w. e.

f Academic Year 2009-10

‘E’ Scheme


1 2 3 4 5

6 7

Software Engineering SWE 12175 03 --Java Programming JPR 12176 03 -04 Computer Security COS 12177 03 --Operating System OPS 12178 03 -02 Elective – I (Any One) for CM Only ( Computer Technology ) Data Base Management DBM 12179 03 -04 Multimedia and Animation MAT 12180 03 -04 Technique Elective – I (Any One) for CO ( Computer Engineering ) Advanced Microprocessor AMP 12181 03 -04 Windows Programming WPR 12182 03 -04 Network Management and NMA 12183 01 -04 Administration Professional Practices-v PPR 12184 --03 TOTAL 16 -17

03 03 03 03 03 03 03 03 ----

100 100 100 100 100 100 100 100 --500

40 40 40 40 40 40 40 40 ----

-50# --------50

-20 ----------

--------25# -25

--------10 ---

-25@ -25@ 25@ 25@ 25@ 25@ 25@ 50@ 150

-10 -10 10 10 10 10 10 20 --



Student Contact Hours Per Week: 33 Hrs. THEORY AND PRACTICAL PERIODS OF 60 MINUTES EACH. Total Marks : 775 @ Internal Assessment, # External Assessment, No Theory Examination.
Abbreviations: TH-Theory, TU- Tutorial, PR-Practical, OR-Oral, TW- Termwork, SW- Sessional Work. Conduct two class tests each of 25 marks for each theory subject. Sum of the total test marks of all subjects is to be converted out of 50 marks as sessional work (SW). Progressive evaluation is to be done by subject teacher as per the prevailing curriculum implementation and assessment norms. Code number for TH, PR, OR, TW are to be given as suffix 1, 4, 8, 9 respectively to the subject code.
MSBTE - Final Copy Dt. 18/12/2010


w. e. f Academic Year 2009-10

‘E’ Scheme

Course Name : Computer Engineering Group Course Code : CO/CM/IF/CD Semester : Fifth for CO/CM/IF and Sixth for CD

Subject Title : Software Engineering Subject Code : 12175

Teaching and Examination Scheme: Teaching Scheme TH 03 NOTE: Two tests each of 25 marks to be conducted as per the schedule given by MSBTE. Total of tests marks for all theory subjects are to be converted out of 50 and to be entered in mark sheet under the head Sessional Work. (SW) Rationale: Today computer software is the single most important technology on the world stage. Software’s are used by almost all peoples for various purposes such as withdrawing payments from ATM machines, paying bills of electricity, telephone using ECS systems. Airline, railway tickets reservation online etc. People can work with computers flawlessly over a long period of time. One can easily modify, upgrade the software without any problem or error. This subject helps the students to develop, design, analyze, test & implement the software project during the diploma courses in future. Objectives: 1) 2) 3) 4) 5) 6) Plan & develop the frame work of project. Compare various project process models & use in project planning. Use the principles of communication, planning, modeling construction & deployment. Apply testing strategies & methods on software projects. Compare various testing methods. Identify the duties & responsibilities of People, team leader & stakeholders while planning the software project. 7) Schedule the project according to time, size, shape, utility & application. 8) Monitor & manage the risk during the design of software project. 9) Use the parameters of software quality assurance. 10) Compare the quality factors of ISO & McCall. 11) Prepare the estimation of software. 12) Calculate the cost of software, using cost estimation models such as COCOMO II. TU -PR -PAPER HRS 03 TH 100 Examination Scheme PR -OR -TW -TOTAL 100

MSBTE - Final Copy Dt. 18/12/2010



w. e. f Academic Year 2009-10

‘E’ Scheme

Learning Structure: Students will be able to develop the software’s such as library system, Reservation system or game, simulation software’s by applying principles, theories & strategies of software Engineering.



Procedures of Analysis, Design, Management, Spectrum.

Black Box & White Box test procedures. Validation testing , Unit testing.

ISO standards, Norms, COCOMO II, Costing Norms.


Communication, Planning, Construction & Deployment principles.

Principles of Analysis & Design.

Testing Principles, Quality Principles, Costing techniques.


CMMI model, Waterfall, RAD, Spiral models

Analysis , Design models, Flow oriented, class based & Behavioral models.

Project Scheduling, Quality & Estimation

Facts Software, Hardware, database, Project, People, Team leader, Stakeholders, Model, Analysis, Design, Test, Risk, Quality, Estimation.

MSBTE - Final Copy Dt. 18/12/2010



w. e. f Academic Year 2009-10

‘E’ Scheme

Contents: Theory Chapter Name of the Topic Overview of Software Engineering & the Software Development Process 1.1 The evolving role of Software & changing nature of software-Definition of a Software, Characteristics of a Software, Categories of Software 1.2 Software Engineering –A layered Technology approach(Definition of Software Engineering, Need of Software Engineering 1.3 The software development process-Generic Framework activities, Umbrella activities 1.3.1 The Capability Maturity Model Integration Model(CMMI)-levels and their significance, process areas considered for CMMI Level 1.4 PSP and TSP 1.4.1 Significance in Ongoing Software Process Improvement 1.4.2 Goals 1.4.3 Names of the PSP and TSP framework activities and their meaning 1.5 Prescriptive Process Models 1.5.1 The Waterfall Model - Nature, Situations in which applicable with example, Associated problems 1.5.2 The Incremental Model - Incremental Model (Nature, Situations in which applicable with example, General steps) - RAD Model (Nature, Situations in which applicable with example, General steps, Drawbacks) 1.5.3 The Evolutionary Process Model - Prototyping (Nature, Situations in which applicable with example, General steps, Drawbacks) - Spiral Model (Nature, Situations in which applicable with example, General steps, Advantages, Drawbacks) Software Engineering Requirements and Development of Analysis & Design Models. 2.1 Software Engineering Practice 2.1.1 Definition 2.1.2 Importance 2.1.3 Essence 2.2 Core Principles of Software Engineering (Statement and Meaning of each Principle) 2.3 Communication Practices (Meaning of Communication, Communication Principles Statement and Meaning of each ) 2.4 Planning Practices 4 Hours Marks







MSBTE - Final Copy Dt. 18/12/2010


w. e. f Academic Year 2009-10

‘E’ Scheme




2.8 2.8.1 2.8.2 2.8.3 2.9 2.9.1 2.9.2 2.9.3



(Meaning of Software Planning, Basic Activities included, Planning Principles - Statement and Meaning of each) Modeling Practices - Meaning of Software Modeling - Analysis Modeling (Meaning, Names of the analysis domains represented, Analysis Modeling Principles Statement and Meaning of each) - Design Modeling (Meaning, Names of the three Design aspects , Design Modeling Principles - Statement and Meaning of each) Construction Practices - Meaning of Software Construction - Coding (Meaning, Preparation Principles, Coding Principles, Validation Principles) - Testing ( Meaning, Testing Principles Statement and Meaning of each) Software Deployment - Meaning of Delivery Cycle, Support Cycle and Feedback Cycle - Deployment Principles (Statement and Meaning of each) Requirements Engineering(RE) Meaning of RE Need of RE RE Tasks (Meaning and Sub-tasks included) Analysis Modeling Objectives Analysis Rules of Thumb Domain Analysis - Meaning - Examples of Domain - Goal - Input and Output of Domain Analysis Analysis Modeling Approaches - Structured Analysis (Meaning) - Object-oriented Analysis (Meaning) Building the Analysis Model - Data Modeling Concepts (Meaning of the terms – data objects, data relationships, data attributes, cardinality and modality with example) - DFD (Use, Standard Notations, Rules followed, DFD construction using any Case study) - Data Dictionary(DD) (Meaning, Use, Contents incorporated, Advantages) 5

MSBTE - Final Copy Dt. 18/12/2010

3. Patterns.Data design elements.Meaning .1.1 Definition of Software testing 3. Design classes (Meaning and Importance with respect to ease of design. testing.10 Design Engineering/Modeling 2.Approaches • Top-down integration (Meaning. Steps involved) • Regression testing (Meaning. Guidelines used) . Unit Testing .1. Functional independence. Use. Names of the contents it includes) .Final Copy Dt. 3. Information hiding. e.Meaning .w.1 The Design Process (Meaning of Software Design. Component-level design elements.1 Software Testing Fundamentals 3.3 Design Concepts . Steps involved) • Bottom-up integration (Meaning.1.Aspects of the Software Program tested 3. Refactoring.2 Software Verification and Validation(V&V) .3 Meaning of successful test 3. State diagram and Program activation table – meaning and use) . 18/12/2010 12175 . Purpose) 6 - 08 20 MSBTE .Creating Process Specification(PSPEC) (Use.1.Creating a Behavioral Model (Use.5 Meaning of test plan.Meaning.10.3. test cases.1. Architecture.Creating Control Specifications(CSPEC) (Use. test data 3. Three Characteristics of good design) 2.4 The Design Model . f Academic Year 2009-10 ‘E’ Scheme 03 Creating a Control Flow Model (Nature of Software Applications where required.Abstraction.3 Testing Strategies for Conventional Softwares 3.2 Integration Testing .2 Meaning of good test 3. Differences. and debugging) 2.4 Meaning of testing strategy 3. Interface design elements.10. Modularity. development. Names of the set of SQA Activities involved in V&V 3.6 Characteristics of Testing Strategies 3.2 Design Quality Guidelines 2. Deployment-level design elements (meaning and inputs from analysis modeling that help in their creation) Testing Strategies & Methods. Architectural design elements. Refinement. General steps) 2.

Cause elimination.1 What is Software Project Management and Why is it needed? 4. & the Project (Meaning and Significance of each ‘P’) 4.3.1 Meaning of Software Risk 4. Backtracking.2 Types . the Product .2 The Management Spectrum – The four Ps . Purpose with example) 3.3 Characteristics of Bugs 3.3.7 Ways in which the project schedule can be tracked (Only a list of the ways) 4.3.2 Reactive Vs Proactive risk strategies . security testing. Timeline Charts 4.5.4 Debugging Strategies .3.2 Need 4. the Process.The names of the issues involved .PERT.Purpose .1 Meaning of project scheduling and tracking 4.w.4 Risk Management 4.2 Outcomes 3.6.the People. Purpose) 3.4. e.4.6 Introduction to the Scheduling Techniques/Methods .1 Meaning 3.6 White-box and Black-box Testing (Meaning and Purpose) Debugging 3.5 System Testing 3. f Academic Year 2009-10 ‘E’ Scheme 04 Smoke testing (Meaning.Differences 3.3 What must a project schedule indicate? 4.Names of the steps involved in formulation of the Proactive risk strategy 4. Performance Testing (Meaning.Final Copy Dt.3.Meaning of Proactive risk strategy . Types of Software Risks .3.Recovery testing. Stress testing.Meaning .3 Project Scheduling and Tracking 4.4 The RMMM Strategy .1 Meaning and Purpose 3.6.Names and Meaning of the risks 4. Automated debugging (Meaning) Software Project Management 4.4 Reasons why project deadlines cannot be met 4.6.4.Brute force. 18/12/2010 12175 .4.Meaning of Reactive risk strategy .Possible steps to mitigate risks • 7 10 18 MSBTE . CPM.5 Basic Principles used for project scheduling (Meaning of each principle) 4.4 Alpha and Beta Testing .

5 Change Management 4.w. f Academic Year 2009-10 ‘E’ Scheme .7.Final Copy Dt.3 Types of Decomposition Techniques ( Names and meaning of the techniques) 5.7.Meaning . 2.Activities carried out by the SQA Group 5.2 List of the steps involved 5.7 McCall’s Quality Factors (Names and meaning of each factor) Estimation 5.Definition of SQA .6 Software Reliability and Software Availability 05 .6 Cleanroom Software Egineering 4.No. Pressman Richard Fairley Waman S.Use (applications) Total Learning Resources: 1.1 Meaning of Software Estimation 5.4 Six Sigma Strategy for Software . Author Roger S.5.Units of measurement 5.1 Meaning of SCM 4. 5.Meaning . 2.5 The ISO 9000 Quality Standards .5 COCOMO II Model Meaning.2 The Cleanroom Strategy (Names and meaning of the tasks involved) The Cleanroom difference Software Quality Management& Estimation 5.Core Steps (The DMAIC Method) 5.4 Software Sizing .3 SCM Features (Names and meaning of the features) 4. Books Sr .5.ISO’s definition of Quality .7. Jawadekar Title Software Engineering –A Practitioner’s Approach Software Engineering Concepts Software Engineering – Principles and Practice 8 06 18 48 100 Publication Tata McGraw Hill Publication Tata McGraw Hill Publication Tata McGraw Hill Publication 12175 MSBTE .Definition .1 The Cleanroom approach 4.6. 18/12/2010 . e.2 Software Quality Assurance(SQA) . 1.ISO 9001:2000 Software Quality Focus 5.7.6.List of the factors to be monitored .1 Basic Quality Concepts.The RMM Plan (Meaning and what it includes) 4.2 Need of SCM 4.3 Introduction to Statistical SQA ( Meaning and list of the activities involved) 5.Approaches (names and meaning of the approaches) 5.7.5.

iso90001compliance.com MSBTE .com 7) www.sei.edu 2) www.emu.org 4) www.com/office/visio 5) www.w.com/UML 6) www. f Academic Year 2009-10 ‘E’ Scheme 2.iso90001compliance.ieee.qaiusa. Websites 1) www.Final Copy Dt.ifpug. e.microsoft.rational.com 7) www.org 3) www. 18/12/2010 9 12175 .

Objective: The student will be able to: 1. 18/12/2010 10 12176 . extensible and reusable. This subject knowledge is essential for development of customized and web based applications. which includes learning core java forms a foundation for learning Advanced java. Manage errors and exceptions 9. (SW) Rationale: Java language enhances and refines the object oriented paradigm. f Academic Year 2009-10 ‘E’ Scheme Course Name : Computer Engineering Group Course Code : CO/CM/IF/CD Semester : Fifth for CO/CM/IF and Sixth for CD Subject Title : Java Programming Subject Code : 12176 Teaching and Examination Scheme: Teaching Scheme TH 03 TU -PR 04 Examination Scheme PAPER HRS 03 TH 100 PR 50# OR -TW 25@ TOTAL 175 NOTE: Two tests each of 25 marks to be conducted as per the schedule given by MSBTE. Design and implement multithreaded programs 8. reliable. the major business applications world wide being based on Java technology.Final Copy Dt. Understand and implement the concept of reusability and extensibility 6. Design and implement applet and graphics programming MSBTE . Essential to adapt to refinements and improvements in the art of programming. Total of tests marks for all theory subjects are to be converted out of 50 and to be entered in mark sheet under the head Sessional Work. Create packages and interfaces and used it in programs 7. e. 5.w. Apply object oriented features to real time entities 4. portable. Design and implement classes and methods 2. which are secured. Differentiate between primitive data types and class data types and implement conversion between them. Further this subject. Java being platform independent language and a freeware software. learning Java becomes essential. Java supports development of dynamic network based applications. Understand and implement basic programming constructs 3.

18/12/2010 11 12176 . Dynamic Binding Predefined errors and Exceptions Concurrent Processing Applet Programming and Graphics Class Facts Syntax and Semantic. Object Oriented Paradigm Error and Error Types Multiprocess ing Applet Syntax and Semantics Graphics Fundamentals MSBTE . Apply Knowledge for developing reliable. Implement error and exception Handling Implementati on of Threading Design and implement Applet Programs Principles and Concepts Data Handling & Encapsulation Abstraction: Representation of essential facts Function Overriding and Overloading. and Coding Debugging.Final Copy Dt. Make use of Data streams in programs 11. f Academic Year 2009-10 ‘E’ Scheme 10.w. Interfaces. e. members. efficient. applet programs and respective classes. Write programs by combining all features of Java. Learning Structure: Applicatio n Designing and implementing application programs. customized and downloadable web applications Procedure Designing classes. Basic programming constructs.

Variables and Data Types Constant. The switch statement. Multilevel inheritance. Wrapper Classes Interfaces and Packages 3. Using a package. Final variable and Methods. Stopping and Blocking 08 a thread. Final Classes. Multithreaded and interactive. Polymorphism. Accessing Interface variable 06 3. e. 18/12/2010 12176 . Jumps in Loops ( Break . Extending a thread class. Platform independent and portable. The for statement. Creating Package. Logical Operators. Symbolic Constant. Data Types. Object and Methods Defining a class. Standard default values 1.1 Multi Threading: Creating Thread.1 Interface: Multiple Inheritance Defining interfaces. Accessing a package.3 Constant.w.3 Visibility Control Public access. Private Protected access 2. Strings ( String and StringBuffer class). Constructor. The do statement. The else if ladder. Creating an array.1 Classes. The if else statement. Two Dimensional array. Private access. Extending interfaces. f Academic Year 2009-10 ‘E’ Scheme Contents: Theory Chapter Name of the Topic Hours Introduction to Java 1. Thread priority. Object oriented Distributed. Abstract method and Classes 08 2. Bit wise Operator. Accessing class members. Special Operator 1. The? : Operator 1. Thread exceptions. Dynamic Binding 1.1 Fundamentals of Object Oriented Programming Object and Classes.Final Copy Dt. friend access. Overriding Methods. Relational Operators. Implementing a 12 Marks 01 20 02 24 03 16 04 20 MSBTE . Simple if statement.5 Decision making and Branching Decision making with if statement. Using system Package. Strings and Vectors Arrays. Type casting. Naming Convention.2 Java Features Compiled and Interpreted. Scope of variable.4 Array. Synchronization. Methods Overloading. Continue) 2. Life cycle of thread. Creating object. Using thread method. Assignment Operator Increment and Decrement Operator. Hierarchical inheritance. Data abstraction and encapsulation.6 Decision making and Looping The While statement. High performance 1.2 Inheritance Extending a Class (Defining a subclass Constructor. Vectors. Static Member 2. One Dimensional array. Protected access. adding a class to a package Multithreaded Programming and Exception handling 4.2 Packages: Putting Classes Together System Package. Conditional Operator.4 Operator and Expression 10 Arithmetic Operators. Implementing interfaces. Inheritance.

Byte Stream ( Reading And Writing Streams) 6. throws and finally statement. Applet tag. Drawing Bar charts Streams and File I/O 6. How applet differ from application. Exception. error corrections. Lines and rectangle. fatal. To be able to write program using different implementations for the same problem Study different types of errors as syntax semantic. Using control loops in Applets. Local and remote applets. Applet life cycle.Final Copy Dt. Adding Applet to HTML file. Passing parameter to applet 5. To be able to apply different logics to solve given problem.3 Serialization Total 10 16 06 48 04 100 Practical: Skills to be developed: Intellectual skills: Use of programming language constructs in program implementation.1 Stream Classes 6.2 Managing Errors and Exceptions Types of errors. Drawing Polygons. Circle and Ellipse. Line Graphs. 18/12/2010 13 12176 . e. making changes etc. linker & logical Debugging of programs Understanding different steps to develop program such as Problem definition Analysis Design of logic Coding Testing Maintenance (Modifications. Building applet code. f Academic Year 2009-10 ‘E’ Scheme 05 06 ‘Runnable’‘ Interface 4. Drawing Arcs.w.1 Applet Programming Applet basics. Using Exception for Debugging Java Applets and Graphics Programming 5. Creating an Executable Applet.2 Graphics Programming The Graphics Class.) Motor skills: • • • • • • • Proper handling of Computer System. Designing a Web page. using throw. Multiple catch statement. MSBTE . Running the Applet. Preparing to write applets.2 Character Stream.

define instance methods and overload them and use them for dynamic method invocation. 17. define instance methods for setting and retrieving values of instance variables and instantiate its object Write a Java Program to define a class.method synchronization. c) Decision making statements.using String Buffer class and its methods. 22.to display a message in the Applet. Write program to demonstrate use of File streams. 4..set background and foreground colors. . 15. 5. 13. 6. Write a Java Program to practice . overload the constructors and instantiate its object Write a Java Program to define a class. 1. Write a Java Program to implement array of objects. . 12. 2. 19.w. 8. Write a Java Program to implement inheritance and demonstrate use of method overriding. Write a Java Program to define a class.object synchronization.Final Copy Dt. Write programs for using Graphics class . 9.by creating user defined exceptions. Write a program using Applet . e. 3. Write a Java Program to demonstrate use of sub class Write a Java Program to demonstrate use of nested class. .draw different items using basic shapes .use of multidimensional array. Write a program to demonstrate .use of single Dimensional array.for configuring Applets by passing parameters. 21. f Academic Year 2009-10 ‘E’ Scheme Sr. 7. 24. Write a simple Java program to demonstrate use of command line arguments in Java. .use of extending interfaces. Write a Java Program to implement single inheritance by applying various access controls to its data members and methods. d) Type casting. Write a Java program to implement the concept of importing classes from user defined package and creating packages. describe its constructor. 16. Write a program to implement the concept of Synchronization for . Write a Java Program to implement multilevel inheritance by applying various access controls to its data members and methods. . . 14. List of Practicals Write simple programs based on basic syntactical constructs of Java like: a) Operators and expressions. Write program to demonstrate use of I/O streams. 18/12/2010 . Write a Java Program to implement Wrapper classes and their methods.using predefined exception. Write a program to implement the concept of threading. Write a program to implement the concept of Exception Handling . 18. No. Write a Java Program to implement Vector class and its methods.use of implementing interfaces. 23. 14 12176 20.using String class and its methods. 10. Write a Java program to practice . MSBTE . . b) Looping statements. 11.to display basic shapes and fill them.

osborne. 01 02 03 04 05 06 07 Author E.w.java.sun.sun. 2) Web Sites: http://www. 18/12/2010 15 12176 .java. e. Balagurusamy C Thomas WU Patrick Naughton-Herbert Schildt John R.Hubbard Cohoon & Davidson Jawroski Java2 Programming Title Programming with Java An Introduction to Object Oriented Programming The Complete Reference Java 2 (Third Edition) Programming with Java Java Program design Java2 Unleashed Keyur Shah BPB Tata McGraw Hill Tata McGraw Hill Tata McGraw Hill Tata McGraw Hill Techmedia Tata McGraw Hill Publisher Notes: LCD has to be used for effective learning for all the topics.com (For downloading JDK for Practical) MSBTE . Books: Sr.com http://www.com http://www. f Academic Year 2009-10 ‘E’ Scheme Learning Resources: 1.Final Copy Dt. No.

and auditing security at all levels including networks Objectives: The students will be able to: 1. fundamentals of computer/network security. operating system security. Use cryptography algorithms and protocols to achieve Computer Security. integrity and availability. integrity and availability of Computer Systems. be able to recognize potential threats to confidentiality. This course will introduce basic cryptography. TU -PR -PAPER HRS 03 TH 100 Examination Scheme PR -OR -TW -TOTAL 100 MSBTE . Understand the risks faced by Computer Systems and the nature of common Information hazards. one of the most important and relevant area of computing today. (SW) Rationale: Computer security.Final Copy Dt. and network security principles. It focuses on concepts and methods associated with planning.w. Build systems that are more secure against attacks. Total of tests marks for all theory subjects are to be converted out of 50 and to be entered in mark sheet under the head Sessional Work. 6. Understand the working of standard security mechanisms. The requirement to address security in computer system design is an important design consideration in many of today's systems. It is essential to understand various threats to secure computing and the basic security design principles and techniques developed to address these threats. secure systems design principles. 18/12/2010 16 12177 . 4. Apply security principles to secure Operating Systems and applications. security mechanisms. Understand the threats and security mechanisms for Computer Networks. f Academic Year 2009-10 ‘E’ Scheme Course Name : Diploma in Computer Engineering / Computer Technology Course Code : CO/CM/CD Semester : Fifth for CO/CM/IF and Sixth for CD Subject Title : Computer Security Subject Code : 12177 Teaching and Examination Scheme: Teaching Scheme TH 03 NOTE: Two tests each of 25 marks to be conducted as per the schedule given by MSBTE. 3. 5. 7. risks faced by computers and networks. It will develop knowledge for security of information and information systems within organizations. The student will achieve a firm intuition about what computer security means. 2. e. Identify the potential threats to confidentiality. managing.

Protocols Attacks. policies Concepts Integrity. integrity and availability of information systems and apply basic security design principles and techniques developed to address these threats Procedure Password selection. Operating system hardening Network hardening Application hardening. f Academic Year 2009-10 ‘E’ Scheme Learning Structure: Applications Recognize potential threats to confidentiality.Final Copy Dt.w. Trojans MSBTE . Confidentiality. Intrusion Viruses. secure software development Intrusion detection Principles Computer Security algorithms. 18/12/2010 17 12177 . e. encryption Facts Malware. firewall Security model. anti-virus. Virtual private network Authentication. Availability Access control. spam Standards.

Final Copy Dt. replay. security implication.1 Firewalls : concept. steps for verifying authenticity and integrity of a certificate 3. design principles. Security awareness. Criminal organizations.2 Security topologies – security zones.2 Physical security : Access controls Biometrics : finger prints.concept 4.3 Types of attack: Active and Passive attacks. e. Transposition techniques – Rail fence technique. Security basics : Confidentiality. simple columnar. hand prints. VLAN. Shoulder surfing. peer to peer. Denial of service. Logic bombs Organizational/ Operational security 2. Retina. trusted systems. TCP/IP Hacking.4 Public key infrastructures : basics. Individual user responsibilities 2. Physical barriers 2. man in the middle. steps for obtaining a digital certificate. Access Control 1. certificate authorities. Asymmetric key cryptography : Digital Signature. patterns.w. Availability. steps in attack 1. limitations.3 Symmetric and asymmetric cryptography : Introduction Symmetric encryption : DES (Data encryption standard) algorithm.1 Need for security. encryption attacks. Substitution techniques : Caesar’s cipher. f Academic Year 2009-10 ‘E’ Scheme Contents: Theory Chapter Name of the Topic Introduction and Security trends 1. Integrity. Insiders. Intranet. sniffing. model for network security Cryptography and Public key Infrastructure 3. Malware : Viruses.1 Introduction : Cryptography.2 Threats to security : Viruses and Worms. keystrokes. Key escrow 3.2 Hashing . registration authorities. Cryptanalysis. Cryptology. digital certificates. Authentication. Terrorists. spoofing. Diffie-Hellman algorithm. Internet. Information warfare Avenues of attack.3 Network security basics. voice patterns. monoalphabetic and polyalphabetic. Steganography 3.concept 3. DMZ. tunneling Hours Marks 01 06 16 02 06 16 03 14 20 04 08 16 MSBTE . signature and writing patterns. Problem of key distribution. Piggybacking. Dumpster diving. Kerberos .5 Trust models : Hierarchical. Access by non employees. hybrid Network security 4. 18/12/2010 18 12177 . Installing unauthorized software / hardware.1 Role of people in security : Password selection. Intruders. backdoors and trapdoors.

application patches. Intrusion detection systems (IDS). PEM.2 Web security threats. IPSec security 4. host based IDS. updates : hot fix. patch.Final Copy Dt. IPSec configurations. web traffic security approaches.1 Application hardening. network based IDS 5.Gangenisr Wm. password selection strategies.pgpi. architecture. good practices.4 Virtual Private Network 4. 18/12/2010 19 12177 .1 Intruders. Second Edition O’Reilly publication Mc Graw Hill Technology Education International Edition 2005 05 Web site links: 1. Third Edition Wiley India Education. components of a good password 5. secure electronic transaction Software development : secure code techniques. active directory 6.2 Password Management. White Roger L. service pack Application and web security 6.org/doc/pgpintro/ MSBTE . f Academic Year 2009-10 ‘E’ Scheme 05 06 4. 01 02 03 04 Author Atul Kahate William Stallings Dieter Gollman Deborah Russell G. least privilege.5 Email security : Email security standards : Working principle of SMTP.T. Hardening Unix/Linux based operating system. spam. Davis Chuck Cothren Title Cryptography and Network Security Cryptography and Network Security Principles and Practices Computer Security Computer Security Basics Principles of Computer Security Security + and Beyond Publication Tata-McGraw-Hill Sixth reprint 2006 Pearson Education. code injection. buffer overflows. requirements. IPSec.3 Operating system security : Operating system hardening.w. No. S/MIME. Arthur Conkin Dwayne Williams Gregory B. web servers. PGP.3 IP security : overview. http://www. testing Total 08 16 06 16 48 100 Learning Resources: Books: Sr. e. general steps for securing windows operating system. System security 5. vulnerability of password. secure socket layer and transport layer security.

2.It is the first piece of software to run on a computer system when it is booted . Learn various memory management and file management techniques. This is core technology subject and the knowledge of which is absolutely essential for Computer Engineers .Final Copy Dt. MSBTE . This subject gives overview of Unix operating system as a case study.It familiarizes the students with the concepts and functions of operating system. Understand the features and functions of operating systems provided by various system calls. 5. (SW) Rationale: To meet the ever increasing need of computers. 4. 3. Operating system is the interface between the user and the computer system .w. Objectives: Student will be able to: 1. deadlock & the concept of context switching & multiprogramming. a. 18/12/2010 Examination Scheme PAPER HRS 03 TH 100 PR -OR -TW 25@ TOTAL 125 TU -- PR 02 20 12178 . This subject provides knowledge to develop systems using advanced operating system concepts.Its job is to co-ordinate and provide services for the execution of application software. Total of tests marks for all theory subjects are to be converted out of 50 and to be entered in mark sheet under the head Sessional Work. Implement various algorithms of scheduling. Learn the various milestones in the history of operating system and the modern trends in operating system. f Academic Year 2009-10 ‘E’ Scheme Course Name : Computer Engineering Group Course Code : CO/CM/IF/CD Semester : Fifth for CO/CM/IF and Sixth for CD Subject Title : Operating System Subject Code : 12178 Teaching and Examination Scheme: Teaching Scheme TH 03 NOTE: Two tests each of 25 marks to be conducted as per the schedule given by MSBTE. networks and internet study of operating system is compulsory. Understand the tools and the components of the operating system. Compare and contrast the various standard solutions to operating system problems. 6. e. Understand a process.

e. Page management Principles Principles of Interrupt Handling Concept File Management Process Management Memory Management Interrupt handling Facts Elements of file system • Files • Data • Processor • Memory Peripherals MSBTE . Understand the Unix vi editor and Unix utilities. Learning Structure: Application Comprehend the internal design & resource management of operating system. Make best use of facilities that computer system offer them for solving problems. Install and observe smooth running of operating system. Lean the concept of shell programming and develop programs on it. 18/12/2010 21 12178 . Scheduling Principles Swapping Principles.w. Procedure Information Management Module Process Management Module Memory Management Module I/O Management Module Principles Principles of File Management Deadlock Principle.Final Copy Dt. f Academic Year 2009-10 ‘E’ Scheme 7. 8. 9. Develop application programs.

one to one. Tree Structure. 3. mutual exclusion. First come first served (FCFS). Prevention. 1.w. Generations –1st.2 Access Methods – Sequential.1 Operating system. Simple structure.4 Allocation Methods – Contiguous. 5.5 Booting Process Management 3. Priority. Multitasking.6 Real Time Systems. 3rd.5 Threads . CPU and I/O burst cycle.Scheduling queues. process.creation.1 File. 1. file management. 2nd. 3.4 Inter process communication.1 Processes . critical region.4 Other Scheduling. Safty algorithm File System and Memory Management 5. 1. process control. real-time. 4. concept.4 Operating system structure. Desktop. microkernel. Round Robin (RR).3 Multiprocessor Systems 1. 4.2 Mainframe Systems – Batch.2 Process scheduling . 4. Operations. communication. 2. Linked. layered.Concept. 2.Concept. 4. process control block. Evolution.2 Operating system services. avoidance algorithm-Bankar’s algorithm. Direct.1 System components activities . Main memory management. Two level. 22 10 20 10 22 12 22 12 24 MSBTE .Many to one.3 Scheduling Algorithms. Types.3 Operations on processes . Secondary storage management. context switch.WIN-07 Operating System Structures Hours Marks 01 04 12 02 03 04 05 2.7 Recent Operating System Characteristic –XP. 3. Information maintenance.2 Types of Scheduling-Pre-emptive.3 Swapping 5. e. 3.5 Directory Structure – Single level. File management. Multi programmed. monolithic. Multilevel. many to many.1 Scheduling – Objectives. Structure 5. Device management. Scheduling 4.emptive. Indexed.6 Deadlock handling. criteria. f Academic Year 2009-10 ‘E’ Scheme Contents: Theory Chapter Introduction Name of the Topic 1. 1. 1. 4th.Final Copy Dt.Process management. Time sharing.5 Clustered Systems. I/O system management. user and kernel threads. 2. principle necessary conditions. scheduler. System model.5 Deadlock. 5. 4. Multiprocessor. 2. Attributes. Shortest job first (SJF).Benefits.6 Multithreading Models . state.4 Distributed Systems.3 System calls – Uses. 3. 18/12/2010 12178 . Non pre. termination.

kill. 7) Write and execute the programme to implement round robin scheduling Algorithm. f Academic Year 2009-10 ‘E’ Scheme 5. pr. mail.7 Basic Memory Management –Partitioning. interfaces and their functions . Linked List. mkdir.ps. cat. 5) Write and execute shell script to display the following output. script. 5. 4) Use of vi editor & perform all editor commands. bc. touch. 1) Use of file and directory manipulation commands – ls. Fixed & Variable.9 Virtual Memory – Concept. time. comm. head. rm. a) Argument is a directory. wait. sleep. tail. chmod. LRU (Least recently used). dir. cmp. Page fault.8 Free Space management techniques –Bitmap. wall. e. Paging. paste. cal.. Optimal Page replacement. rmdir.Differentiate the various Windows Operating system. MSBTE . talk. join. 18/12/2010 23 12178 . 5.10 Page Replacement algorithms – FIFO(First in First out). exit. Page Table. clear. diff.w. cd.news.6 Protection –Types of accesses. who am i . tty. date. spell. 2) Use of text processing and communication commands – tr. cp.(Windows 9x. 5. then display the size of file. 5. wc. write.Final Copy Dt. split. NRU (Not recently used) Total 48 100 Practical: Skills to be developed: Intellectual skills: Understanding syntax of commands Interpretation of commands Execution of commands . Motor skills: • Proper handling of Computer System. List of Practical: Identify the major desktop components. man. 3) Use of general purpose and process commands. su.Windows NT. c) Todays date d) Users of the system e) Quit to Unix ii) To check every argument and carry out the following. c) If argument does not exist then create the directory. i) Menu: a) List of files. mv. b) If argument is a file. mesg. Access control. b) Processes of user. cut. pwd. Windows 2000& Windows XP. grep. who. banner. sort. then display the number of files and directories present in that directory.

www.com 8.en. Tanenbaum Sumitabha Das Murugan Sethuraman Yashwant Kanetkar Title Operating System Concepts Opearating Systems Modern Opearating Systems Unix Concepts and Applications Unix Concepts and Programming Unix Shell Programming Publication John Wiley & Sons (Asia) Pte ltd.com 7.wikipedia.com/college/silberschatz6e/0471417432/slides/ppt 5.html MSBTE . www. e. www. www.computerworld. www. www. Websites 1.com 2.computer. Books: Sr. 18/12/2010 24 12178 . 01 02 03 04 05 06 Author Silberschatz Galvin. BPB Publication 2.com/os4e. Tata McGraw-Hill Prentice Hall of India Tata McGraw-Hill Denett & Co.willamstallings.com 3.tatamcgrawhill. Gagne Achyut S. Godbole Andrew S. www.denett. www. www.phindia.html 9.com 4. f Academic Year 2009-10 ‘E’ Scheme Learning Resources: 1.deitel.wiley.w.howstuffworks.Final Copy Dt.org 6.com/books/os3e/slides.No.

Create and manage user. The student will also be able to set up the network configuration between the database clients and servers. Objectives: Student will be able to: 1) 2) 3) Describe the oracle architecture. TU -PR 04 PAPER HRS 03 TH 100 Examination Scheme PR -OR -TW 25@ TOTAL 125 MSBTE . e. Use oracle to manage networking tasks. Create and manage redo & Control files. table spaces. 18/12/2010 25 12179 . (SW) Rationale: In the present era it is very essential to develop and arrange data in such a way that it sales a complex problem efficiently. previteges tables. f Academic Year 2009-10 ‘E’ Scheme Course Name Course Code Semester Subject Title Subject Code : Diploma in Computer Technology : CM : Fifth : Data Base Management ( Elective-I) : 12179 Teaching and Examination Scheme: Teaching Scheme TH 03 NOTE: Two tests each of 25 marks to be conducted as per the schedule given by MSBTE. Data base administration is a subject which emphasis make on managing the data and this duty is performed by the database administrator (DBA). 4) 5) 6) Apply the concept of backup and recovery using user managed and RMAN. roles. Apply tuning concepts to improve the performance.Final Copy Dt.w. indexes and integrit y constraints. After studying this subject the student will be able to handle data collection and management of data and transformation in a secure environment. Total of tests marks for all theory subjects are to be converted out of 50 and to be entered in mark sheet under the head Sessional Work. The position of DBA in the IT industry is important since it deals with critical issues of design and management of database in a comprehensive manner. reform backup and recovery.

Object MSBTE . Recovery networking Facts Concepts of RDBMS. Data. Procedures Oracle Enterprise Manager Tuning and performance procedures RMAN and user managed procedures Principles Control files principles. Database Concepts Integrity and Security Constraints Backup.w. Table Space. e. Storage Structure Principles Security Principles Integrity and Constraint Principles Files. f Academic Year 2009-10 ‘E’ Scheme Learning Structure: Applications Manage the database administration effectively and efficiently for example oracle database administration.Final Copy Dt. 18/12/2010 26 12179 . Database Table.

Optimal flexible architecture. Structures for connecting a user to an oracle Instance. features of the oracle universal Installer. 1. monitor the use of diagnostic files 1. Purpose & structure of online redo log files. Create and manage Initialization parameter files. Control file. 1. Setting of Password file authentication.w. Use of control file.5 Maintaining redo log files. Name of the Topic Hours Marks 01 08 20 MSBTE . 18/12/2010 27 12179 . manage control file with oracle managed files. startup & shutdown an instance. f Academic Year 2009-10 ‘E’ Scheme Contents:. e. Multiplex and manage the control file. Control lock switches and check points. Manage online redo log files with OMF. main components of oracle enterprise manager and their uses. Multiplex and maintain online redo log files. 1.2 Maintaining Control file.4 Creating a Database.Theory Chapter Oracle Architecture.1 Components of Oracle Architecture. Creating a database manually 1.Final Copy Dt. Prerequisite for database creation.3 Managing an Oracle Instance. configure OMF. creating a database using oracle database configuring assistant. Common database administrative tools for DBA.

e. Manage passwords using profiles. obtain constraint information from the data dictionary. 2. implement data integrity constraints. tables. resources and data integrity. 2. 2.1 Managing users. oracle data tupes. get index information from the data dictionary. create table spaces. f Academic Year 2009-10 ‘E’ Scheme Managing Users.w. Creating new database users alter and drop existing database users. create and modity roles. automatic undo management different types of indexes and their uses creating. Role and Database Objects. remove roles. maintain integrity constraints. reorganizing and dropping indexes. 18/12/2010 28 12179 .2 Managing table spaces. structure of a row.5 Managing password security.4 Data dictionary content and usage Data dictionary components. contents and uses of data dictionary. reorganize truncate. Control availability of roles. undo data and indexes logical structure of table spaces within the database. query the data dictionary. Identify system and object privileges. 02 08 20 MSBTE . implement oracle managed files. display role information from the data dictionary. segment types and uses. purpose of undo data. manage storage structures within a table. administrator profiles. control use of resources using profile. user predefined roles. change the storage setting of table spaces.Final Copy Dt. Manageing table spaces. grant and revoke privileges. change the size of the table space allocate table space for temporary segments. keywords that control block spaces usage. various methods of storing data. data files. identify auditing capabilities. creating regular and temporary tebles. Chage the status of table spaces. 2. Monitor information about existing users. privileges and roles. distinguish between an extended versus a restricted row id. get information about storage structures from the data dictionary.3 Storage structure and relationships Logical structure of segments. 2. drop a table.

cleanup after a failed online backup. 18/12/2010 29 12179 . instance recovery.Final Copy Dt.w. importance of check points. • Configuring the database archiving mode Difference between archive log and no archive log modes. memory structures and files related to recovery. resynchronize and reset a database. User managed backups and recovery operations. relocate and recover a table space b y using archived redo log files.1 • Backup and recovery overview. store and run scripts. using RMAN to register. backup issues with read table spaces. e.2 • Oracle recovery manager overview and configuration. configuring RMAN. 3. types of failure in an oracle environment. backup and recovery strategy. types of RMAN specific backups backing up with RMAN. automatic archiving. multiple archiving processes. components. create. backup the control file. recovery through reset logs. catalog backups made with operating system commands. restore and recovery. • User managed backups and RMAN backups. DB verify utility to detect corruption. configure a database for archive log mode. restore data files to different locations. RMAN features. querying recovery catalog to generate reports and lists. contents of recovery catalog. f Academic Year 2009-10 ‘E’ Scheme 03 Oracle Backup and Recovery 3. Basics of database backup. Cross checking of backups. Oracle processes. redo log files and archived log files. • Instance and media recovery structures. • RMAN maintenance and recovery catalog creation and maintenance. recovery of the control file. copy command to create image copies. • User managed incomplete recovery and RMAN incomplete recovery. • User managed complete recovery and RMAN complete recovery. incomplete recovery using RMAN and using enterprise manager. creating the recovery catalog and maintaining it by using RMAN commands. Recovery in non archive log mode and complete recovery in archive log mode using user managed and RMAN. Necessity of incomplete recovery. incomplete recovery with user managed backups. perform closed and open database backups. updating the repository. changing the status of backup and copies. Methods for incomplete recovery. 14 24 MSBTE .

shared server architecture. tuning memory usage. the listener control utility. database registration. tuning tools. tuning data manipulation. using STATSPACK. e. alert log. advanced connection options. configuring service aliases. reducing network traffic. configuring shared server.Final Copy Dt. Use of proper installation process Motor Skills: 1. tuning physical storage. background trace file. 4) Use enterprise manager to create after and drop a table space. testing oracle net connections. using STATSPACK and the automatic work load repository. techniques for name resolution. server generated alerts. 4.1 Networking overview and basic oracle net architecture.3 Managing shares servers Limitations of dedicated server architecture. user trace files. 4. MSBTE .2 Configuring oracle networking. 7) Use enterprise manager to create and manage roles and profiles. 3) Starting up and shutting down database with SQL and Plus and with database control and viewing parameters with database control. 18/12/2010 04 12 20 05 06 16 48 100 30 12179 . Establishing a session. creating and managing a listener. web client connections through oracle networking.w. oracle net services role. Total Practical: Skills to be developed: Intellectual Skills: 1. f Academic Year 2009-10 ‘E’ Scheme Oracle Networking 4. components of oracle net layered architecture. monitoring the shared server when to use the shared server Oracle performance and tunning overview 5.1 Tuning application design. tuning SQL. 5) Use enterprise manager to grant system and manage database user. oracle networking add-on solutions. 6) Use enterprise manager to grant system and object privileges. tuning data access. Managing complex networks. Use of appropriate steps & Sequence List of Practical: 1) Demonstration of Installation of Oracle database software 2) Create a database with database configuration assistant.

e. Learning Resources: 1. 19) Configure RMAN. 18) Set a listener password with isnrctl and creating a listener for external procedural calls.oracle. Books: Sr. and carrying out control file auto backup and restore. 9) Create and Us password profiles 10) Create a listener with database control. 21) Set.oracle. view and clean alerts using DBMS_SERVER_ALERT_AMI and database.com/technology /pub/articles/tech_dba. 16) Run a whole database backup and back up the control file to trace with SQL plus and manage RMAN backups. WebSites: 1) www. f Academic Year 2009-10 ‘E’ Scheme 8) Create database objects and constraints using enterprise manager.html MSBTE . 14) Instance recovery and MTTR to demonstrate the effect of check pointing on MTTR.com/technology /oramag/oracle/03-may/0330cp. 12) Create and undo table space with database control and monitor undo with SQL plus. Recovery a lost of multiplexed online log file and recovery the data from loss of non critical data files. 18/12/2010 31 12179 .Final Copy Dt. 15) Multiplex the redo log and translation the database to archive log mode. oracle net service alias and configure dynamic service registration. 11) Configure and verify shared server and configure a client to choose the connection type. 22) Perform an incomplete recovery with RMAN.w.html 2) www. 20) Create backup sets using RMAN and managing backups. 17) Recovery the data from loss of control file and multiplex online redo log file. 1 2 3 Author Title Oracle Database Log Publication OCP Certification All in one Exam guide Oracle Pears Oracle Pears -- Oracle Database DBA Handbook Oracle 9I Database: Rama Velpuri Fundamentals II exam guide 2. 13) Detect and resolve log connection. No. 23) Use the SQL tuning adviser for database management.

Animation has given a boost to various areas like film production. e. This subject will enable the students to implement their creative imagination to produce animated text & images.I) Subject Code : 12180 Teaching and Examination Scheme: Teaching Scheme TH 03 TU -PR 04* PAPER HRS 03 TH 100 Examination Scheme PR -OR -TW 25@ TOTAL 125 * 2 Sessions of 2 Hrs / Week NOTE: Two tests each of 25 marks to be conducted as per the schedule given by MSBTE. e-learning & animated web-site etc. Export Images. Build Flash Movie. Total of tests marks for all theory subjects are to be converted out of 50 and to be entered in mark sheet under the head Sessional Work. text. images to the controls. Integrate Multimedia In Web Page MSBTE . Build Text-Based Animation. 4.Final Copy Dt. 5. (SW) Rationale: One picture speaks thousand words & animated multimedia picture can speak a lot more. images apply controls. audio & video formats. 2. 3. Import. 8. It is a practical oriented subject which deals with various fonts. Play Movie.w. 6. Students will develop the skill for using the basic shapes. 18/12/2010 32 12180 . Edit Images. Create Animation. Objectives: Students will be able to: 1. Integrate Audio & Video. 7. basic shapes. tools & animation. f Academic Year 2009-10 ‘E’ Scheme Course Name : Diploma in Computer Technology / Information Technology Course Code : CM/IF Semester : Fifth Subject Title : Multimedia and Animation Techniques (Elective. colours to create final animated multimedia object.

18/12/2010 33 12180 . basic shapes Audio & video MSBTE .w. Compression & Compression Text Image Modulation of Audio . e.Final Copy Dt. TIFF. f Academic Year 2009-10 ‘E’ Scheme Learning Structure: Development of animated multimedia object to create movie Application Procedures Tools & control audio & video for Animation & Multimedia Principle File formats RIFF.video Facts Alphabets numbers Symbols Pixels. RTF Fonts & Alignment Colours Concepts Colouring & Editing image Synchronisation. DCT.

3 Synchronization. Document image. Compression. How Good is Picture. CRT display System. Compression/Decompression & File Formats • Need . 08 16 2. Input. Geographics information system maps.Color Gray Scale and Still Video Image . 2.2 Distributed Multimedia. Dye Sublimation 1.3 Storage media Magnetic Media Technology. 2. Evaluating & Visibility Evaluating the Compression System. Image processing and Image Enchancement. OCR. Color Model 01 02 MSBTE . Color Characteristics .1 Multimedia System Architecture. How fast Does it Compress or Decompress. Charge Coupled Devices. Evolving Tech. Image Scanner. Multimedia Data Interface Standard 1. Handwriting recognition. Redundancy & Usability • Compression and Decompressiom Types of compression . e. MIDI. Use of Magnetic Storage in Multimedia. Display System Technology.1 I/P.Final Copy Dt. Output. Types . Full motion Digital Video application and Electronics messaging). Print o/p technology. Flat Panel Display.Pen-Input.2 Evaluation of Multimedia systems Multimedia Elements (Fasimile. 08 16 Multimedia Application(Document imaging . Non textual Image recognition. Fullmotion and live video. Hard disk Technology. Defining Objects for Multimedia Systems. Display Terminology. O/P devices Limitations of Traditional Input Device. for Multimedia.w. 18/12/2010 34 12180 . Digital Camera. Criteria for Selection of RAID. How much. Orchestration & QOS Architecture 2. Digital v/s Analog. Magneto Optical Architecture & Issues For Distributed Multimedia System. f Academic Year 2009-10 ‘E’ Scheme Contents: Theory Chapter Name of the Topic Hours Marks Multimedia Elements Multimedia Application 1.Need of Data Compression . What H/W & S/W Does it take. Optical Media. Holographics images Fractcals). RAID.4 Framework for Multimedia System. photogrphics image. Multimedia System Architecture.

modifying created objects. JPEG-DCT encoding Quantization. AVI Indeo File Format. RIFF waveform Audio File format .TIFF Implementation issues . RIFF DIB’s. TIFF tag . selecting & deselecting elements. f Academic Year 2009-10 ‘E’ Scheme • Video Compression Technique Simple Compression Technique. Distributed Multimedia Databases Multimedia Tool 6. Architecture. BIT stream syntax performance • MPEG2 & MPEG4 Multimedia Authoring and User Interface 4. e. Predictive.4 Multi Server Network topologies 5. fill/attributes. arithmetic)JPEG Compression. Transfer Coding..5 Object Display / Playback Issues Distributed Multimedia Systems 5. AVI RIFF AVI File format. Index Chunk and Boundary condition handling for AVI files. Overview of JPEG Components. different shapes.3 Line tool. predictive lossless coding. Encoding Introduction to Standardization of Algorithm File Formats History of RIF. • JPEG-stastical coding.3 User Interface Design 4. • JPEG-objectives.4 Information Access 4.2 06 08 04 07 16 05 07 20 06 04 08 48 100 MSBTE . TIFF classes RIFF Chunks with two sub chunks . Architecture. text tools & pen tool 6.2 Creating & Modifying elements 6.1 Introduction to Multimedia tool – Flash 6.4 Selecting lines fill with arrow tool. Quantization. using lasso tool performing basic editing tools.1 Components of Distributed Multimedia Systems 5. • Introduction to RIFF. 18/12/2010 35 12180 . TIFF TIFF Specification . The discrete cosine Transfer .5. TIFF structure . Statistical (Huffman. Interpolative. Discrete Transfer.w.1 Multi Media Authoring System and its type 4. Total • • • 3.1 08 16 3. Requirement Addressing JPEG. Zigzag Sequence.Final Copy Dt. List chunk . Definition of JPEG Standard.3 Multimedia Object Server 5. JPEG methodology. RIFF MIDI file Format. JPEG performance • MPEG-objectives.2 Hypermedia Application Design consideration 4.2 Distributed Client Server Operation 5. selecting shapes.

Final Copy Dt. Importing & exporting images. To be able to write program using different implementations for the same problem Identify different types of errors as syntax semantic. Create a forest of trees using the object created earlier.w. Each experiment including mini project shall be stored in the CD and updated after every practical session. fatal. 9. 3. 2. This CD along with workbook shall be submitted as term-work. Create a cycle & name each part of cycle using different styles & format & animate text. MSBTE . f Academic Year 2009-10 ‘E’ Scheme Practical: Skills to be developed: Intellectual skills: • • • • • • Use of programming language. 8. Students must also do a mini project covering practical knowledge gained in the subject & submit a brief project report in work book. Interfacing digital-web-cam. List of Experiments: 1. Draw seed & create small plant with use of at least 4 frames. Practical Content: All of the experiment shall be performed using MS-Flash or 3D-MAX or MAYA. 7. apply different image editing tools. This report should also include the importance of the project from industry point of view. Also add lighting and rain effect. Assessment shall be done based on the work-book and the CD. To be able to apply different logics to solve given problem. 4. Mini Project: Students should create a movie of minimum 2 minutes playtime using either Flash or 3D-MAX or MAYA software. e. 6. linker & logical Debugging of programs Understanding different steps to develop program such as Motor skills: • Proper handling of Computer System. Insert audio to relevant frames that has lighting & rain effect. 18/12/2010 36 12180 . capturing live image & editing using web-cam software. Convert created work into file format which can be publish on web. Create a forest of tree with flowers & fruits from a small plant using different layers & frame transition time. 5. Students shall maintain a work-book giving details of the work-carried out during every practical session.

F.D. Steimnetz. Andheigh. Nahrstedt J.w. W. Communication and Application Multimedia Communication Directions and Innovations Computer Networking Publication Prentice Hall of India Pearson Education Pearson Education Pearson Education Pearson Education Academic Press. Kiran Thakrar. Gibson J. K. No. 18/12/2010 37 12180 . John F Koegel Buford Katherine Ulrich Free Halshall R. Hardcourt India Pearson Education MSBTE . f Academic Year 2009-10 ‘E’ Scheme Learning Resources: Books: Sr. Rose Title Multimedia Systems Design Multimedia Systems Micromedia Flash for Windows and Macintosh Multimedia Communication Multimedia Computing. Kurose. K.Final Copy Dt. e. 01 02 03 04 05 06 07 Author Prabhat k.

Explain architecture and memory management of 80286. Objectives: Students will be able to: 1. This will enable students to write efficient programs in assembly language. MSBTE . five stage pipelining architecture & incorporating parallelism. Describe features and architecture of 80486.Final Copy Dt. 80486. f Academic Year 2009-10 ‘E’ Scheme Course Name : Diploma in Computer Engineering Course Code : CO/CD Semester : Fifth for CO and Sixth for CD Subject Title : Advanced Microprocessor (Elective-I) Subject Code : 12181 Teaching and Examination Scheme: Teaching Scheme TH 03 TU -PR 04 PAPER HRS 03 TH 100 PR -Examination Scheme OR -TW 25@ TOTAL 125 NOTE: Two tests each of 25 marks to be conducted as per the schedule given by MSBTE. 18/12/2010 38 12181 . privilege & protection. so the microprocessor Intel 80286 was introduced with memory management. The 8086 has certain limitations. Know architecture and memory management of 80386. Programming in assembly using different functions of DOS & BIOS interrupts. 2. Total of tests marks for all theory subjects are to be converted out of 50 and to be entered in mark sheet under the head Sessional Work. This subject covers the fundamental concepts of advanced microprocessors and their architectures. (SW) Rationale: Advanced microprocessors are the requirement of current market. State the concept of paging 5. It covers the interesting programming & application part of microprocessors. 4. enhanced instruction set. The Intel 80386. as they are extensively used in industrial area. Explain concepts of multitasking 3. with high speed execution. The importance of microprocessor based system design cannot be underestimated in today’s world. Pentium are the advanced microprocessors which support multitasking. e. 6.w. Pentium.

Microprocessor. Descriptors. Instruction Syntax and Logic Development.w. Bus. writing programs (Real. 18/12/2010 39 12181 . Pentium based microprocessor systems designs & programming. Segments.Final Copy Dt. e. Hardware. Cache register. Debug register. Principles Principles of memory management. Linking Debugging. 486. Control Register. Execution of program. Coding Assembling. PVAM. Facts MSBTE . Application Procedure Address generation. paging. f Academic Year 2009-10 ‘E’ Scheme Learning Structure: Enable to develop 80386.) Concepts Selector.

2. virtual 8086. 1.com and . DOS kernel. real. 32-bit Microprocessor –Intel 80386. Selector. GDT. Enabling and disabling paging (Machine Status word) Interrupts of X86 microprocessor: 3. Salient features of Pentium System architecture (Super08 scalar Execution.w. DOS & BIOS Interface. Test registers. privilege protections.1 Salient features. Interrupt vector table. LDT. segment register.2 Addressing modes of 80386. DOS& BIOS Interrupts. To be able to write program using different implementations for the same problem Study different types of errors as syntax semantic. Loading of MS-DOS introduction to . Branch prediction. segment descriptor cache register) 14 1. Floating Point Exceptions. TR. Control 14 register.1 Salient features of 486.1 Salient features. Register organization. Total 48 Marks 16 01 16 02 30 03 22 04 16 100 Practical: Skills to be developed: Intellectual skills: • • • • • Use of programming language constructs in program implementation To be able to apply different logics to solve given problem.2 Introduction to MS-DOS. Separate code & data cache. paging. System address register LDTR & GDTR. Internal architecture. 2. PVAM. command processor).exe programs. e.Intel 80286. Interrupt processing sequence. IDT. instruction pointer. paging. INTO instructions) 12 3.2 Addressing mode such as Real. f Academic Year 2009-10 ‘E’ Scheme Contents: Theory Chapter Name of the Topic Hours 16-bit Microprocessor . status and control register. segment register. Register organization (General-purpose register. divide by zero/overflow. Debug register. instruction pointer. (General purpose register. internal architecture. 18/12/2010 . Interrupt Services. Address translation in real. Descriptors and its types.1 Introduction to X86 interrupts (Hardware. The structure of MS-DOS (BIOS Module. non-maskable. PVAM. Operations of 80286 in Real and PVAM. overflow) software interrupts (INT. status and control register. breakpoint. Segment descriptor cache register. linker & logical Debugging of programs 40 12181 MSBTE . Protected Virtual Addressing mode. Advanced Microprocessors (Intel 486 & Pentium) 4. software and exceptions). fatal. Hardware or exception interrupts (Singles step.Final Copy Dt.

08H. 05H of DOS INT 21 H and 00H (Print character) of BIOS INT 17H and program to print ASCII character set on printer. 47H(Get current directory) of DOS INT 21Hand program to simulate CD (Change directory) and PWD (Present Working Directory) commands. List of Practical: 1) Write an assignment on keyboard and display function 01H. data area and disk processing functions 02H(Read Sector). 07H (Scroll screen down) of BIOS INT 10H and program to simulate CLS (Clear Screen) command. • Testing. 2) Write an assignment on keyboard functions 02H of BIOS INT 16H (Get Keyboard Flags) and program to display the status of keys described in 02H functions of BIOS INT 16H. 7) Write an assignment on directory functions 3BH (Change Directory). 11) Write a program to display the status of Flag register and Machine Status Word register of 286 on the screen. disk system area. 8) Write an assignment on Disk Storage Organization i. Line Feed. Carriage Return.09H. 9) Write a program to read any sector from floppy and display the contents of that sector on the screen.e. 56H (Rename file) of DOS INT 21H and program to simulate DEL (Delete file) and REN (Rename file) command. cluster. 3AH (Delete directory) of DOS INT 21H and program to simulate MD (Make directory).. MSBTE . 4) Write an assignment on ASCIIZ string. 3) Write an assignment on screen functions 06H (Scroll screen up).02H. 03H (Write sector) of BIOS INT 13H. e. Horizontal TAB.0AH of DOS INT 21H and program to read password & validate the user.e.) Motor skills: • Proper handling of Computer System.Final Copy Dt. 12) Write a program to display the status of Flag register and Machine Status Word register Of 386 on the screen. 5) Write an assignment on file functions 43H (Set/Get file attribute) and 57H (Set/Get file time & date) of DOS INT 21H and program to display the attribute and date/ time of any file. 10) Write an assignment on Printer Control Characters i. • Design of logic • Coding. • Maintenance (Modifications.w. track. 18/12/2010 41 12181 . • Analysis. cylinder. Error corrections. Making changes etc. file handle. sector. file functions 41H (delete file). f Academic Year 2009-10 ‘E’ Scheme • Understanding different steps to develop program such as • Problem definition. 6) Write an assignment on directory functions 39H (Create directory). Form Feed. RD (Remove Directory) commands. Printer function 40H.

01 02 03 Author Peter Abel A. M.intel. DOS Programming Publication Prentice Hall India TATA McGraw Hill BPB Publication 2.pcguide. e. Ray.Final Copy Dt.com /engineering_parts/microprocessor. Books Sr. K.w.techsource. K. Website: > www. MSBTE . 18/12/2010 42 12181 . No.com/ref/CPU > www. Bhurchandi Ray Duncan Book Title IBM-PC assembly language & programming Advanced microprocessor & peripheral Advanced MS.com > www.html Demo lectures with power point presentations using LCD projector should be arranged to develop programming concepts of students. f Academic Year 2009-10 ‘E’ Scheme Learning Recourses: 1.

Window provides rich programming environment that supplies extensive support for developing easy to use and consistent user interface. (SW) TU -PR 04 PAPER HRS 03 TH 100 Examination Scheme PR -OR -TW 25@ TOTAL 125 Rationale: Microsoft Window is a graphical environment. Total of tests marks for all theory subjects are to be converted out of 50 and to be entered in mark sheet under the head Sessional Work. This Subject covers from Basics to writing codes for Keyboard & Mouse handling. Develop program for drawing dot. 3. Scroll bars etc. Handle Keyboard and Mouse input through programs. Objectives: Students will be able to: 1. f Academic Year 2009-10 ‘E’ Scheme Course Name : Diploma in Computer Engineering/ Information Technology Course Code : CO/IF/CD Semester : Fifth for CO and Sixth for CD Subject Title : Windows Programming (Elective-I) Subject Code : 12182 Teaching and Examination Scheme: Teaching Scheme TH 03 NOTE: Two tests each of 25 marks to be conducted as per the schedule given by MSBTE.w. Write simple windows under ‘C’ programs using VC++ environment. Create Checkbox. ActiveX controls are pieces of Software that you can easily “Plug” in to your Visual C++ environment. e. Class wizards write code for you! In the industry this type of program is often referred to as a CASE (Computer Aided Software Engineering). 4. Visual C++ has powerful features for writing windows applications such as class wizards and ActiveX controls. Windows provides device independent graphics thereby allowing you to write programs without having detail knowledge of the hardware platform on which they will eventually run.. 2. 5. 43 12182 MSBTE . lines and shapes.Final Copy Dt. Use Visual C++ environment. 18/12/2010 .

w. 18/12/2010 44 12182 . Procedures Coding & Debugging Execution of program Reusability Concepts Concepts of syntax. semantic & logic development Object Oriented Programming Concepts Concepts of Windows & Windows Messaging Facts Operators.Final Copy Dt. e. Classes. Objects and Methods MSBTE . f Academic Year 2009-10 ‘E’ Scheme Learning Structure: Application Develop systems software program using VC++. & Expressions.

and the Window Procedure. Capturing the Mouse. the Message Loop. Mouse double-clicks. Formatting Message Box.2 • Registering the Window Class. Using Child Windows for Hit-Testing.1 Keyboard Basics.1 • An Introduction to GDI. Your First Windows Program. Drawing Filled Area. The char Data Type. The Device Context. The Foreign-Language Keyboard Problem. Regions. Character Messages. The Caret (Not the Cursor). A Sample Program 4. Client-Area Mouse Messages. f Academic Year 2009-10 ‘E’ Scheme Contents: Theory Chapter Name of the Topic Overview of Windows messaging. Windows' String Functions. A Brief History of Character Sets 20 American Standards. Using printf in Windows.1 • The Windows Environment.w. e. 2. • The MessageBox Function.2 • Emulating the Mouse with the Keyboard. The Keyboard 3. The GDI Mapping Mode Rectangles. The Hit-Test Message. The GDI Philosophy. 1. Windows Programming Options. Setting Pixels. The Mouse 4.1 • Mouse Basics. Nonclient-Area Mouse Messages. 18/12/2010 45 12182 . 1. Filling in the Gaps.Final Copy Dt. Simple Mouse Processing: An Example. APIs and Memory Models. Keystrokes and Characters. The Caret Functions. Using Keystroke Messages. Hours Marks 01 12 24 02 10 24 03 08 16 04 08 16 MSBTE . The Structure of GDI. History of Windows. Creating the Window. Aspects of Windows. GDI and Basic Drawings 2. The GDI Primitives. Wide Characters and C.2 • Drawing Dots and Lines. Keyboard Messages and Character Sets. Displaying the Window. and Clipping. The KEYVIEW1 Program. The GDI Function Calls. The Programming Environment.

The WM_CTLCOLORBTN Message.w. Understanding different steps to develop program such as. No. Check Boxes. Group Boxes. Push Buttons. Buttons and Input Focus. Changing the Button Text.1 • The Button Class. Putting Strings in the List Box. The Button Colors.2 • 10 20 48 100 Practical: Skills to be developed: Intellectual skills: • • • • • • Use of programming language. Resizing windows Program on handling mouse Creating different controls (such as checkbox. Identify different types of errors as syntax semantic. Radio Buttons. 1 2 3 4 5 6 7 8 9 Title of Experiment Demonstration of Visual Environment Writing simple ‘C’ under windows programs using VC++ Writing programs on drawing dots. filling different shapes. lines. List of Practical: Sr. The Scroll Bar Class 383 The COLORS1 Program Coloring the Background. Debugging of programs. List Box Styles. Controls and Colors. Visible and Enabled Buttons. To be able to apply different logics to solve given problem. linker & logical. Selecting and Extracting Entries. Motor skills: • Proper handling of Computer System. System Colors. e. Total 05 5. scrollbar. Coloring the Scroll Bars and Static Text. etc) Program on timer demonstration No of Practical 1 2 8 2 1 2 2 6 2 MSBTE . Program on reading keystrokes from Keyboard. rectangles. 18/12/2010 46 12182 . To be able to write program using different implementations for the same problem. A Simple List Box Application. Creating the Child Windows. f Academic Year 2009-10 ‘E’ Scheme Client Window Controls 5. Program on displaying text at desired window Finding size. The Listbox Class.Final Copy Dt. fatal.

com/programming/visual-cpp. 18/12/2010 47 12182 .Final Copy Dt.edu/~kay/cpp/vc6_tutorial/ http://www.html http://www.onesmartclick.rowan. f Academic Year 2009-10 ‘E’ Scheme Learning Recourses: 1. Books Sr. Rector Joseph M.No. Website http://elvis.w.com/visualc/ MSBTE . Newcomer Title Publication Microsoft Press Addison Wesley Programming Windows Win32 Programming 2.functionx. e. 1 2 Author Charles Petzold Brent E.

MSBTE . So. f Academic Year 2009-10 ‘E’ Scheme Course Name : Computer Engineering Group Course Code : CO/CM/CD/IF Semester : Fifth for CO/CM/IF and Sixth for CD Subject Title : Network Management and Administration Subject Code : 12183 Teaching and Examination Scheme: Teaching Scheme TH 01 TU -PR 04 PAPER HRS. directories. The task of connecting our stand-alone computers often requires a thorough knowledge of connectivity. 3. 7. 5. With the proper configuration of operating system on the server. The users may have a need to access data or execute applications software that resides on another computer. folders. Configure the networking resources and software from the server. Know the network management and administration. Troubleshoot and repair the network faults. 18/12/2010 48 12183 . Apply the different types of network technologies for internet connection. scanner. Objective: The students will be able to: 1. It provides practical knowledge that will enable the students to get a connectivity job done quickly and easily so the students can get on with the applications and data sharing work they need to do. This subject is network application based subject. e. In each and every field. 2. hardware and software. Again the user may need special processing capabilities that are only available on the other computer. applications. driver and also software like files. programs etc.Final Copy Dt. Describe the different types of network directory services. -TH -Examination Scheme PR -OR 25# TW 25@ TOTAL 50 Rationale: It is an era of computers.w. It gives the practical knowledge of designing computer network while using any type of topologies. the students will manage and administer the network resources or devices such as printers. personal computer users have a need to connect their intelligent workstation to other computers for sharing peripherals such as printers with a user at another personal computer. This subject covers the installation and configuration of any network operating system. 6. 4. computers are used for different applications. Design the computer network. Compare different types of network.

Administering. Configure. f Academic Year 2009-10 ‘E’ Scheme Learning Structure: Application Design. Managing Network Conceptual Client/ Server Peer-toPeer Network Directory Services Network Connection Services Facts Study of Networking Devices.Final Copy Dt. Windows 2000 server Troubleshooting of Network Problem Principle Principles of Designing Network Principles of Configuring. Administer. Hardware MSBTE . Media. e.w. Manage. Troubleshoot Network Procedural Installation of NIC. 18/12/2010 49 12183 .

Forests. Adding the DHCP and WINS roles. 4. Modifying User Account.2 Introduction to Domain Name System(DNS) . 4.3 Active Directory Architecture – Object Types. Network Engineer. Implementation of Network 3. DNS Functions. 4. VPN Clients. LDAP Notation.Understand Network Printing Concepts. Locally connected print devices. DHCP Architecture. Object Naming. Definition of Novelle Directory. Windows NT domains. CATV. Administering Windows 2000 Server (The Basics) 4. Resolving a Domain Name. Users. Growth and Capacity Planning. 2.Preparing for Installation. Other Network Related Jobs. Choosing Servers. Choosing Network Structure.w. User Principle Names. 1. Network Connection and Printing Services 2. Reverse Address Resolution Protocol (RARP). Lightweight Directory Access Protocol.4 Remote Network Access – Need of Remote Network Access.Adding a User. Roots and Leaves. Network Services. Deleting or Disabling a User Account.1 Dynamic Host Configuration Protocol (DHCP) – DHCP Origins.Define Directory Services. SSL VPNs. Installing windows 2003 server. DNS Name Resolution. 1. Meeting Network Needs – Choosing Network Type. Sub domains. Maintaining Group Membership. DHCP Objectives. Trees & Forests. Integrated Services Digital Network. X500 Directory Access Protocol.5 Virtual Private Network – VPN Protocols. f Academic Year 2009-10 ‘E’ Scheme Contents: Theory Chapter Name of the Topic Exploring Directory Services and Remote Network Access. Shared print devices. 2. Globally unique identifiers. Types of VPNs. Resolves. The Bootstrap Protocol (BOOTP). Applications. 1. Second Level Domains. 18/12/2010 12183 . Setting up local print devices. Trees. Public Switched Telephone Network.1 Designing Network – Accessing Network Needs.2 Working With Windows 2000 Security Groups – Creating Group.Final Copy Dt. 1. DNS Requests. Resource Records. Add Print Wizard. Digital Subscriber Line.4 Administering Printer Shares – Setting up Network Printer. 3. Domain. Sharing Locally Attached Print Devices. IP Address Assignment. Security and Safety.Creating Domain controller.1 Network Related Jobs – Network Administrator. Cresting Shares. Top Level Domains.3 Understand Network Printing Concepts .2 Directory Services .3 Working with Shares – Understanding Share Security. Root Name Servers. 1. Adding Web based Administration. Creating windows 2003 server boot disk. Mapping Drives 4.3 Setting windows 2003 server . DNS Name Registration.DNS Objectives.2 Installing and Configuring Windows 2003 Server . Domain Naming. Adding file server and print server. Network Architecture / Designer. Microsoft’s Active Directory. e. Describe Windows Network Printing.3 Working with Windows 2000 Backup – Using Windows 2000 Servers Backup Software 50 Hours 01 02 02 02 03 04 04 04 MSBTE .1 Working With User Accounts . Configuring server/ client 3. Canonical Names.

18/12/2010 51 12183 . Monitoring and Troubleshooting Tools 5. 1 2 3 4 5 6 7 8 Practical Name Creating Windows 2003 Server Boot Disk. Software Tools. Setting Priorities. 1 Author Craig Zacker Title The Complete Reference Networking Publication Tata McGraw-Hill Edition MSBTE .2 Troubleshooting Tools – Hardware Tools. Practices and user education. Denial services threats.4 External Threats – Front Door threats. Installing Windows 2003 Server Installing Active Directory Creating AD Objects Setting up Local Print Device Installing and Configuring a Network – Capable Print Device Create new Users & give the Permission Group of four students prepare a mini report on Latest Networking Technology Learning Resources: 1. Books: Sr. worms and other Malicious codes. No. Back Door threats. File and Directory permissions. Viruses. No.3 Internal Security – Account Security. Total 04 16 Practical: Skills to be developed: Intellectual skills: Fault finding of network Troubleshooting of network Proper installation of network Motor skills: • Proper handling of Computer System hardware. f Academic Year 2009-10 ‘E’ Scheme 05 Troubleshooting and security of Network 5. List of Practical: Sr. 5. 5. e. Segmenting the Problem.1 Understanding the Problem – Troubleshooting. Isolating the Problem.Final Copy Dt.w.

McMohan. Sources of Information – MSBTE . e.Final Copy Dt. f Academic Year 2009-10 ‘E’ Scheme 2 3 4 5 Bruce Hallberg Richard A. 18/12/2010 52 12183 .w. Sir Microsoft Press Microsoft Press Networking A Beginner’s Guide Introduction to Networking Networking + Certification Training Kit MCSE Training Kit Networking Essential Plus 1) Computer Magazine 3) PC Quest 5) Internet Tata McGraw-Hill Edition Tata McGraw-Hill Edition --2) Computer Today 4) Information Technology 6) Linux for U 2.

Due to globalization and competition in the industrial and service sectors the selection for the job is based on campus interviews or competitive tests. f Academic Year 2009-10 ‘E’ Scheme Course Name : Computer Engineering Group Course Code : CO/CM/IF/CD Semester : Fifth for CO/CM/IF and Sixth for CD Subject Title : Professional Practices-V Subject Code : 12184 Teaching and Examination Scheme: Teaching Scheme Examination Scheme TH -- TU -- PR 03 PAPER HRS -- TH -- PR -- OR -- TW 50@ TOTAL 50 Rationale: Most of the diploma holders in industries. seminars on technical topics and group discussion are planned in a semester so that there will be increased participation of students in learning process. 18/12/2010 53 12184 . MSBTE . Prepare a report on industrial visit. 4. Interact with peers to share thoughts. 3. Acquire information from different sources. ability to communicate and attitude. Present given topic in a seminar. in addition to basic technological concepts. Industrial visits. 2.w. 5. The purpose of introducing professional practices is to provide opportunity to students to undergo activities which will enable them to develop confidence. e. While selecting candidates a normal practice adopted is to see general confidence. expert lecture. Objectives: Student will be able to: 1. Prepare notes for given topic. expert lectures.Final Copy Dt.

f Academic Year 2009-10 ‘E’ Scheme Learning Structure: Application Apply principles of inter communication in group discussion for self learning Procedure Use proper techniques for participation in group discussion Concept Principles of group work and communication Facts Group of Student.Final Copy Dt. 18/12/2010 54 12184 .w. e. Topic for Discussion MSBTE .

Study their network (Cable layout.) from the following or like topics. Visit any IT industry/ computer center. Group Discussion : The students should discuss in group of six to eight students and write a brief report on the same as a part of term work.Final Copy Dt. professionals is/are to be arranged (minimum 3 nos. f Academic Year 2009-10 ‘E’ Scheme Contents: Activity Content Industrial Visits Structured industrial visits be arranged and report of the same should be submitted by the individual student.commerce j) Any other suitable topic Information Search 03 Each student will search topic for Industrial project of sixth semester and prepare synopsis and project plan. Each student shall submit a report of at least 10 pages and deliver a seminar (Presentation time – 10 minutes) Current issues. Some of the suggested topics are 04 i) ii) iii) iv) v) vi) Seminar : Seminar should be on selected industrial project’s synopsis and week wise plan for 05 completion of project. Load shading and remedial measures.w. a) IT – Current Scenario b) Software engineering Industrial applications c) Animation techniques d) Certification course guidance e) Carrier guidance f) Preparation of Bio-data g) Linux Installation and administration h) Entrepreneurship development i) E . to form a part of the term work. Get it approved from concerned authority. devices used/software/costing) The Guest Lecture/s from field/industry experts. The brief report is to be submitted on the guest lecture by each student as a part of Term work. Use of mobile in college campus Brain drain Internet surfing good or bad Any another suitable topic 01 02 MSBTE . e. 30/08/2010 55 12184 . The faculty members may select the topic of group discussions.

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master Your Semester with a Special Offer from Scribd & The New York Times

Cancel anytime.