protocol. Serving multiple Clients. Invoking Other Web Resources. and Panels. Maintaining Client State. Swing API Components. Printing with 2D API and Java Print Service API. Sharing Information. Communication between threads. Creating the Service Threads. URL Connections. Finalizing a Servlet. Windows. JDBC Architecture. Creating and running threads. Desktop pane. Colors and File Choosers. RMI Registry Service. Distributed Object Technologies.sql package. Writing Service Methods. Database Connectivity. Text-Entry Components. The Lifecycle of a thread. Schedules Tasks using JVM. Ch 8 of Ref 6.Paper II Advanced Java UNIT I: (30 Lectures) Introduction to JFC and Swing. Lists and Combo Boxes. The Connectivity Model. RMI for distributed computing. Using RMI with Applets. The java. What Is a JSP Page?. 7 of Ref 6 Ch10 of Ref 5. Properties: Simple Properties. Check Boxes. Introduction to distributed object system. Internet Addresses.
The Java EE 5 Tutorial. Session Bean: State Management Modes. . References Ch 20. Fifth edition. Herbert Schildt. Benefits of EJB. Gary Cornell. The Contents of an Enterprise Bean. The Life Cycle of a Message-Driven Bean Building Web Services with JAX-WS: Setting the Port. Cay S. Thomson Course Technology (SPD). Java Programming: Advanced Topics. Horstmann. Ref 7 Unit IV: (30 lectures) Introduction to EJB. 2001 (ISBN: 0-13-092738-4) 3. Second Edition. Bryan Basham. The Life Cycle of a Stateful Session Bean. The Life Cycle of a Stateless Session Bean. BPB Publications. Local Interfaces and ContainerManaged Relationships. 2003 4. Ch 7. Naming Conventions for Enterprise Beans. 2004 7. Third Edition. Ch 14 of Ref 6. Ch 2. Message-Driven Bean. Third Edition. Types of EJB. Bert Bates. Defining Client Access with Interfaces: Remote Access. Ref 7 References: 1.8. Pearson Education. Differences between Session Beans and Message. Revised Edition. Ref 3. Kathy Sierra. 2002 (ISBN 007-049543-2) 5. Ref 7 Ch 4 of Ref 3.4 of Ref 1. Web Service Clients. Core Java™ 2: Volume II–Advanced Features Prentice Hall PTR. Head First Servlets and JSP. Eric Jendrock.References Ch 3 of Ref 3. The Java Tutorials of Sun Microsystems Inc. Deciding on Remote or Local Access.3. 2006 6. Tata McGraw-Hill.9 of Ref 1. Jennifer Ball. Web Enabled Commercial Applications Development Using Java 2. Joe Wigglesworth and Paula McMillan. D Carson and others. Creating a Simple Web Service and Client with JAX-WS. O’reilly (SPD). The Life Cycles of Enterprise Beans. Java2: The Complete Reference. Method Parameters and Access. 2008 2. Local Access. Ivan Bayross.Driven Beans.
4. Operating System for Client Server & Peer-to-Peer Systems. 5] Unit II: (30 lectures) Classical Problems of Process synchronization: Producer-Consumer problem for infinite and bounded buffers and its bounded buffer solution using Semaphore monitor and messages Reader-writer problem and its solutions with readers’ priority and writers’ priority. scheduler and its types. Binary semaphores. Different Services of Operating System Operating System for Main frame Computer Systems: Batch Processing Systems. Process states: two state and five state model. processes & resources. Dinning-Philosophers Problem and its solutions Concurrency and Deadlock: Deadlocks and their Characteristics. Main memory Management. [SG: Chapters 1. File Management. message passing. Need for Mutual Exclusion. concurrent processes. Introduction to Virtual memory. Classifying process interactions and Achieving mutual exclusion: Dekker’s Algorithm. Demand . I/O Management. Tools for process synchronization: Semaphores. Time-Sharing System. user and kernel threads. message passing: their use & implementation for mutual exclusion. 6 and WS: Chapter 3. Kernel based approach. Multiprocessing and Multitasking. Evolution of Operating System. Two and multiple process solutions. General structure of a typical process. Cooperating processes Interprocess Communication and light weight process: Direct & indirect communication. CPU scheduling algorithms. Contiguous memory allocation. synchronization. multithreaded models. Need for Process switching. monitors. Segmentation with paging. 5. Operating System for Multiprocessor Systems and Distributed Systems. Secondary storage Management. queuing diagram. Peterson’s Algorithm and their final correct solution for two processes. Threading issues. Operating System Services. Clustered Systems. process synchronization. Banker’s algorithm. Creation of threads CPU Scheduling and Process synchronization: Need for Process scheduling. Recovery from deadlock. Scheduling queues. Operation on processes.Paper III Operating Systems and Linux Unit I: (30 Lectures) Introduction: Overview of Operating System. Resource Allocation Graph. Interface between user and Operating System. Micro programmed Systems. Understanding Multiprogramming. Threads. process control block and its role. 3. process description. context switching. Memory management: Memory Management and its need. Introduction to System calls: Types of system calls System programs and Operating System Structure: Layered approach. Deadlock detection and avoidance: safe and unsafe state. Critical Section Problem and its solutions. methods of handling deadlocks. Real time Operating System Components of Operating System: Process Management. Process Management: Introduction to Process. Operating system design and Implementation. 4. buffering. single & multithreaded processes. resource allocation algorithm. Command Interpreter. swapping technique. Paging and Segmentation. Deadlock prevention techniques.
Using command aliases. Sharing files. Design Principles. (RB: Chapter-9) . Locating system environment variables. (SD: 2. polling. 13 14. File System: File Concept: attributes. File system.Abraham Silberschatz. (RB: Chapter-4) The Linux environment variable: Environment variables. WS: “Operating Systems”. Allocation methods. . Need for page replacement. Performing math. Archiving. Directory implementations.8) Linux Basics: Looking into the Linux Kernel. Pearson-Prentice Hall. the case command. GNU Utilities. TW: “Operating Systems”. Shell prompt. File access methods. . SG: “Operating System Concepts”.paging technique. Removing environment variables. Using variables.Andrew Tanenbaum & Albert WoodHull. Peter Galvin.1 to 20. File system implementations. File handling. operations. Unit-III : (30 Lectures) Linux System: History. (RB: Chapter-3) More bash shell commands: Monitoring programs. Examples related to disk arm movement. Scheduling. 2. Redirecting Input and Output. Fifth Edition. Using Linux groups. 2. application I/O Interface Disk Scheduling: FCFS. File system structures.William stallings. Desktop environments. Changing security settings. setting the PATH environment variables. Thrashing and its cause. Pipes.1. John wiley & Sons. 9. Free space management. 10. 15 and 19 ] WS: Chapters 4. replacement algorithms. Decoding file permissions. Monitoring disk space. PHI. Features of Unix/Linux. 2. Basic scheme. Displaying messages. Variable arrays. I/O. (RB: Chapter-8) Using structured commands: Working with the if-then. interrupts. Computer –Security Classifications. C-SCAN. Different directory structure. Greg Gagne. Memory Management. Working with data files: Sorting. types. Second Edition. direct memory access. Searching. Kernel Modules. SCAN. I/O System: Principles of I/O hardware and Software: typical bus structure. Compound condition testing. advanced if then features. Exiting the script. AG: “Operating Systems” – Achyut S Godbole. 12. 8. Intrusion Detection.2) Basic bash shell commands: Starting the shell. (RB: Chapter-6) Basic script building: Using multiple commands. SSTF. (SGG: 20. Filesystem Navigation. (RB: Chapter-5) Understanding Linux file permission: Linux security. structure. Additional Reference: 1. 11. Tata Mc-Graw Hill. (RB: Chapter-1) . Program and system threats. setting environment variables. Compressing. [SG: Chapters 6. Creating a script file. Directory handling. Viewing file contents. Default shell environment variables. Operating System Security: Introduction to security problem. Process Management. The Linux console (RB: Chapter-2) The Unix/Linux architecture. test command. 5] Reference: 1. File and directory listing. if-then-else and nesting if statements. 7.
3. Schroder. (SD: Chapter-17) Advanced System Administration: Partitions & file systems. Applications. Creating your own redirection. telnet. 4. X-Windows and SSH.1. renice. Unix Complete Reference.17) Main References: 1. O’reilly. TMH. RB: Linux Command line and Shell Scripting: Bible. Wiley. working with options.(CS: 3. Resolving IP addresses. C-style for command.More structured commands: for command. 6e. Displaying status of firewall.3. Creating strong Passphrases. SGG: Operating System Concepts.(RB: Chapter-11) Unit-IV : (30 Lectures) Presenting data: Understanding I/O. controlling the loop. Galvin and Gagne. Berkeley commands. Public key authentication to protect system password. at. Running the script at boot.9) Editors: Sed and awk (RB: Chapter-16) Linux Firewall: Introduction to firewall. Running scripts without a console. 15. TCP/IP Model. Redirecting O/p in scripts. Testing firewall. Listing open file descriptors. 15. Starting and Stopping OpenSSH. Startup & Shutdown. (CS: 7.13. 4e.8. 25.0.11) OpenSSH: Introduction. shift command. Running scripts in background mode. Sumitabha Das. Shroff. . Linux Command Reference. Additional References: 1. Looping on file data. 2. Richard Blum.. Retrieving a key.0 to 7. fsck. 2.7-3. Redirecting I/p in scripts. Generating and copying SSH Keys. Suppressing command o/p. 25. (SD: 25. cron table. Getting user I/P. Job control. /etc/fstab. TMH. The administrator’s privileges. Hardening OpenSSH. processing the o/p of a loop. Setting up host keys for simplest authentication. batch. while command. (RB: Chapter-10) Handling user input: Command line parameters. Using temporary files. Logging Messages. Standardizing options. Configuring the firewall for Remote SSH Administration. Managing SSH Configuration file. 25. System startup and init. 25. Silberschatz. CS: Linux Networking Cookbook. (RB: Chapter-13) Essential System Administration: root: The system administrator’s login. SD: Unix Concepts and Applications. Linux Complete Reference.2. Changing Passphrase.7. Special parameter variables. 3.5) TCP/IP networking: TCP/IP Basics. (SD: 15.2. (RB: Chapter-12) Script control: Handling signals.6. Turning an iptables Firewall on/off. 3. 7. TMH. nesting loops. Shutdown & sync operation. Mounting remote file system with sshfs. Wiley-India. ftp. Carla. Job Scheduling Commands: nice. until command.
Conflict and View serializabilty. 3rd Revised Edition[Chap 11. altering and dropping a sequence. CASE Expressions Handling. recovery from a system crash.3. Evaluation of relational operators like selection. FOR-LOOP. Publications.6. explicit locks: transaction and system level.P. WHILE-LOOP.1-19. 19. Crash Recovery: ARIES algorithm. Cursor for loops.4.1-12.4. Cursors: Concept of a cursor. Multi valued dependency and fourth normal form. Overview of PL/SQL Control Structures: Conditional Control: IF and CASE Statements. recovery related structures like transaction and dirty page table. Iterative Control: LOOP and EXIT Statements. Undoing Partial Changes with SAVEPOINT and ROLLBACK. Lossless-Join decomposition. Boolean Type.PL/SQL -The Programming language of Oracle”. Transactions in SQL: Defining a transaction. Concurrency control by time stamps. 18.8) (b) Ivan Bayross. Two phase Locking. upgrading and down grading locks. “Database Management Systems”.B.5.4. parameterized cursors.17. Defining read only transactions. introduction to query optimization. referencing.6. IF-THEN-ELSIF Statement. Concurrency Control: Concept of a transaction. “SQL. Making Changes Permanent with COMMIT. Redo and Undo phases. Concept of dead locks. UNIT II: [30 Lectures] Sequences: creating sequences. (Chapter 12. The log based recovery.1. explicit cursor.17] . The Thomos Write rule. Datetime and Interval Types. IF-THEN Statement.Paper IV DBMS-II & Software Engineering UNIT I: [30 Lectures] Decomposition: Functional dependency. Undoing Changes with ROLLBACK. the locking scheduler. PL/SQL expressions and comparisons: Logical Operators. check points. ACID properties. 17. IF-THEN-ELSE Statement. Serial and serializable schedules. types of cursors: implicit cursors. Cursor variables. Gehrke. Concept of nested tables. 19.Hill. PL/SQL Datatypes: Number Types. CASE Statement. B. 17. Closure of a set of functional dependency. Join dependency. Fifth normal form. References: (a) Ramakrishnam. Write-ahead log protocol. 19. 15.2. Precedence graphs and test for conflict seralizability. Fundamentals of PL/SQL: Defining variables and constants. 16.1-18. Character Types. McGraw. Boolean Expressions. projection. Choosing a Locking Strategy: ROW SHARE and ROW EXCLUSIVE Mode.1-16. Sequential Control: GOTO and NULL Statements. Query evaluation: System Catalog. join and set. Null Values in Comparisons and Conditional Statements. Enforcing serializability by locks: Concept of locks.
Introduction to CASE[Ref1-Chap2(Pg85-86. Concept of Effort Estimation & Uncertainty[Ref3-5. Pg 341)] Changing Trends In Software Development . Ian Abramson.4.5.3 Selecting development tools.5.1 & Ref3-5. Building WBS. Oracle 8i – A Beginner’s Guide.2.6. Software Engineering.4. Use-Case Estimation[Ref2-23. Unit IV ( 30 lectures ) Software Testing: Introduction to Quality Assurance. “Introduction to database Systems”.Pankaj Jalote (Narosa).A Practitioner’s Approach.ORACLE “The Complete Reference”. Principles of Testing [Ref2-1. Ullman. [ Ref4-(1.4.(c) Michael Abbey. Its phases & disciplines.3] Management of OO software Projects .1. Crash) Objectives of testing. COCOMO Model [Ref3-5. Project Management Knowledge Areas[Ref1-Chap3(Pg99-100.4]. Richard Helm. Corey.2] Testing Fundamentals.B. Bug.4.Core values & Practices [Ref1-Chap16(Pg692-705)] Frameworks. (e) Martin Gruber. CMM & its levels[Ref3-2.3. 16.6.720-721)]. Use of Gantt & PERT/CPM chart [Ref1-Chap3(Pg112-118)][3 lectures] Staffing [Ref1-Chap3(Pg100). “Database Systems. Ref3-5. 25. Failure. 16. (f) George Koch and Kevin Loney .5]. India Ed. Function Point[Ref3-3. Jackson. 3.6.1-5. Static Testing – Introduction & Principles [ Ref2-3. Implementation and Management”.5. “Understanding SQL”.2.6. 2. Components. “A First Course in Database Systems”.6.3. (b) Peter Rob and Coronel.J.6. “Fundamentals of Database Systems”.Burd.2.Cengage Learning. Risk Management & activities [Ref3-5. Acceptance testing.220.127.116.11. Pearson Education. Ralph Johnson. System testing. Common Terms(like Error.2.7] References : 1.1] [ Ref1-Chap3(Pg121)] Project Scheduling[Ref2-27.1.5] Size & Effort Estimation –Concepts of LOC & Estimation[Ref2-26. Introduction to Design Patterns.1. Ref2-25.2.4. 3rd Edition 4. 1.New Delhi Unit III (30 lectures) Project management : Revision of Project Management Process[Ref3-2. Design.27.104)] Managing Changes in requirements[Ref3-2.Date. Longman. (d) Jeffrey D. Jennifer Widom.3].1.1. Publications. 7th Edition.1]. ( Chapter 8) Additional References: (a) Elsmasri and Navathe. Tata McGraw Hill.2.4.3. Agile Development – Principles & Practices.2.2. 26. [Ref1-Chap16(714-717.2. Pearson Education.8.2.1.Unified Process. Pearson By – Erich Gamma. Services.2] Types of Testing – Levels of testing such as Unit testing.6. . Michael J.7-26. 1.3. Six Sigma [Ref1-14.5].4] Role of software Metrics [Ref3-1.3.1. Thomson Learning (c) C. Ref2-23.B.2]. Integrated Approach to Software Engineering .3.2.P. System Analysis & Design – Satzinger.4] Configuration Management Process & Functionality & Mechanism[Ref3-2. Pearson Education. Tata McGrawHill.3] Process Management. 1.27. Validation Testing. Extreme programming.4. Design Patterns – Elements of Reusable Object-Oriented Software. Role of Project Manager. McGraw Hill Int. Pg 26 to 28)] Open Source [Ref2-31.Object oriented metrics. John Vlissides. Integration testing.2.2. Challenges in Testing.3].3.26. Fault.3.2.
Pankaj Jalote (Narosa) Additional References 1. Narosa. Stress. 7th Edition. Test Plan Specification. Robustness testing. Ref3-10.2-10. Pearson Education . Testing methods. Mutation Testing [Ref2-5. Ref2-11.4. VIIIth Edition.6] Object Oriented Testing & Web site testing – Object Oriented Testing Strategies. Integrated Approach to Software Engineering .A Practitioner’s Approach.1. [Ref119. Boundary-value analysis.4. Regression.3. Defect logging and tracking [ Ref3-10. Acceptance.4. Graph Matrix. Equivalence partitioning. Functional.2. Branch/Decision Coverage. Software Testing – Concepts & Practices. Cyclomatic complexity.5. 2.Types of testing such as Black box.3. 19.1] Planning Software Testing – Test Plan. Test Case Execution and Analysis. 19.4] Black Box Testing : Introduction. [Ref2-4. Software Engineering : Sommerville. McGraw Hill Int.1-4. Volume.4. Cause Effect Graph. Beta testing [Ref2-1. Software Engineering.3] White Box Testing :Statement Coverage. Software Engineering: Waman Jawadekar.5.2]] Overview of web site testing[Ref1-20. Condition Coverage. 3. Performance.1-5.5] References: 1. TMH 2. Alpha. White Box.
Class Diagram & Object Diagram for a given Case Study. 2 3 4 5 To derive tables from entities & relationships with integrity constraints for a given Case Study. limitations. advantages and disadvantages for a given Case Study. To draw Component. To list test cases and validations for a given Case Study. To design Form Layouts/Web Pages/Report layouts for a given Case Study.Group I : Linux & Database List of Practicals 1 2 3 4 5 6 7 8 Study of Basic and advanced Linux Commands Study of filter commands Basic Shell scripting Advanced Shell scripting Writing PL/SQL Blocks with basic programming constructs Procedures and Functions in PL/SQL Block Implementing cursors & sequences Study of transactions and locks Note: Demo of installation of Linux should be given to students Group II : Advanced Java List of Practicals 1 2 3 4 5 6 7 8 Developing GUI applications using Swing Database programming with Java Study of Multithreading Study of Socket programming and Distributed computing Server-Side Programming using Servlets Server-side programming using JSP Developing Enterprise Java Beans Developing Web services in Java Group III : Elements of Software Engineering and Project Management List of Practicals 1 Preliminary Design of a software system in context with its components. Package & Deployment diagram for a given Case Study. To draw Event Table & Use Case for a given Case Study. 6 7 8 . To draw Sequence diagram / Collaboration diagram for a given Case Study. descriptions. To draw Activity Diagram.
A project guide should be assigned to students (Maximum 24 students for 1 guide). Sample schedule can be as follows – Phase Preliminary investigation System Analysis System Design Coding Implementation Project Report Submission Time of completion 30th June 14th August 30th September 15th December 5th January 15th January 6. a separate table should be maintained to check timely completion of the project. 4. Projects must be done using Java or . The student will maintain a Gantt chart from the given schedule and completion of each phase should be noted on the chart. Like Gantt chart. It can be Stand Alone. Faculties should arrange project demos for SY students at the end of the year or just at the beginning of TY.. The demos can be of some good students of previous TY batches or it can be a project developed by faculties themselves. The dates of this table should match with the dates of Gantt chart. The table should contain the names of phases & its sub-phases. Expected Date of completion and Actual Date of completion. though a project with the same topic name could be done by more than one student.Net Technologies & RDBMS. 2. project guide can sign the projects with late remarks. SY students should be encouraged to start finding projects in the summer vacation. b) Sub Phase N Remarks . Phase Name a) Sub Phase 1. 5.. Phase Name a) Sub Phase 1. 8. College can arrange few sessions by experienced industry people on project management/best practices/technologies etc. This table should be produced at the time of final project demonstration and should be used for assigning marks. The guides should oversee the project progress on a weekly/fortnightly basis.. Each student shall do the project individually. Sample Phase completion table – Expected Date of Completion 30th June 20th June 30th June 14th August 5th August 14th August Actual Time of Completion with Guide’s Signature Phase Title I.. Faculties may take one or two introductory sessions for SY students before the vacation which will help students to work on preliminary investigation phase during summer vacation. The guides should control iteration if any non-linear technique is used for project development. 7. For the students who fail to do projects as per the schedule. Multi-user or Web Based. He/she who will assign a schedule for each phase of the project and hand it over to students. 3.Group IV : OOAD Project General Guidelines for Project Development 1. It is advisable that the design phase gets over in the first term. b) Sub Phase N II. The guide should sign and mention the actual date of completion in the specific column of this table. It will be advantageous if students finish majority of the preliminary investigation phase during summer vacation.
update. A certificate should be added in the project report which should contain the following information – a) The fact that the student has successfully completed the project as per the syllabus and that it forms a part of the requirements for completing the BSc degree in computer science of University of Mumbai. f) Space for signature of the university examiner and date on which the project is evaluated. After the completion of phase/projects. e) Signature of the project guide and the head of the department with date along with the department stamp. demos can be planned in front of faculties/clients/students. Evaluating “Adherence to schedule” : A project can approximately have 5 phases. search. 10. iii. variety of reports etc. ii. A student can prepare a power point presentation for the project. Evaluating Student’s Presentation: Marks can be given based on the presentation skills of a student. Note i. then the marks can be cut. 12. iii.9. ii. c) The academic year in which the project is done. If the project gets delayed after 7 days of actual time of completion. iv. Project should be evaluated by External Examiner as follows – i. Concession of some more days can be given for students having genuine reasons(medical cases etc) but it should be mentioned in remarks. Evaluating “Project Quality”: It involves overall modules included in the project. Projects should have at least following: a) Good content management. d) Date of submission. Completion of these phases on time will carry 2 marks. whether it was sufficiently large enough so that it can be done in a year. delete. b) The name of the student and the project guide. Sub-phases need not go as per the schedule but main phase should be completed as per the plan. display. However. presentation & meaningful images b) Data Entry with Validations c) Suitable navigation scheme (menus/toolbars/tabs/links etc) d) Record Manipulation (add. iv. sort) e) Transactions / Sessions /Reports / Feedback/Registration whichever applicable f) Login accounts (Admin & User) with separate functionalities for administrators and users 11. Project Quality 10 marks Adherence to schedule 10 marks Working of Project 20 marks Student’s Presentation 10 marks . whether validations were done for data entry. Evaluating “Working of the Project”: It involves error-free execution of the project. a grace period of 7 days should be given for completing each phase.
) (ii) Prototypes(if any) (iii) Event Table (iv) Use Case Diagram. System Coding (i) Menu Tree / Sitemap (ii) List of tables with attributes and constraints (iii) Design Patterns used (if any) (iv) Program Descr[ Programs /Classes and their responsibilities in brief ] with Naming Conventions (v) Validations (vi) Test Cases. URL can be mentioned] (v) Feasibility Study (vi) Stakeholders (vi) Gantt Chart II. Persistent classes etc…] (iii) Component Diagram (iv) Package Diagram (v)Deployment Diagram (vi) Prg Flow charts & System flow chart (vii) Structure Chart (Prg level and System level) IV. System Analysis (i) Fact Finding Techniques (Questionnaire. System Implementation / Uploading VI.. Future Enhancements VII. Scenarios & Use Case Description (v) ERD (vi) Activity Diagram (viii) Class diagram (ix)Object Diagram (x) Sequence diagram/Collaboration Diagram (xii) State diagram III. Test Data and Test Results [Write test cases for all imp.. Preliminary Investigation (i) Organizational Overview (ii) Description of System (iii) Limitations of present system (iv) Proposed system and its adv. programs] (vii) Screen Layouts & Report Layouts (viii) Program Listing[for dummy proj] V. Forms. [ For web project.Index For Project Documentation Acknowledgement I. References and Bibliography . Sample Reports. System Design (i) Converting ERD to Tables (ii) Design Class diagram[with UI classes.
Targeting in Framesets. Executable Content Tags and Style Sheets. Styling with CSS Graphics and Color – File Format Basics. Controlling Typography with Cascading Style Sheet. Build a Web Site Development Team.7. Identify the Content Goal.0 Tag Reference. Creating a Page Template Unit References Code: PWD (Ch 2. Event Handlers. Directory Structure. Types of XML Markup. 11-18) Code: Dummies (Ch 2) XML. Using the <IMG> Element. events and event handling.Introduction to XML. the document object model. windows and frames. Using Text-Based Navigation. Global Attributes. Document Structure Tags. forms and form elements. Refining and Updating Your Content. Table Tags. Document Type Definitions.3. Creating XML well formed .9) HTML . Using GraphicsBased Navigation Creating Page Templates – Understanding Table Basics. 8.5) Web Typography – Type Design Principles. Design for the Screen Planning the Site – Create a Site Specification. Filenames and URLs. Working with Hexadecimal Colors HTML Frames – Understanding Frames. Objects) Client-Side Java Script -Java script in web browser. Formatting Tags. Planning Frame Content Publishing and Maintaining Your Web Site – Publishing Your Web Site. Table Pointers. Form Tags. Design for the Whole Site. Choosing a Graphics Tool. Hyperlinks. Computer Color Basic. Attracting Notice to Your Web Site Unit References Code: PWD (Ch 6.Applied Component Applied Component I Principles of Web Design & Web Technologies Unit I [15 lectures] Web Site Design Principles – Design for the Medium. Controlling Typography with the <FONT> Element. List Tags. dynamic html and saving state with cookies References Code: JSDG (Ch 7. .8. Testing Your Web Site. Analyze your Audience. Using Style Sheets with XML. Frame Syntax. Design for the User.HTML 4.4. Diagram the Site Planning Site Navigation – Creating Usable Navigation. Image & Image map. valid Documents. Frame Tags. Problems with HTML & SGML.CSS Unit References : Code:ELJO (Ch3-9) Unit II [15 lectures] Introduction to Java Script (Functions.
6.258-259. Evangelos Petroutsos. Main components of . Declaring methods.267-279. 2. 100-112. Formatting Dates[Ref1:Pg 264-279. Strings & constants. Murach’ Visual Basic 2008. SaveDialog.14. Operators.168-175. MDI form. subroutines. 2. DateTime class. Processing events.8.NET Additional Ref : . Types of Applications . Wiley-India Edition (Chapter 1. Meta Data. Expressions. Using System. StreamReader & StreamWriter.NET Framework and their overview.NET IDE: [ 2 Sessions ] [Ref1: &] Introduction to VB 2008 : Adding forms. Type members. select).3.251. Passing & returning Arguments.736-751. Using various dialog boxes such as MessageBox.Ref2:Pg173-190. Objectives. Murach (Chapter 1. Assemblies(Assembly overview.306-317.NET Programming with ADO. combo boxes. 5. 24) Mastering Visual Basic 2008. pointes. Ref2:Pg147-149] Collections : Creating & manipulating arrays.NET Framework Architecture– CLR(Goal of CLR. Managed Execution Process. 10.572-576] Structured Exception Handling : try. 9. Converting Data types [ 4 sessions ] [Ref1: Chap1.Ref2:Pg 499-516] Ref : 1.195-209. ArrayLists Collection. String class & Functions.7. Handling events. Automatic memory Management). finally blocks. Using menus. 4) Mastering Visual Basic 2008.730-731. Declaring variables. OpenDialog. 4. 2. Murach (Chapter 1.294-303. Adding code. Type Definitions.240-243. Adding event handlers for one/many events [Ref1:Pg176-185. Ref2: Pg 1-32. 6.5(or above): Overview of . Evangelos Petroutsos. Anne Boehm. check boxes. text boxes. catch.13.Array.NET Framework 3. Benefits. Dates & Time : Char.2.152-157. 2.481-492] Window Controls and Events: Using basic window controls such as forms. Types) Ref : 1. Different types of data such as class. Using masked textboxes [Ref1:Pg 190-203.NET Framework.218-219. Displaying simple messages. interfaces). Adding properties. Anne Boehm. radio buttons. Contents.2. MSDN Introduction to . Loops. Processing events.4.666-669. Cross Language Interoperability & CLS. arrays.142-149. 3.217-246. throwing exceptions. controls. Decision Statements (if. Wiley-India Edition (Chapter 1. buttons. Setting Properties.253263. Converting strings to numbers. Murach’ Visual Basic 2008. Murach’s VB. 7. Benefits. CTS(CTS Overview. 3) Working with Strings.246. status bars.116123. Adding Comments.3. Ref2: Pg 461-473. Structure of Metadata & Self Describing Components. 2. 35-75. procedures. [Ref1:Pg 224235.Applied Component II – Dot Net Technologies Unit I [15 lectures] Introduction to . labels. Err object. Adding toolbars.85-115] Ref : 1. delegates. Services/Features. Data Types. list boxes. 15) 1. 3.
URL Encoding. Application State[Ref1:Pg235-236] Additional Ref : Validation & rich controls – Validations & Validator controls.375-383. Writing Code-behind and event handlers. . Data Source Interaction objects. Advertisement file. Implementing inheritance. 11.23) Beginning Microsoft Visual Basic 2008(Wrox) by Thearon Willis & Bryan Newsome (Chapter 13) 1. Cross Page Posting.NET Object model. Where. Sessions State[Ref1:Pg209-230]. Web control classes. Command Builder. Page Class.458-459.NET Unit III [ 15 lectures ] ASP.17. Modifying & Updating disconnected data [Ref2:Pg822-843. Query String. Using Data Set(Typed).19.11. adding constructors. Ref2:Pg. referencing. DataGridView Control. Data objects. Data Table. Queries returning result sets. Building compound controls. Creating ASP.845-854] Creating and using Data sources. Designing Web pages. Server Controls. importing namespaces [Ref1:Pg 332-351. scalars. Using From. Shared members. Creating.NET Configuration files[Ref1:Pg121-159] Web Controls – Advantages of web controls. Evangelos Petroutsos. registering assemblies. 855-876] LINQ : Introduction to LINQ. AdRotator. [Ref 1 : Pg 163-199] State Management – Maintaining state using ViewState [Ref1:Pg201-206]. Anatomy of web form[Ref1:Pg 81-99].NET Applications – Evolution of Web Development [Ref1:Pg1-10]. Cookies. AdapterManager & BindingNavigator classes [Ref1:Pg 428-451. Partial classes.640-643. TableAdapter.18.asax files and application events. Order By. 20.25) Mastering Visual Basic 2008. using strong names. 13. Defining & using events. Application Directories. Role of BindingSource. Binding(Simple and Complex binding) controls with data sources. Murach (Chapter 8.12.NET Files. Murach’s VB. Data Adapter. Murach’ Visual Basic 2008. Advantages of LINQ.14. access specifiers. 22. Select [Ref1:Pg 704715] Ref : 1. HTML Control classes. Command.554-555.17. ASP.NET Programming with ADO. Anne Boehm.Unit II [ 15 lectures ] OO Programming : Understanding objects. properties.NET Applications.580-582.470-479.450-452] ADO. 429-442. Data Row & Data Column.NET. Advantages of ADO. DataReader classes.NET : ADO. 2. AdRotator class [Ref1: Pg343-353 ] . ADO. designing class libraries [Ref3:Chapter13] Creating Custom controls : Enhancing Existing controls. Wiley-India Edition (Chapter 10.NET & Data management. Global.NET Data provides [Ref1:Pg 414-425. [Ref1:Pg105-118]. Undertaking regular expressions [Ref1:Pg321-340].488-493.Ref2:Pg. 3.395-426] Building Class libraries : Understanding class libraries. creating classes.550-551. AutoPostBack & Web control events. Passing parameters in queries [Ref1:Pg 506-519.15.16. Adding custom events [Ref2:Pg. 23. 349-363. Ref4:Pg486-492] Using Connection. methods & variables. ASP. Ref2:Pg806-822] Disconnected Data. Calendar control.
819-822] AJAX in ASP. Beginning ASP.5 in VB 2008. Beginning ASP. Timed Refreshes [Ref1-843-849.6. 14. 7. 852-857. 24. Sorting & Paging GridView[Ref1:Pg565-579.NET –Using ScriptManager.16. Murach’s ASP. data caching.NET Security model [Ref1:Pg 679686]. XML Classes [Ref1:Pg635-636.5 with VB2008 3. Mastering Visual Basic 2008.NET 3. From Novoice to professional. GridView. Data binding with ADO.NET Fundamentals[Ref1:486-522]. 19. 20. 15. Mathew Mcdonald (Chapters 1. Mathew Mcdonald (Chapters 13. Second edition.NET.References 1.5 Application Architecture & Design –Vivek Thakur(SPD-PACKT) . Defining columns. Repeated-Value Data Binding. Wiley-India Edition (Chapter 27) Additional References 1.5.NET 3. Second edition.NET & Data Binding – ADO. Consuming Web service [Ref2-Pg 981-982. Types of caching. Data source controls[Ref1:-525-558].5 in VB 2008. ASP.4. Partial refreshes.NET Web services. Example of output caching.5: In C# and VB (Programmer to Programmer) By Imar Spaanjaars 2.642-658] Protection & Performance : Determining security requirements. ASP.Mastering VB 2008 Chapter 27) References 1. Single-value.[Ref1:Pg 809-813.NET 3.25) 2. ASP. From Novoice to professional. Triggers.10.NET 3. Creating a simple web service. Caching. Selecting. Beginning ASP. Evangelos Petroutsos. 17.NET 3. 861-863] Web Service – What is web service.11) Unit IV[ 15 lectures ] ADO.984-990] (Ref . 9. UpdatePanel.584-589] Using XML – XML Role in .NET.
display the final bill. Make sure that the number of players should not exceed 11./) from third text field. Getting login feedback using Ajax XML and Ajax CSS and Ajax Ajax and PHP AC2 Practical VB. age and email in 3 text fields. the final amount by adding principle amount and interest should be displayed. containing 3 text-fields to enter names. But only for children(age <5) and senior citizens(age>60). For each of these combo-box. The players of these teams should be shown in combo boxes which are initially empty. When you click on the delete button. a particular player from the combo-box should be deleted and added to the main list box. When you click on “Final Amount” button. Create a form that accepts 2 numbers from 2 text fields. II. 3 textfields to enter age and a text field to show final bill. Design a Login Form containing User Name and password. two buttons – “Add” & “Delete” should be used that allow to make changes When you click on Add button of a particular team.*. when you click “Calculate Interest” button. Dialog boxes & Collection 1. the data is sent to a function that returns the simple interest. As per the passengers entered by user. the rates are half. 4% service charges are applied on final amount. two teams should be formed called “Royal Challengers” & “Knight Riders”.Category D Using AJAX for enhancing web-sites I. MDI. III.NET Category E Study of basic & advanced VB.-. [ Use Functions] 4. Write a program to enter information about customer with name. Name text field should not accept any digit. Menus. IV. Include a radio button to choose whether the result should be integer or float. When user name and password matches with predefined values. the result of the expression should be displayed in 4rth disabled text-field. The same players should be removed from the main list box. an operation(+. Toolbars.NET Programming alongwith controls. Create a form containing a list box with names of Indian cricket players. should be added in the combo box. From this list. Charges of AC/NonAC mode of journey is fixed. 6. The password should contain max 8 characters.NET Project that accepts Principle Amount. Data Conversion & Message box. age text field should not accept characters and perform validations on email on lost focus of text field. the selected players from the main list box. Create a reservation form for Mumbai-Pune journey. No. Maximum 3 attempts should be allowed for wrong passwords otherwise the application should end[Use If] 2. [Use Select] 3. of Years & Rate of Interest from 3 text fields. When you click “Result” button. a welcome message should be displayed otherwise error message should be displayed. 5. Create a VB. . It should also contain a check box showing the type of journey(AC or NonAC).
age of 21 to 60. Current Releases should contain 2 sub-menus – Hindi & English. According to Date of birth. Write a program to accept information of customer for an investment policy such as Name. Name and CurBal. When you click on Read button. A customer can invest from min. production etc should be displayed in labels. The form should contain a label. Create 2 subclasses of account – SavingsAcc & CurrentAcc. Design a form containing 3 text-fields to show account number. Create a form containing a text area and two buttons “Read” & “Write”. its information such as star-cast. name and current balance with suitable labels. name. curbal. The amount to be invested should be selected from a combo box. 10. The list of films should be specified in array-list. Add a function called CheckStatus that displays account number along with current balance. Category F Implementing OOP concepts in VB. When you click on the button. 9. Also include an event called “FileSelected” which is fired when user selects a file using Browse button. It should also show its ratings in the status bar. Save-File dialog box is opened in which you can select a text file in which the contents of text area will be written.NET Programming & Data Binding 1. Add two properties in the custom control called “Ext” that selects files with specific extension and “DefaultDir” that sets initial directory of file dialog. Function withdraw is an abstract function. Creating Custom Controls & ADO. File-open dialog box is opened in which when you select a text file its contains should be displayed in text area. 8. Design a custom control called “FileSelector” containing a TextBox and Browse button. Also add Account class in BankApp namespace. Date of Birth and Address. Using Account class created in Practical 10. CurrentAcc should contain a variable representing overdraft and a constructor to initialize it.7. When you select the name of the film. total number of years remaining and accordingly find & display the premium that customer will have to pay. file dialog should be opened using which one can select a file whose name is displayed in text box. Create a class Account containing 3 variables – accno. Add 2 functions in it called withdraw and deposit which have integer parameter. Function deposit adds amount in current balance. Create a MDI form containing 2 menus – Current Releases & Forthcoming. It overrides withdraw function which deducts some amount from current balance only if remaining balance is greater than minimum balance. The label’s font and color should be set as per the options selected in the font and color dialog box. SavingsAcc should contain a variable representing minimum balance and a constructor to initialize it. 3. Add 3 properties – AccNo. Also include buttons that show total number of employees and maximum salary. 2. Each menu opens a form containing some list of specific films in combo-box. 4. When you click on “Forthcoming films”. For an Employee table containing EmpNo. design a form that allows user to go through all employees using suitable button. EmpName & EmpSal. it should open a form containing some names of films in list-box. It should also override withdraw function which deducts some amount from current balance only if remaining balance is greater than 0 or money that you want to withdraw is greater than current balance plus overdraft. Create a form containing 2 buttons to open color dialog and font dialog box. When you click on Write Button. determine current age of customer. [ Use Data Reader] .NET. AccNo should be read-only property whose value should be automatically assigned by using static variable. movie type(comedy/suspense/action/drama etc). Add suitable constructors to create Account objects.
Role of IIS & its settings. First page allows user to select Best Sportsperson. At the end. ASP.NET such as using HTML/Web Controls. FY & SY along with Year of Passing using text boxes & Location such as Mumbai/Pune using combo box. EmpName.such as Home Loan. Car Loan. When user clicks a location. the list of films currently shown and their show timings should be displayed in table[Use autopostback]. configuration files. EmpSal. it fills a combo box with names of theaters in that city. age should be within (21 to 100) & Email should be in specific format. the user gets information of the rate of loan. Design ticket enquiry form for a theater. A software company wants to conduct placements for graduates in Mumbai or Pune. design a form that allows add. Create a web site of your name that shows your information. Select location (Mumbai/Pune) using radio button. The rates of these loans are stored in configuration file. (http://localhost/UserName) 2. Application events. For program 5. range of monthly salary from combo box and number of years of loan repayment from combo box(5 to 10). age and email. Education Loan. all employees from that department should be displayed in Grid. The survey will be valid only if user is above 18 years of age and has an email id. State management. When user selects the name of the theatre. add validations – name should not be null. Autopostback. . Deploying [Demo] Category G Fundamentals of ASP. Assuming 2 tables . 5. Also add a “Print” button that displays the list of employees in selected department using crystal report. modify and delete operations using suitable buttons on the table. containing Roll. aprox range of loan amount from combo box. When user selects a department. Design an HTML page to input student details such as name using textbox. 3. A bank wants to keep an enquiry page for various types of loans that it provides .NET Deploying ASP.5. course name such as BSc Comp Sci/IT/Phy/Maths using radio button. Name and Class. Validation & Rich controls 1. DeptNo) where each employee belongs to a department. The user selects the type of loan from combo box. Last. Provide navigation facility to access First. [ Use currency manager & disconnected model ] 6. the data is submitted to ASP. Also add searching & sorting facilities on specified columns. Marks in SSC. When student clicks on Register button. The user initially inputs his/her name.HSC. The result of search operation should be displayed in grid. monthly installment for the specified number of years and total number of enquiries since the server started[Use configuration files and application events] 4. it shows a thank you message with user’s name and shows all the choices made by him/her. FY & SY average should be min 55% & there should not be any gap in education. 2nd page asks Best Writer and the third – Best Minister.NET page which informs the student whether he/she qualifies and place of interview in Mumbai or Pune as given by the student.NET Applications – Web Server. DeptName) and Employee(EmpNo. The student is shortlisted only if he/she has min 60% in SSC & HSC. For students table. Next & Previous records. In return. A news channel wants to conduct a survey of some famous personalities of the year. Configuring projects.Dept(DeptNo. Display list of departments in combo box using complex data binding. 6.
For each Channel. Creating & Consuming web services 1. For successful login. At a time 10 records should be displayed. it should show welcome message with the user’s name. show the flats available in that city.NET in ASP. current balance and transactions of the current month in table. the list of languages and categories in 2 combo boxes. 5.NET page that displays. Category H ADO. there is an attribute “Name”. [Use data binding and data source]. . When user clicks on a button. all the channels matching the selected criteria should be displayed. Expected Price and stores it in a database. Assuming that there are 2 tables – Cust(AccNo. When user selects a job. (ii) BSE Index. 7. Amt. Password. When user selected city. A Cable TV provider stores the list of channels in an XML File. (iv) Petrol Rate(for 4 metro cities) of a particular city which is passed by user. show advertisements of any 3 popular products/companies. the list of jobs should be displayed in grid. English. Date. of Rooms. Category(Sports. For successful login. Cartoon etc). 3. User should input AccNo and password. The Channel element consists of sub-elements such as Language(such as Hindi. its detailed information should be displayed[Use GridView] 4. Movies. A channel displays online news.7. No. store the output of the first page in cache. Develop a web page for a real estate firm that accepts information of flats to be sold such as City. HolderName. TransType. It also shows score of current day’s cricket match which gets updated after every 60 seconds[Use AJAX]. Performance improvement using Caching. Create a web service that displays – (i) NSE Index. the names of theatres in the city should also be stored & read from cache(Use Output & Data Cache). Another web page that shows a combo box containing the list of cities. Top 3 news are shown in links. CurrBal) & Transactions(TransId. Design an ASP. For program 4. [ Use Reader] 2. ClientName) where TransType can be Debit or Credit. Interacting with XML documents. For program 4. (iii) Gold Rate. Create a website that allows user to login.NET with Data Binding. When you select a city. 6. Marathi etc). AccNo.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.