Page 1 of 47

DISTANCE EDUCATION
ANNA UNIVERSITY CHENNAI : : CHENNAI 600 025 REGULATIONS - 2009 CURRICULUM AND SYLLABI FOR I SEMESTER

MASTER OF COMPUTER APPLICATION (MCA)
SEMESTER I

CODE NO. THEORY DMC1911 DMC1912 DMC1913 DMC1914 DMC1915

COURSE TITLE
Computer Organization Problem Solving Programming Database Management System Data Structure Accounting and Financial Management

M 100 100 100 100 100

PRACTICAL DMC1916 Programming and Data Structure Lab DMC1917 Database Management System Lab TOTAL

100 100 700

SEMESTER II
Code No. Theory Course Title Marks

DMC 1921 DMC 1922 DMC 1923 DMC 1924 DMC 1925 DBA 1605 Practical DMC1926 DMC1927

Mathematical Foundations of Computer Science Object Oriented Programming Software Engineering System Software Operating System Communication Skills Object Oriented Programming Lab System Software Lab

100 100 100 100 100 100 100 100

SEMESTER III
Code No. Theory Course Title Marks

DMC1931 DMC1932 DMC1933 DMC1934 DMC1935 Practical DMC1936 DMC1937

Computer Networks Microprocessors and its Applications Design and Analysis of Algorithms Computer Graphics and Multimedia Systems Web Programming Elective I Web Programming Lab Graphics and Multimedia Lab

100 100 100 100 100 100 100

Page 2 of 47 SEMESTER IV
Code No. Theory Course Title Marks

DMC1941 DMC1942 DMC1943 DMC1944 DMC1945 Practical DMC1946 DMC1947

Unix and Network Programming Resource Management Techniques Object Oriented Analysis and Design Visual Programming Middleware Technologies Elective II Network Programming Lab Visual Programming Lab

100 100 100 100 100 100 100 100

SEMESTER V
Code No. Theory Course Title Marks

DMC1951 DMC1952

XML and Web Services Software Project Management Elective III Elective IV Elective V XML and Web Services Lab Software Development Lab

100 100 100 100 100 100 100

Practical DMC1953 DMC1954

SEMESTER VI
Code No. Course Title Marks

DMC1961

Project Work

400

Page 3 of 47 LIST OF ELECTIVES M.C.A (MASTER OF COMPUTER APPLICATIONS)
III Semester M C A – Elective I S. No. Code No. 1. 2. 3. DMC 1971 DMC 1972 DMC 1973 Course Title Advanced Databases TCP/IP Protocol Suite Management Information System Marks 100 100 100

IV Semester M C A – Elective II S. No. Code No. 1. 2. 3. DMC 1974 DMC 1975 DMC 1976 Course Title Mobile Computing Software Agents Human Resource Management Marks 100 100 100

V Semester M C A – Elective III S. No. Code No. 1. 2. 3. DMC 1977 DMC1978 DMC 1979 Course Title Information Security Introduction to E-Learning Health Care Information System Marks 100 100 100

V Semester M C A – Elective IV S. No. Code No. 1. 2. 3. DMC 1980 DMC 1981 DMC 1982 Course Title Electronic Commerce Instructional Design for E-Learning Knowledge Management Marks 100 100 100

V Semester M C A – Elective V S. No. Code No. 1. 2. 3. DMC 1983 DMC 1984 DMC 1985 Course Title Web Graphics E-Learning Technology Data Warehousing and Data Mining Marks 100 100 100

Page 4 of 47

ANNA UNIVERSITY CHENNAI MCA (DISTANCE MODE)
REGULATIONS – 2009 SYLLABUS I TO VI SEMESTERS SEMESTER – I DMC1911 COMPUTER ORGANIZATION

UNIT I INTRODUCTION TO DIGITAL DESIGN Data Representation – Data Types – Complements – Arithmetic Operations – Representations – Fixed –Point, Floating – Point , Decimal Fixed – Point – Binary Codes- Logic Gates, Boolean Algebra, Map Simplification – Combinational Circuits: Half-Adder, Full Adder- Flip Flops - Sequential Circuits UNIT II DIGITAL COMPONENTS - REGISTER TRANSFER & MICRO OPERATIONS ICs – Decoders – Multiplexers – Registers – Shift Registers – Binary Counters – Memory Unit – Register Transfer Language – Register Transfer – Bus And Memory Transfers – Arithmetic, Logic And Shift Micro Operations, Arithmetic Logic Shift Unit. UNIT III COMPUTER ORGANIZATION AND PROGRAMMING Instruction Codes – Computer Registers – Computer Instructions – Timing And Control – Instruction Cycle – Memory Reference Instructions – I/O And Interrupt – Machine Language – Assembly Language – Assembler - Program Loops – Programming Arithmetic And Logic Operations – Subroutines – I/O Programming. UNIT IV INPUT – OUTPUT ORGANIZATION Peripheral Devices – Input-Output Interface – Asynchronous Data Transfer – Modes Of Transfer – Priority Interrupt – DMA – IOP – Serial Communication. UNIT V MEMORY ORGANIZATION AND CPU

Memory Hierarchy – Main Memory – Auxiliary Memory – Associative Memory – Cache Memory – Virtual Memory – Memory Management Hardware – CPU: General Register Organization – Control Word – Stack Organization – Instruction Format – Addressing Modes – Data Transfer And Manipulation – Program Control. TEXTBOOK 1. M.Morris Mano,”Computer System Architecture”,Prentice Hall of India, 2001. REFERNCES 1. John .p.Hayes,”Computer Architecture and Organization”, Tata McGraw Hill, 1996. 2. V.C.Hamatcher,et al “Computer Organization”, Tata Mcgraw Hill,1996

Gottfried “Schaum’s Outline of Programming with C ”.IF. 2nd Edition. 2. Nested IF – Switch – goto .While.Balagurusamy “ Programming in ANSI C ” . UNIT IV ARRAYS. UNIT III INTRODUCTION TO C LANGUAGE Overview of C – Constants. 2004 REFERNCES 1.File Management in C – Dynamic Memory allocation – Linked Lists – Preprocessors. Variables and Data Types – Operators and Expressions – Managing Input/Output Operations – Formatted I/O – Decision Making . 2.Character arrays and Strings – String handling Functions . 2001 Brian W.Dromey “ How to Solve it by Computer ”.G. Deitel and Deitel “ C How to Program ”.Looping. Tata McGraw Hill.Kernighan & Dennis Ritchie “C Programming Language”.S.User defined Functions – Categories of Functions – Recursion Structures and Unions – Array of Structures – Structures and Functions UNIT V POINTERS AND FILE MANAGEMENT Pointers – Declaration. 1990 Byron. TEXTBOOKS 1.1996 .Branching –. 3. do. 1998 E. character strings. PHI. pointers to functions and structures . PHI . Accessing a variable. R. Addisson Wesley . FUNCTIONS.Page 5 of 47 DMC1912 PROBLEM SOLVING AND PROGRAMMING UNIT I INTRODUCTION TO COMPUTER PROBLEM SOLVING Introduction – The Problem Solving aspect – Top down Design – Implementation of Algorithms – Program Verification – Efficiency of Algorithms – Analysis of Algorithms UNIT II FUNDAMENTAL ALGORITHMS Introduction – Exchanging the values – Counting – Factorial Computation – SINE computation – Base Conversion – Factoring Methods – Array Techniques. for statements. STRUCTURES AND UNIONS Arrays – dynamic and multi-dimensional arrays .

File Systems-View of Data.Korth and S.Evaluation of Expressions .Join Operation . Tata McGraw Hill. 2002 Raghu Ramakrishnan & Johannesgerhrke. ”Data Base Management Systems”. Mc Graw Hill International Edition.”Database System Concepts”. 2000 .Selection Operation – Sorting .Page 6 of 47 DMC1913 DATABASE MANAGEMENT SYSTEMS UNIT I INTRODUCTION Database Systems vs.Data Models-Database LanguagesTransaction Management-Database Systems Structure-History of Database SystemsDatabase Systems Applications-Entity Relationship Model UNIT II RELATIONAL DATABASES SQL-Basic Structure-Set Operations-Complex Queries-Joined Queries-DDL-Embedded SQL-Dynamic SQL-Other SQL Functions-Query by Example-Integrity and Security of searching-Relational Database Design UNIT III DATA STORAGE AND INDEXING Storage & File Structure-Disks-RAID-File Organization-Indexing &Hashing-B+ TREE-B Tree-Static Hashing-Dynamic Hashing-Multiple Key Access UNIT IV QUERY EVALUATION & OPTIMIZATION Query Processing . Abraham Silberschatz. 2.Query Optimization UNIT V TRANSACTION MANAGEMENT Transaction Concept-Static Implementation-Concurrency Control-Protocols-Deadlock Handling-Recovery Systems-Recovery with Concurrent Transactions-Shadow PagingBuffer Management-Case Studies-Oracle-Microsoft SQL Server REFERENCES 1. 4th Edition. Hentry F.Sudharssan.

Binary Tree Representations – node representation. Second Edition. Garbage Collection.Linked representation of Graphs – Graph Traversals UNIT V STORAGE MANAGEMENT General Lists: Operations.S. Weiss “Data Structures and Algorithm Analysis in C ” . 2. linked list representation. UNIT IV GRAPHS AND THEIR APPLICATIONS Graphs – An application of graphs – Representation – transitive closure . Collection and compaction TEXTBOOK 1. Augestein M. lists – Applications of Stack.Langram Pearson Education . implicit array representation – Binary tree Traversals .1991. Algorithms. internal and external nodes. UNIT II TREES Binary Trees – Operations on binary trees . Y. Freeing list nodes Automatic list Management: Reference count method. using lists.Prentice Hall . 2004 REFERNCES 1. 1997.Page 7 of 47 DMC1914 DATA STRUCTURE UNIT I DATA STRUCTURES Introduction – Arrays – Structures – Stack: Definition and examples.Warshall’s algorithm – Shortest path algorithm .Huffman Algorithm – Representing Lists as Binary Trees UNIT III SORTING AND SEARCHING General Background – Exchange sorts – Selection and Tree Sorting – Insertion Sorts – Merge and Radix Sorts – Basic Search Techniques – Tree Searching – General Search Trees – Hashing. 2nd edition.a flow Problem – Dijkstra’s algorithm – An application of scheduling . Representing Stacks .Addison Wesley ..Queues and lists: Queue and its Representation. Queue and Linked Lists.J “ Data Structures using C” . Robert Kruse & Clovis L. Tanaenbaum A.. Tondo “ Data Structures and Program Design in C”.

Pandey. “Elements of Management Accounting” Vikas Publishing House. 2. 2002 REFERENCES 1.P. Vikas Publications. “Cost and Management Accounting”.DMC1915 Page 8 of 47 ACCOUNTING AND FINANCIAL MANAGEMENT UNIT I FINANCIAL ACCOUNTING Meaning and Scope of Accounting-Principles-Concepts-Conventions-Accounting Standards-Final Accounts-Trail Balance-Trading Account-Profit and Loss AccountBalance Sheet-Accounting Ratio Analysis-Funds Flow Analysis-Cash Flow Analysis UNIT II ACCOUNTING Meaning-Objectives-Elements of Cost-Cost Sheet-Marginal Costing and Cost Volume Profit Analysis-Break Even Analysis-Applications-Limitations-Standard Costing and Variance Analysis-Material-Labor-Overhead-Sales-Profit Variances UNIT III BUDGETS AND BUDGETING CONTROL Budgets and Budgetary Control-Meaning-Types-Sales Budget-Production Budget-Cost of Production Budget-Flexible Budgeting-Cash Budget-Master Budget-Zero Base Budgeting-Computerized Accounting UNIT IV INVESTMENT DECISION AND COST OF CAPITAL Objectives and Functions of Financial Management-Risk-Return Relationship-Time Value of Money Concepts-Capital Budgeting-Methods of Appraisal-Cost of Capital Factors Affecting Cost of Capital-Computation for Each Source of Finance and Weighted Average Cost of Capital UNIT V FINANCING DECISION AND WORKING CAPITAL MANAGEMENT Capital Structure-Factors Affecting Capital Structure-Dividend Policy-Types of Dividend Policy-Concepts of Working Capital-Working Capital Policies-Factors affecting Working Capital-Estimation of Working Capital Requirements TEXTBOOK 1. S. I.N.M. I. 1993 . ”Financial Management”. 4th Reprint.Iyengar.M. “Financial and Management Accounting”. S.Pandey.Maheswari. 2003 2. Sultan Chand & Sons. Sultan Chand & Co.

Procedures and Functions 6. b. DELETE and UPDATE in tables SELECT. Creation of base tables and views. Oracle or SQL Server Triggers.DMC1916 • • • • • • • • • Page 9 of 47 PROGRAMMING and DATA STRUCTURES LABORATORY Simple C programs Files and Structures Array Implementation Dynamic Memory allocation Implementation of Stacks Linked List Implementation Queue Implementation Implementation of Binary Search Tree and Linear Search Sorting Algorithm. Menus and Reports. Front-end tools – Visual Basic/Developer 2000 . Simple sorting and Queue Sorting DMC1917 DBMS LAB 1. c. Embedded SQL or Database Connectivity. 2. High level language extensions – PL/SQL. a. Or Transact SQL 5. Working with Forms. Sub Queries and JOIN 3. Data Control Commands 4. Data Manipulation INSERT. Use of Cursors.

Truth table .Cayley Hamilton Theorem UNIT II BASIC SET THEORY Basic Definitions .Laws of set theory Principle of inclusion and exclusion . ( Unit 4.Properties of relations .Natarajan. “Introduction to Automata Theory. Languages and Computation”. Solving System of Equations-Eigen Values and Eigen Vectors-Inverse of a Matrix .K.Venkataraman “Engineering Mathematics”.Some more connectives .Propositions generated by a set. 2002 (Unit 1. REFERENCES 1. “ Discrete Mathematics and Its Applications”. Delhi. UNIT IV FORMAL LANGUAGES Languages and Grammars-Phrase Structure Grammar-Classification of Grammars-Pumping Lemma For Regular Languages-Context Free Languages. A. UNIT V FINITE STATE AUTOMATA Finite State Automata-Deterministic Finite State Automata(DFA). “Discrete Mathematics and its Application”. Equivalence and implication .2 & 3). UNIT III MATHEMATICAL LOGIC Propositions and logical operators .Tamilarasi & A. Fourth Edition. surjective and bijective functions. 4.injective. Tata McGraw Hill. Kenneth H. Volume II.Page 10 of 47 SEMESTER – II DMC 1921 MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE UNIT I MATRIX ALGEBRA Matrices. 2002. M.Matrices of relations .Closure operations on relations . Rank of Matrix.Normal forms .Permutation and Combination Relations. Narosa Publishing House.Functions . 2nd Edition 2005. Non Deterministic Finite State Automata (NFA)-Equivalence of DFA and NFAEquivalence of NFA and Regular Languages. Khanna Publishers.Functionally complete set of connectives.Basic laws. Hopcroft and Ullman.5) 3. 2nd Edition.partitions.Venn Diagrams and set operations .M.Proofs in Propositional calculus Predicate calculus. . National Publishing Company.1989. 2.Rosen.

2002. “ Object Oriented Programming With C++”. Pearson Education. 2004. “Object–Oriented Programming Using C++”. Ira Pohl. Third Edition. UNIT IV TEMPLATES Template Class – Function Templates – Class Templates – Parameterizing – STL – Algorithms – Function Adaptors. UNIT V INHERITANCE Derived Class – Typing Conversions and Visibility – Code Reuse – Virtual Functions – Templates and Inheritance – Run–Time Type Identifications – Exceptions – Handlers – Standard Exceptions.Lippman. Kamthane. 2. 2003. Person Education. Second Edition. Stanley B. Bhave . Pearson Education . . 3. “C++ Primer”. UNIT II IMPLEMENTING ADTS AND ENCAPSULATION Aggregate Type struct – Structure Pointer Operators – Unions – Bit Fields – Data Handling and Member Functions – Classes – Constructors and Destructors – Static Member – this Pointer – reference semantics – implementation of simple ADTs.Page 11 of 47 DMC 1922 OBJECT ORIENTED PROGRAMMING UNIT I FUNDAMENTALS Object–Oriented Programming concepts – Encapsulation – Programming Elements – Program Structure – Enumeration Types –– Functions and Pointers – Function Invocation – Overloading Functions – Scope and Storage Class – Pointer Types – Arrays and Pointers – Call–by–Reference – Assertions – Standard template library. REFERENCES: 1.” Object Oriented Programming with ANSI and Turbo C++”. 4. Pearson Education. UNIT III POLYMORPHISM ADT Conversions – Overloading – Overloading Operators – Unary Operator Overloading – Binary Operator Overloading – Function Selection – Pointer Operators – Visitation – Iterators – containers – List – List Iterators. Josee Lajoie. 2004.

UNIT II SOFTWARE DESIGN Abstraction – Modularity – Software Architecture – Cohesion – Coupling – Various Design Concepts and notations – Real time and Distributed System Design – Documentation – Dataflow Oriented design – Jackson System development – Designing for reuse – Programming standards. McGrawHill. 3. “Software Engineering”. UNIT V SOFTWARE CONFIGURATION MANAGEMENT (SCM) & CASE TOOLS Need for SCM – Version Control – SCM process – Software Configuration Items – Taxonomy – Case Repository – Features. 2004. 2. UNIT IV SOFTWARE TESTING AND MAINTENANCE Software Testing Fundamentals – Software testing strategies – Black Box Testing – White Box Testing – System Testing – Testing Tools – Test Case Management – Software Maintenance Organization – Maintenance Report – Types of Maintenance. – Risk analysis and management – Requirements and Specification – Rapid Prototyping. REFERENCES: 1. Pressman. Second Edition. Springer Verlag. Pankaj Jalote. Roger S. “Software Engineering: A Practitioner Approach”. I. 2005. 1997. . Sixth edition. Sommerville. Sixth Edition. “An Integrated approach to Software Engineering”.Page 12 of 47 DMC 1923 SOFTWARE ENGINEERING UNIT I INTRODUCTION Software Engineering paradigms – Waterfall Life cycle model – Spiral Model – Prototype Model – fourth Generation Techniques – Planning – Cost Estimation – Organization Structure – Software Project Scheduling. UNIT III SOFTWARE METRICS Scope – Classification of metrics – Measuring Process and Product attributes – Direct and Indirect measures – Reliability – Software Quality Assurance – Standards. Addison Wesley-Longman.

1999. " Systems Programming and Operating Systems". . “Systems Programming”. TEXT BOOKS: 1. Pearson Education. D. 2.“System Software – An Introduction to Systems Programming”. UNIT II ASSEMBLERS Basic assembler functions – A simple SIC assembler – Assembler algorithms and data structures – Machine dependent assembler features.Implementation examples: MASM Macro Processor – ANSI C macro language. Instruction formats and addressing modes – Program relocation – Machine independent assembler features – Literals – Symbol-defining statements – Expressions – Program Blocks – Control Sections and Program Linking – One Pass Assembler and Multipass Assemblers Implementation examples MASM assembler. Third Edition. Donovan. Machine-independent loader features – Automatic Library Search – Loader Options Loader design options – Linkage Editors – Dynamic Linking – Bootstrap Loaders. Implementation examples: MSDOS linker. REFERENCES: 1. UNIT IV MACRO PROCESSORS Basic macro processor functions – Macro Definition and Expansion – Macro Processor Algorithm and data structures – Machine – independent macro processor features – Concatenation of Macro Parameters – Generation of Unique Labels – Conditional Macro Expansion – Keyword Macro Parameters – Macro Processor Design Options – Recursive Macro Expansion – Algorithm – General Purpose macro Processors – Macro Processing within Language Translators . Leland Beck . 1991. 1999. Tata McGraw Hill Company. Dhamdhere.. UNIT V OTHER SYSTEM SOFTWARE Text editors – Overview of Editing Process . John J. UNIT III LOADERS AND LINKERS Basic loader functions: Design of an Absolute Loader – A Simple Bootstrap Loader Machine dependent loader features Relocation – Program Linking – Algorithm and Data Structures for Linking Loader.Page 13 of 47 DMC 1924 SYSTEM SOFTWARE UNIT I INTRODUCTION Introduction – System software and machine architecture – The Simplified Instructional Computer (SIC) – Machine Architectures (SIC and SIC/XE) – Data and Instruction Formats – Addressing Modes –Instruction sets – I/O Programming. Tata McGraw Hill Company.User Interface – Editor Structure – Interactive Debugging Systems – Debugging functions and capabilities – Relationships with Other parts of the system – User Interface Criteria. M. Inc.

M. J. Galvin. Addison Wesley Publishing Co. 3. Abraham Silberschatz Peter B. Bach. . 2. 2003. G. Sixth Edition. Pearson Education.Page 14 of 47 DMC 1925 OPERATING SYSTEMS UNIT I INTRODUCTION Introduction – Operating Systems and services – Processes – CPU Scheduling approaches UNIT II PROCESS SYNCHRONIZATION Process synchronization – Semaphores – Deadlocks – Handling deadlocks – Multithreading UNIT III MEMORY MANAGEMENT Memory management – Paging – Segmentation – Virtual Memory – Demand paging – Replacement Algorithms UNIT IV DISK SCHEDULING Disk Scheduling approaches – File systems – Design issues – User interfaces to file systems – I/O device management. “Operating System Concepts”. Pearson Education. 2003. Gagne. “Design Of The Unix Operating System”. UNIT V CASE STUDIES Case study – Design and implementation of the UNIX OS.. Process model and structure – Memory management – File system – UNIX I/O management and device drivers – Windows – System components – Process Management – Memory management – File Systems – Networking REFERENCES: 1. Willam-Stalling “ Operating System” Fourth Edition.

4. management and communication. Sharan J. Pettit and Mary E. minutes. organization. notice. Halliday. persuasion. presentation skills. selective attention.Gerson – “Technical Writing – Process and Product” – Pearson Education – 2000. Choice of vocabulary. TEXT BOOKS: 1.Shurter. oral fluency development.Lesikar. 5. 3.Flatley – Lesikass Basic Communication Tata McGraw Will 8th Edition – 1999. orders. TECHNICAL REPORTS Format.Page 15 of 47 DBA1605 COMMUNICATION SKILLS 1. 2. 1983. agendas. E. John D. Cohesion in English. letters of application. Longman.Riordan – Technical Report Writing Today – AITBS Publishing & Distributors. . Daniel G. McGraith – Basic Managerial Skills for all Prentice Hall of India – 6th Edition 2002. coherence and cohesion. forms of business communication. letter of complaints.Hasan. COMMUNICATION IN BUSINESS Systems approach. participating in discussions. Raymond V. attending and conducting interviews. Memos. paralinguistic features. London 1976. M. Pauley. factors facilitating communication. India 5th edition – 2000. variables. 4. debates and conferences. 2. Stevel. tenders. Robert L. BUSINESS CORRESPONDENCE Business letter. sales letters.Genrson and Steven M. enquiries.A. PROJECT REPORTS Project proposal. 2. Effective letters in business Thrid Ed. appraisal reports. listening barriers to listening. 3. project reports. paragraph writing.Ky R. feedback. COMMUNICATION PROCESS Interpersonal perception. REFERENCES: 1.

Pipe. 2. 6. OBJECT ORIENTED PROGRAMMING LAB Write a C++ Program to illustrate Enumeration and Function Overloading Write a C++ Program to illustrate Scope and Storage class Implementation of ADT such as Stack and Queues Write a C++ Program to illustrate the use of Constructors and Destructors and Constructor Overloading 5. Write a C++ Program to illustrate Virtual functions 14. Loaders. 10. FIFO’s. 12. 4. Linkers. Features of text editors. 4. Process management – Fork. 11. Grep. File system related system calls.Page 16 of 47 DMC 1926 1. Exec. Signals. Write a Program to illustrate Iterators and Containers 10. friend and member function 8. awk. Write a Program to overload as binary operator. Write a Program to illustrate Bit fields 7. . Write a C++ Program to illustrate function templates 11. Write a Program to overload unary operator in Postfix and Prefix form as member and friend function 9. 13. Write a C++ Program to illustrate template class 12. 8. Assemblers. 5. 3. Shared memory. sed. Basic UNIX commands. Message queues. Shell Programming. Write a Program to illustrate Static member and methods 6. 2. Exception Handling DMC 1927 SYSTEM SOFTWARE LAB 1. Write C++ Programs and incorporating various forms of Inheritance 13. 3. 9. 7.

NETWORK LAYER Packet Switching – Switching and Forwarding – Bridges and LAN switches – Internetworking – Simple Internetworking – Routing. 2nd Edition. 1st Edition. “Computer Networks”. INTRODUCTION Building a network – Requirements – Network Architecture – OSI – Internet – Direct Link Networks – Hardware building blocks – Framing – Error detection – Reliable transmission. Addison Wesley Publishing Company. PHI. 2001. Davie. NETWORK FUNDAMENTALS LAN Technology – LAN Architecture – BUS/Tree – Ring – Star – Ethernet – Token Rings – Wireless.A Top Down Approach featuring the Internet”. Kurose and Keith W. 5. 2.SMTP – MIME – HTTP – SNMP. TRANSPORT LAYER Reliable Byte Stream (TCP) – Simple Demultiplexer (UDP) – TCP Congestion Control – Congestion Avoidance Mechanisms. TEXT BOOK 1. “Data and Computer Communications”. PRESENTATION LAYER and APPLICATIONS Presentation formatting – Data compression – Cryptographic Algorithms: RSA DES –– Applications – Domain Name Service – Email . 3. REFERENCES 1. 2. James F. Andrew S. Larry L. 3rd Edition.A systems Approach”. 2001. “Computer Networks . 2000. 5th Edition. William Stallings. Tata Mcgraw Hill. Ross. . Peterson & Bruce S.Page 17 of 47 SEMESTER – III DMC 1931 COMPUTER NETWORKS 1. 4. 1997. 3. Harcourt Asia/Morgan Kaufmann. “Computer Networking . Tanenbaum.

Brey. Ltd. Architecture.Parallel communication interface – Serial communication interface – Timer – Keyboard /display controller – Interrupt controller – DMA controller – Programming and applications.Page 18 of 47 DMC 1932 MICROPROCESSORS AND ITS APPLICATIONS UNIT I THE 8086 PROCESSOR . K. Bhurchandi. 2. M. 80286. UNIT III INTERFACING CONCEPTS Memory Interfacing and I/O interfacing . Peter Abel. Pentium. UNIT II 8086 SYSTEM DESIGN 8086 signals description – Basic configurations . UNIT IV ADVANCED PROCESSORS Intel 80286 – Internal Architectural – Register Organization – Internal Block Diagram – Modes of operation – Real Address Mode – Protected Virtual Address mode – Privilege – Protection . 80486. 3. PentiumII. PHI 2003. Gibson. . “Advanced Microprocessors and peripheralsArchitectures. PentiumIV.8086 architecture – Addressing modesInstruction set and assembler directives – Assembly language programming – Interrupts and interrupt service routines. UNIT V BUILDING SYSTEMS Bus Concepts – Bus Standards –The Peripheral Component Interconnect (PCI) Bus – Universal Serial Bus (USB) – Platform Architectures. 6th Edition. REFERENCES: 1. Programming and Design”. 5. PentiumIII. TMH. Barry B.System bus timing –System design using 8086 – Minimum mode /Maximum modes 8086 system and timings. “The Intel Microprocessors. Glenn A. 4. 80186/80188. “IBM PC Assembly language and programming”. Websites of latest processors. 2002. Pearson Education/PHI.SOFTWARE ASPECTS Evolution of Microprocessors . 80386. Yu-cheng Liu. i486 and Pentium processors. PentiumPro Processor. 2002 reprint. Prentice Hall of India Pvt. Programming and Interfacing”. Programming & Interfacing”. A.Architectural features and Register Organization of i386. Ray & K. 8086/8088. “Microcomputer systems: The 8086/8088 Family architecture.

Rivest. REFERENCES: 1. “Introduction to algorithms” Prentice Hall 1990. Charles E. UNIT III DYNAMIC PROGRAMMING Computing a binomial coefficient – Warshall’s and Floyd’ algorithm – Optimal binary search tree – Knapsack problem – Memory functions.Leiserson. UNIT V NP-HARD AND NP-COMPLETE PROBLEMS P & NP problems – NP-complete problems – Approximation algorithms for NPhard problems – Traveling salesman problem – Knapsack problem. .Cormen. UNIT II DIVIDE AND CONQUER METHOD AND GREEDY METHOD Divide and conquer methodology – Merge sort – Quick sort – Binary search – Binary tree traversal – Multiplication of large integers – Strassen’s matrix multiplication – Greedy method – Prim’s algorithm – Kruskal’s algorithm – Dijkstra’s algorithm. Ronald L. Thomas H. 2. Anany Levitin “Introduction to the Design and Analysis of Algorithms” Pearson Education 2003. UNIT IV BACKTRACKING AND BRANCH AND BOUND Backtracking – N-Queens problem – Hamiltonian circuit problem – Subset sum problem – Branch and bound – Assignment problem – Knapsack problem – Traveling salesman problem.Page 19 of 47 DMC 1933 DESIGN AND ANALYSIS OF ALGORITHMS UNIT I INTRODUCTION Fundamentals of algorithmic problem solving – Important problem types – Fundamentals of the analysis of algorithm efficiency – analysis frame work – Asymptotic notations – Mathematical analysis for recursive and non-recursive algorithms.

Addison Wesley. Communications and Applications”.DDA . 2 &3). 5. Tsichritzis. Casanova and Leony Fernanadez. OVERVIEW OF MULTIMEDIA Multimedia hardware & software . Eliar.Page 20 of 47 DMC1934 COMPUTER GRAPHICS AND MULTIMEDIA SYSTEMS 1. Pearson Education. Gibbs and Dionysios C.Bresenham technique – Line Drawing and Circle Drawing Algorithms .morphing.General animation functions .animation – Key Frame systems .Splines – Bezier Curves . 1998. MULTIMEDIA SYSTEMS AND APPLICATIONS Multimedia communication systems – Data base systems – Synchronization Issues – Presentation requirements – Applications – Video conferencing – Virtual reality – Interactive video – video on demand TEXT BOOKS 1. 2. . Hearn D and Baker M.Perspective Projection – Visible Surface Detection Methods . 3D TRANSFORMATIONS 3D Concepts . 2D TRANSFORMATIONS Two dimensional transformations – Scaling and Rotations .Visualization and polygon rendering – Color models – XYZ-RGB-YIQ-CMY-HSV Models . 2nd Edition. “Multimedia programming”. Siamon J.Text Clipping. Pearson education.Components of multimedia – Text. “Multimedia Graphics”. REFERENCES 1. “Multimedia Computing. “Computer graphics – C Version”.Window view port mapping transformation.Polygons . John Villamil.P. Image – Graphics – Audio – Video – Animation – Authoring. 2. 2. Ralf Steinmetz. 2004 (unit 4 & 5).Line Clipping . Klara steinmetz. 1995. PHI. 2004 (unit 1.Interactive Input methods . 4. INTRODUCTION Overview of Graphics System . 3.Projections – Parallel Projection .

UNIT II WORLD WIDE WEB Overview – Web Security. UNIT III JAVA FUNDAMENTALS Java features – Java Platform – Java Fundamentals – Expressions.Multithreading – Language Packages. Margaret Levine Young. Sorting Mail and avoiding e-mail viruses – Chatting and Conferencing on the Internet – Online Chatting Messaging – Usenet Newsgroup – Internet Relay chat (IRC) – Instant Messaging . The Complete Reference – Java 2 . Deitel & Deitel.Page 21 of 47 DMC 1935 WEB PROGRAMMING UNIT I BASIC INTERNET CONCEPTS Connecting to the Internet – Domain Name System .Voice and Video Conferencing. 2001. TEXT BOOK 1. Keyur shah. (Unit 3. and Database-Driven Web sites – File Transfer and downloading – FTP – Peer to Peer – Downloading and Installing software.RMI – Java Beans. “Internet and WWW”. Packages and Interfaces – Exception Handling. 2. 4th Edition. UNIT IV PACKAGES AWT package – Layouts – Containers – Event Package – Event Model – Painting – Garbage Collection . “Gateway to Java Programmer Sun Certification”. 2002. Tata McGraw Hill.Fighting Spam. and site-blocking – Audio and Video on the web – Creating and Maintaining the Web – Web site creation concepts – Web Page Editors – Optimizing Web Graphics – Web Audio Files – Forms. Tata McGraw Hill. Prentice Hall 1999. (Unit 1 & 2) 2. Interactivity. 4 & 5) REFERENCES 1. 2nd Edition.Servlets . Operators.Exchanging E-mail – Sending and Receiving Files . Herbert Schildt. Tata Mc Graw Hill 2002. . and Control Structures – Classes. UNIT V ADVANCED JAVA PROGRAMMING Utility Packages – Input Output Packages – Inner Classes – Java Database Connectivity . Privacy. Java How to Program.

WEB PROGRAMMING LAB Studying internet connection procedures Sending and receiving mails from one or more email clients Video Conferencing demonstration Downloading and installing softwares (Example: Java) and setting up path and class path 5. Fahrenheit to Centigrade conversion etc 9. Reading and writing text files 11. Application of threads examples 10. links. 3. Writing a Servlet program with database connectivity for a web based application such as students result status checking.Page 22 of 47 DMC 1936 1. 2. PNR number enquiry etc 14. Creation of web site with forms. frames. Writing window based GUI applications using frames and applets such as Calculator application. package. 4. writing an RMI application to access a remote method 13. tables etc with any web page editors and using images and audio files as part of web pages 7. etc for the following # Different types of inheritance study # Uses of ‘this’ keyword # Polymorphism # Creation of user specific packages # Creation of jar files and using them # User specific exception handling 8. Writing Java programs by making use of class. Creation and usage of Java bean . interface. Using FTP 6. Reading image files and manipulating them with image related classes and methods 12.

Create a Jpeg image which demonstrates the various features of an image editing tool. Write a C program for Clipping Algorithm using Line Clipping. 3. 4. Write a C program with Fundamental Graphics Function 2. DDA Line Drawing Algorithms. Write a C program for Line drawing using Bresenham. 10. Write a C program for 2D Transformations like Translations and Scaling and Rotations. Develop a presentation for a product using techniques like Guide Layer. Write a C program for Circle Drawing using Bresenham Circle Drawing Algorithms. Write a C program for 3D Transformations like Translations and Scaling and Rotations. Demonstrate Rasterization and filtering of layers and give blending effects for a logo . Create Frame by Frame Animations using multimedia authoring tools. 6. 5. 9. masking and onion Skin using authoring tools. 8.Page 23 of 47 DMC1937 GRAPHICS AND MULTIMEDIA LAB 1. 7.

Andrew Rudoff. APPLICATIONS Debugging techniques .Files and directories – File types .Page 24 of 47 SEMESTER IV DMC1941 UNIX AND NETWORK PROGRAMMING 1. 2.Client server applications like file transfer and chat.Name and address conversions.UDP echo client server . SOCKETS Introduction – transport layer – socket introduction . 1st Edition .Process control – Process identifiers .Richard Stevens. 4.Password file – Group file – Login accounting – system identification.Tilak Shetty and Rajiv Shah “The ‘C’ Odyssey Unix –The open Boundless C”. W.Process relationships terminal logins – Signals -threads. The Sockets Networking API. Volume 1. “Advanced programming in the UNIX environment”.(Unit 1. 1999. 3.File access permissions – File systems – Symbolic links Standard I/O library – Streams and file objects – Buffering . Pearson education. Meeta Gandhi. PROCESSES Environment of a UNIX process – Process termination – command line arguments . Stevens. Addison Wesley.File I/O – File Descriptors – File sharing . INTERPROCESS COMMUNICATION Introduction . Nov 2003.Ping Trace route . 5.System data files and information .BPB Publications1992. Bill Fenner.3rd Edition. TEXT BOOKS 1.TCP echo client server . “Unix Network Programming”.I/O multiplexing .(unit 4 & 5) REFERENCE BOOKS 1.2 &3) 2.TCP sockets – UDP sockets raw sockets – Socket options . W.Message passing (SVR4).pipes – FIFO – message queues Synchronization (SVR4) – Mutexes – condition variables – read – write locks – file locking – record locking – semaphores –Shared memory(SVR4). INTRODUCTION & FILE SYSTEM Overview of UNIX OS . .

Tamilarasi. REFERENCES A. Pearson Education.(M / M / 1) : (FIFO / ∞ /∞).degeneracy – Mathematical formulation of assignment models – Hungarian Algorithm – Variants of the Assignment problem UNIT III INTEGER PROGRAMMING MODELS Formulation – Gomory’s IPP method – Gomory’s mixed integer method – Branch and bound technique. 2005. .S. 2003. Prem Kumar Gupta. (M / M / C) : (FIFO / ∞ / ∞).Graphical Solution of linear programming models – Simplex method – Artificial variable Techniques.Balasubramani. TEXT BOOKS Taha H. 3rd Edition . (M / M / C) : (FIFO / N / ∞) models.Variants of Simplex method UNIT II TRANSPORTATION AND ASSIGNMENT MODELS Mathematical formulation of transportation problem. Pearson Education. New Delhi. S.Natarajan. P. “Operations Research : An Introduction “ 7th Edition.A.Page 25 of 47 DMC 1942 RESOURCE MANAGEMENT TECHNIQUES UNIT I LINEAR PROGRAMMING MODELS Mathematical Formulation . Asia. “Operations Research”.. (M / M / 1) : (FIFO / N / ∞). UNIT IV SCHEDULING BY PERT AND CPM Network Construction – Critical Path Method – Project Evaluation and Review Technique – Resource Analysis in Network Scheduling UNIT V QUEUEING MODELS Characteristics of Queuing Models – Poisson Queues . “Operations Research”.Chand & Company Ltd. D. Hira.Methods for finding initial basic feasible solution – optimum solution .M. A. 2004.

Ivar Jacobson. 1999. Grady Booch. 1999. James Rumbaugh. Craig Larman. 2nd Edition. Applying UML and Patterns. “The Unified Modeling Language User Guide”. relationships. 3. methods – Super-sub class – A part of relationships Identifying attributes and methods – Object responsibility UNIT IV OBJECT ORIENTED DESIGN Design process – Axions – Colollaries – Designing classes – Class visibility – Refining attributes – Methods and protocols – Object storage and object interoperability – Databases – Object relational systems – Designing interface objects – Macro and Micro level processes – The purpose of a view layer interface UNIT V SOFTWARE QUALITY Quality assurance – Testing strategies – Object orientation testing – Test cases – Test Plan – Debugging principles – Usability – Satisfaction – Usability testing – Satisfaction testing TEXT BOOKS 1. Dutoit. attributes. Patterns and Java. Ali Bahrami.Identity – Dynamic binding – Persistence – Metaclasses – Object oriented system development life cycle. Addison Wesley Long man. “Object Oriented System Development”. UNIT III OBJECT ORIENTED ANALYSIS Identifying Usecase – Business object analysis – Usecase driven object oriented analysis – Usecase model – Documentation – Classification – Identifying object. Pearson 2004 . McGraw Hill International Edition. 2002. 2. REFERENCES 1. Booch. Jacobson methods – Patterns – Frameworks – Unified approach – Unified modeling language – Static and Dynamic models – UML diagrams – Class diagram – Usecase diagrams – Dynamic modeling – Model organization – Extensibility. Bernd Bruegge. UNIT II METHODOLOGY AND UML Introduction – Survey – Rumbugh. Allen H. Pearson.Page 26 of 47 DMC 1943 OBJECT ORIENTED ANALYSIS AND DESIGN UNIT I INTRODUCTION An overview – Object basics – Object state and properties – Behavior – Methods – Messages – Information hiding – Class hierarchy – Relationships – Associations – Aggregations. Object Oriented Software Engineering using UML.

– Modeless Dialog – CColorDialog – CfileDialog. 2003. image list. Wiley Dreamtech India Private Ltd.WM_SIZE.. WM_CHAR messages . Fonts .. David Kruglirski. Steve Holzner. REFERENCES: 1. 2.Graphics Device Interface Pen. Pearson Education. controls – Animate control. UNIT II VISUAL BASIC PROGRAMMING Visual Basic Applications – Form and properties – Variables and Constants – Variant type – Procedure scope – Main – Control statements – control arrays – Creating and using Controls – Menus and Dialogs – Programming fundamentals – Objects and instances – Debugging – Responding to mouse events – Drag and Drag drop events Responding to keyboard events – keypress.Reading and Writing documents . Peachpit Press. 1999. 4. Microsoft press. J. keydown events – Using grid control – Graphics controls – shape and line control – File system controls – Common dialog controls – Processing files – Accessing databases with the data controls. Herbert Sheildt. “MFC from the Ground Up”. Kate Gregory “Using Visual C++”. UNIT III VISUAL C++ PROGRAMMING Visual C++ components – Introduction to Microsoft Foundation Classes Library – Getting started with AppWizard – Class Wizard – Event handling – Keyboard and Mouse events . “Programming Microsoft Visual C++”. usage of BMP and displaying a file existing as a BMP. 2.0 How To Program”. 1999. CRect tracker – Tree control – CtabControl – Dynamic controls – slider control – progress control – Inheriting CTreeView – CRicheditView – Modal Dialog. Marion Cottingham “Visual Basic”. Fifth Edition. . 3.Resources – Bitmaps creation. TEXT BOOKS: 1. Microsoft press. Brush. Colors. 1996. Charles Petzold. keyup. Prentice Hall of India Pvt. 3. Ltd. 1999. “ Visual Basic 6.Single and Multiple document interface . UNIT V ADVANCED CONCEPTS Domain Name System – Email – World Wide Web (HTTP) – Simple Status bars – Splitter windows and multiple views – Dynamic Link Library – Data base Management with ODBC – TCP/IP – Winsock and WinInet. Deitel .Page 27 of 47 DMC 1944 VISUAL PROGRAMMING UNIT I WINDOWS PROGRAMMING The windows programming Model – Event driven programming – GUI concepts – Overview of Windows programming – Creating and displaying the window – Message Loop – windows procedure – WM_PAINT message – WM_DESTROY message – Data types – Resources – An Introduction to GDI – Device context – Text output – Scroll Bars – Keyboard – Mouse – Menus. – ActiveX control – creation and usage – Container class.. “Windows Programming”. UNIT IV CONTROLS Dialog Based Applications. 1998. “Visual C++ 6 programming”.

3.”Inside CORBA”. TEXT BOOKS 1. Web server .Pearson Education. Ltd. “Programming C#”. Jason Pritchard. Object server.Remoting. Database server. CLIENT / SERVER CONCEPTS Client – Server – File Server.Page 28 of 47 DMC 1945 MIDDLEWARE TECHNOLOGIES 1. “Enterprise Java Beans”.2000 (Unit 4 & 5) 4. 2. Dan Harkey and Jeri Edwards. (Unit 1) 2.Peer. 2002. Tom Valesky.Exploring CORBA alternatives – Architecture overview – CORBA and networking model – CORBA object model – IDL – ORB . 2. 4. Jesse Liberty. EJB ARCHITECTURE EJB – EJB Architecture – Overview of EJB software architecture – View of EJB – Conversation – Building and Deploying EJBs – Roles in EJB. “Teach yourself CORBA in 14 days”. 2002.Building an application with CORBA. Destruction – Comparison COM and CORBA – Introduction to . 2002. Tec media. Addison Wesley. 5. “The Essential Client/Server Survival Guide”.NET architecture – Marshalling . O’Reilly Press. Group server. .NET – Overview of . 2000.Middleware – General middleware – Service specific middleware. Pearson Education. 2nd Edition. Robert Orfali. CORBA CORBA – Distributed Systems – Purpose . Mowbray. 2002. EJB APPLICATIONS EJB Session Beans – EJB entity beans – EJB clients – EJB Deployment – Building an application with EJB. Jeremy Rosenberger. COM COM – Data types – Interfaces – Proxy and Stub – Marshalling – Implementing Server / Client – Interface Pointers – Object Creation.(Unit 2 & 3) 3. (Unit 5) REFERNCES 1. Invocation . Galgotia Publications Pvt.. Client / Server Building blocks – RPC – Messaging – Peer – to. “COM and CORBA side by side”.

SDK type programs for creating simple windows with different window styles SDK type programs code for keyboard and mouse events. Applications using Sockets 2. Coding Dynamic controls – slider control. 2. money conversions. Simple Dialog Based application – eg. Data access through ODBC – Cdatabase. Calculator.Page 29 of 47 DMC 1946 NETWORK PROGRAMMING LAB 1. UDP Sockets c. Modal and Modeless dialog. etc. VC++ VISUAL PROGRAMMING LAB Form Design – Keyboard & Mouse events Programs on usage of data types . Crecordset. inheriting CtreeView and CricheditView. 3. Simulation of Sliding Window Protocol 3. progress control. Simulation of Routing Protocols 4. Control arrays Simple applications using file system controls Database applications using data control. interest computation. Creating ActiveX control and using it. Creating static and dynamic splitter windows Creating DLLs and using them. 4. Winsock and WinInet & Internet Explorer common controls. . GDI objects. RPC 5. Development of applications such as DNS/ HTTP/ E – mail/ Multi .variant. Creating SDI & MDI applications. TCP Sockets b.user Chat DMC 1947 VB 1. Socket Programming a. Programming for reading and writing into documents.

Frank.Page 30 of 47 SEMESTER V DMC 1951 XML AND WEB SERVICES 1. James Webber. “Java Web Services Architecture”. 2004. “Developing Enterprise Web Services”. et al. WEB SERVICES Overview – Architecture – Key Technologies . TEXT BOOKS 1. Robert Skoczylas and Rima Patel Sriganesh. 5. “XML. 3. 2002. SOAP Overview Of SOAP – HTTP – XML-RPC – SOAP: Protocol – Message Structure – Intermediaries – Actors – Design Patterns And Faults – SOAP With Attachments. . 2. 4. P. Morgan Kaufmann 4. Pearson Education. 3. XML TECHNOLOGY XML – Name Spaces – Structuring With Schemas and DTD – Presentation Techniques – Transformation – XML Infrastructure.2005. Web Services And The Data Revolution”. Coyle..NET And J2EE. “ Developing Java Web Services”. XML SECURITY Security Overview – Canonicalization – XML Security Framework – XML Encryption – XML Digital Signature – XKMS Structure – Guidelines For Signing XML Documents – XML In Practice. McGovern. Wiley Publishing Inc..UDDI – WSDL – ebXML – SOAP And Web Services In E-Com – Overview Of . REFERENCES 1. 2. Sandeep Chatterjee. Pearson Education. Ramesh Nagappan . 2004. Publishers. INTRODUCTION Role Of XML – XML and The Web – XML Language Basics – SOAP – Web Services – Revolutions Of XML – Service Oriented Architecture (SOA).

2000. 4. UNIT II PROJECT EVALUATION Strategic Assessment – Technical Assessment – Cost Benefit Analysis – Cash Flow Forecasting – Cost Benefit Evaluation Techniques – Risk Evaluation. Third Edition. Gopalaswamy: "Managing Global Projects ". UNIT V MANAGING PEOPLE AND ORGANIZING TEAMS Introduction – Understanding Behavior – Organizational Behaviour: A Background – Selecting The Right Person For The Job – Instruction In The Best Methods – Motivation – The Oldman–Hackman Job Characteristics Model – Working In Groups – Becoming A Team – Decision Making – Leadership – Organizational Structures – Stress – Health And Safety – Case Studies. UNIT III ACTIVITY PLANNING Objectives – Project Schedule – Sequencing And Scheduling Activities Network Planning Models – Forward Pass – Backward Pass – Activity Float Shortening Project Duration – Activity On Arrow Networks – Risk Management Nature Of Risk – Types Of Risk – Managing Risk – Hazard Identification Hazard Analysis – Risk Planning And Control. Royce. Pearson Education.” Software Project Theory”. Pearson Education. P. UNIT IV MONITORING AND CONTROL Creating Framework – Collecting The Data – Visualizing Progress – Cost Monitoring – Earned Value – Prioritizing Monitoring – Getting Project Back To Target – Change Control – Managing Contracts – Introduction – Types Of Contract – Stages In Contract Placement – Typical Terms Of A Contract – Contract Management – Acceptance. Ramesh. 3. – – – – . Bob Hughes and MikeCotterell “Software Project Management”. Tata McGraw Hill. TATA McGraw Hill Edition 2004. 2001. 1999.Jalote “Software Project Management In Practice”. 2.Page 31 of 47 DMC 1952 SOFTWARE PROJECT MANAGEMENT UNIT I INTRODUCTION TO SOFTWARE PROJECT MANAGEMENT Project Definition – Contract Management – Activities Covered By Software Project Management – Overview Of Project Planning – Stepwise Project Planning. REFERENCES: 1.

9. Create a dictionary. Employee information. Text Editor.. Inventory System. Tabulate the xml content using XSL. 3. g. DMC 1954 SOFTWARE DEVELOPMENT LAB Apply the following to typical application problems: 1. 5. 7. Project Planning 2. Software Design 5. Student Marks Analyzing System c. 8. e. Write a program to implement a web service using . 4. d.NET. Software Requirement Analysis 3. Data Modelling & Implementation 6. Write a java program to parse an XML file using SAX. ( Example: Students data. 6.Page 32 of 47 DMC 1953 XML AND WEB SERVICES LAB 1. Library System b. Validate a XML file using java script with XMLDOM. Software Testing 7. Write a program to implement a web service using java. f. . Simulator Software for Parallel Processing Operation.) 2. Software Estimation 4. Write a java program to parse an XML file using DOM. Create an XML file for any domain with multiple sublevel complexity. Write a program to implement XML – RPC. Software Debugging A possible set of applications may be the following: a. Create a DTD and XML schema for the XML file. Telephone dictionary. Product details etc.

Navathe. Gary W.Transaction . RELATIONAL DATABASES Relational Model . Tata McGraw-Hill. 2.Modeling and Design Persistence .Database Administration. 2000. 4. CURRENT ISSUES Rules . Stephen Smith and Kurt Thearling.Client/Server Model . REFERENCES 1.Querying . “Building Data Mining Applications for CRM”. R.Knowledge Bases .Approaches .Integrity .Page 33 of 47 LIST OF ELECTIVES M.C. Hanson.B. 5. DATABASE DESIGN ISSUES Security .Web Databases – Mobile Databases. 2000. .Recovery .Database Tuning . Prentice Hall of India Pvt Ltd. 2. OBJECT ORIENTED DATABASES Introduction to Object Oriented Data Bases . Addison Wesley.Distributed Databases and Parallel databases. “Fundamentals of Database Systems”. EMERGING SYSTEMS Enhanced Data Models .Data Warehousing and Data Mining .Concurrency .Optimization and Research Issues.Active and Deductive Databases . TEXT BOOK 1.Consistency .Query Processing Normalization.A (MASTER OF COMPUTER APPLICATIONS) DMC 1971 ADVANCED DATABASES 1. “Database Management and Design”. Alex Benson. Elmasri and S. Hanson and James V. 1999. 3.Storage Structures .

TRANSMISSION CONTROL PROTOCOL User Datagram protocol – UDP operation – Use – UDP design – TCP services – Flow control – Error control – TCP operation and design – connection – Transition diagram – Congestion control 4. II and III”.OSI model – Protocol suite – Addressing – Transmission media – Local Area and Wide Area Networks – Switching – Connecting devices – IP addressing 2. “Internetworking with TCP/IP – Volume I.Page 34 of 47 DMC 1972 TCP/IP PROTOCOL SUITE 1. APPLICATION PROTOCOLS File Transfer Protocol – Connections – Communication – Simple Mail Transfer Protocol – Simple Network Management Protocol – Hyper Text Transfer Protocol – Transaction – Request and Response messages TEXT BOOK 1. Forouzan. Prentice-Hall of India Pvt. INTRODUCTION Standards – Internet – History. APPLICATION LAYER AND CLIENT SERVER MODEL Concurrency – BOOTP – DHCP – Domain name system – Name space – Distribution – Resolution – Messages – Telnet – Rlogin – Network Virtual Terminal – Character Set – Controlling the server – Remote login 5. 2nd Edition 1994 . REFERENCE 1. “TCP/IP Protocol Suite”. Behrouz A. David L. Douglas E. Tata McGraw Hill Edition 2000.. Ltd. Stevens. Comer. INTERNET PROTOCOL Subnetting – Supernetting – IP packets – Delivery – Routing – Routing model – Routing table – Datagram – Fragmentation – Checksum – IP Design – ARP – RARP – Internet control message protocol – Internet group management protocol 3.

Knowledge and Human dimension – software life cycle models – verification and validation. Case series for Management Information System Silmon and Schuster. UNITV SYSTEM AUDIT: Software engineering qualities – design. Wetherbe. Turban Mc Lean. 2001. 1999. software quality assurance – systems methodology – objectives – Time and Logic.Stair and George W. Pearson Education Asia. UNIT IV IMPLEMENTATION AND CONTROL: Testing security – coding techniques – detection of error – validation – cost benefit analysis – assessing the value and risk of information systems. EIS. Finance. New Delhi. Elam. Kenneth C. Management Information Systems. McGraw Hill. concepts and knowledge representation – managing international information system. marketing. Ralph M. 1999. procedures control. Management Information Systems Managing the digital firm. 4. 5. 3. Management Information System: Conceptual Foundations. Structure and Development. Custom Publishing 1996. Information Technology Management making connection for strategic advantage – John Wiley. personnel – levels.Reynolds . UNIT II SYSTEM DEVELOPMENT: Modern information system – system development life cycle – structured methodologies – designing computer based method. ES – comparison. production. UNIT III INFORMATION SYSTEM: Functional areas. service. James AN O’ Brein.Principles of Information Systems – A Managerial Approach Learning.Davis. 6. software specification. 1974. Joyce J. Concepts of DSS. TEXT BOOK: 1. Steven Alter. 2. Laudon and Jane Price Laudon. production. 1999. REFERENCES: 1. Information system – A Management Perspective – Addison – Wesley. . software metrics. designing structured programs. Tata McGraw Hill.Page 35 of 47 DMC 1973 UNIT I MANAGEMENT INFORMATION SYSTEM INTRODUCTION: Information system – establishing the framework – business model – information system architecture – evolution of information systems. Gordon B.

MOBILE NETWORK LAYER Mobile IP : Goals – Assumptions and Requirement – Entities – IP packet Delivery. INTRODUCTION Medium Access Control : Motivation for Specialized MAC.TETRA – UMTS.FDMATDMA.SDMA.Y. Pearson Education.Broadcast Systems: Overview – Cyclic Repetition of Data.Snooping TCP. 3.Transaction Protocol.Comparison of Access mechanisms – Tele communications : GSM. William Stallings.Schiller. 2. MOBILE TRANSPORT LAYER Traditional TCP.Digital Audio Broadcasting – Digital Video Broadcasting 2.Fast retransmit/ Fast Recovery.Page 36 of 47 DMC 1974 MOBILE COMPUTING 1. William C.Transmission/ Timeout Freezing – Selective RetransmissionTransaction Oriented TCP 5. Singhal.Indirect TCP.Lee. “Wireless Communication and Networks”.RoutingLocalization. WIRELESS NETWORKS Wireless LAN: Infrared Vs Radio Transmission – Infrastructure Networks.Agent Advertisement and Discovery – Registration – Tunneling and Encapsulation – Optimization – Reverse Tunneling – IPv6 – DHCP. 2003.Services. 1993.Ad hoc Networks. Addison Wesley. “WAP-Wireless Application Protocol”. .Ad hoc Networks 4.Wireless ATM: Working Group.Access Point Control Protocol 3. “Mobile Communication Design Fundamentals”.Transport Layer Security. REFERENCE BOOKS 1.Handover.Addressing Mobile Quality of Service.DECT.IMT-200 – Satellite Systems: Basics. WAP Architecture – Datagram Protocol. 2003. Pearson Education.11 – HIPERLAN – Bluetooth.IEEE 802. 2000. “Mobile Communication”.Application Environment-Wireless Telephony Application TEXT BOOK 1.CDMA.Session Protocol.Location Management. John Wiley. J.Mobile TCP.Reference Model – Functions – Radio Access Layer – Handover.

Communicative Action for Artificial Agent 5. Michael Zyda. MIT Press." Software Agents ".Open Agent Architecture .S/W Agents for cooperative Learning .Agent From Direct Manipulation to Delegation Interface Agent Metaphor with Character .Architecture of Intelligent Agents 3. 2nd Edition. “Constructing Intelligent agents with Java: A Programmer's Guide to Smarter Applications ". 1997.Designing Agents .Agents that Reduce Work Information Overhead . Prentice Hall. 2.3 & 4) William R.Agents without Programming Language .Life like Computer character . (Unit 1. Russel & Norvig.Agent Communication Language Agent Based Framework of Interoperability 4.Direct Manipulation versus Agent Path to Predictable 2. 2.2. “Mobile Agents". AGENTS FOR LEARNING IN INTELLIGENT ASSISTANCE Agents for Information Sharing and Coordination . Jeffrey M. " Artificial Intelligence: A Modern Approach ". Prentice Hall. Wiley.Mobile Agent Concepts -Mobile Agent Technology Case Study: Tele Script. MOBILE AGENTS Mobile Agent Paradigm .Page 37 of 47 DMC 1975 SOFTWARE AGENTS 1. AGENT COMMUNICATION AND COLLABORATION Overview of Agent Oriented Programming . 2002 Joseph P. AGENT ARCHITECTURE Agents for Information Gathering .Bigus & Jennifer Bigus. Cockayne. Agent Tel TEXT BOOKS 1. 2000. . AGENT AND USER EXPERIENCE Interacting with Agents . 1998 (5th Unit) REFERENCES 1.Bradshaw.

UNIT V PERFORMANCE EVALUATION AND CONTROL PROCESS Method of performance evaluation – feedback – industry practices. 2. Decenzo and Robbins. McGraw Hill 2002. REFERENCES: 1. 1998. TEXT BOOKS: 1. UNIT III TRAINING AND EXECUTIVE DEVELOPMENT Types of training. transfer and separation – implication of job change. Human Resource Management. Dessler Human Resource Management. and Mamoria S. Human Resource Management. Pearson Education Limited. benefits and resistance.Personnel Management.medical examination – recruitment introduction – importance – practices – socialization benefits. 4. 1997. Selection process-screening – tests . UNIT II THE CONCEPT OF BEST FIT EMPLOYEE Importance of human resource planning – forecasting human resource requirement – internal and external sources. Himalaya Publishing Company. Human Resource Management. Managing Human Resource.validation – interview . 6th edition. 2001. mentor – protege relationships. methods. 2002. Promotion. McGraw Hill. Wilsey. Pearson Education Limited. The control process – importance – methods – requirement of effective control systems grievances – causes – implications – redressal methods. .benefits – self development – knowledge management. demotion. Wayne Cascio.B. UNIT IV SUSTAINING EMPLOYEE INTEREST Compensation plan – reward – motivation – theories of motivation – career management – development. 5. 2001. Eugence Mckenna and Nic Beach. Ivancevich. Prentice Hall of India.Page 38 of 47 DMC 1976 HUMAN RESOURCE MANAGEMENT UNIT I PERSPECTIVES IN HUMAN RESOURCE MANAGEMENT Evolution of human resource management – the importance of the human factor – objectives of human resource management – role of human resource manager – human resource policies – computer applications in human resource management. Mamoria C. 2002. 2. purpose. 3. Human Resource Management. Biswajeet Pattanayak. Executive development programmes – common practices .

Ethical and Professional Issues. Threats. Critical Characteristics of Information. Scanning and Analysis Tools 5. Attacks. Joel Scrambray. “Hacking Exposed”. Components of an Information System. Security and Personnel TEXT BOOKS 1. Michael E Whitman and Herbert J Mattord. Micki Krause. Information Security Poicy. Assessing and Controlling Risk. REFERENCES 1. Need for Security. Tata McGraw Hill. 2004. 3. Vikas Publishing House. 2003. . Design of Security Architecture. Pearson/PHI. “Principles of Information Security”. Physical Security. ISO 17799/BS 7799. The Security SDLC. NSTISSC Security Model. Legal. LOGICAL DESIGN Blueprint for Security. Stuart Mc Clure. New Delhi. 2004. Standards and Practices. NIST Models. PHYSICAL DESIGN Security Technology.Page 39 of 47 DMC 1977 INFORMATION SECURITY 1. Securing the Components. SECURITY ANALYSIS Risk Management : Identifying and Assessing Risk. Access Control Devices. 2002. IDS. Vol 1-3 CRC Press LLC. NETWORK AND COMPUTER SECURITY Cryptography. Harold F. Tipton. 2003. Ron Weber. 3. Matt Bishop. New Delhi. 2. “Information Systems Control and Audit”. “ Computer Security Art and Science”. Pearson Education. 2. George Kurtz. Balancing Security and Access. INTRODUCTION History. The SDLC. VISA International Security Model. Planning for Continuity 4. 2. Business Needs. “ Handbook of Information Security Management”.

DELIVERY Multi-channel delivery – Learner support – Developing curriculum – E-learning standards – Instructional design – Content development process – Case studies – Future directions 4. Marc J Rosenberg. 1997. 2000. “E-learning Strategies: How to get Implementation and Delivery Right First Time”. John Wiley and Sons Ltd. “Web-Based Training”. TEXT BOOKS 1. WEB BASED TRANING Definition – Need for WBT – Choosing an approach . SAGE Publications Ltd. 5.Page 40 of 47 DMC 1978 INTRODUCTION TO E-LEARNING 1. John Wiley & Sons Inc. 3. INTRODUCTION Definition – Benefits – Challenges & opportunities – ROI metrics & evaluation – E-Learning cycle – Learning strategy – Business drivers – E-learning strategy.Kind of courses – Technical standards – Metaphors – Course framework – registration – Running the course – resources – Feedback – Access. 2000. John Wiley & Sons Inc. 3. “E-Learning: Strategies for Delivering Knowledge in the Digital Age”. Brandon Hall. 2006. “Michael Allen’s Guide to E-learning: Building Interactive. William Horton. McGraw-Hill Education. Bryn Holmes. DESIGN AND IMPLEMENTATION Role of tutor – Instructional design – Design issues – Types of learning engagements – Blended learning – Team – Infra structure – Vendor relationships – Learning management systems – Testing. “E-Learning: Concepts and Practice”. John Gardner. 2. John Wiley & Sons. REFERENCE 1. M W Allen. Fun and Effective Learning Program for any Company”. 2003. . 2. 2003. 3. LEARNING METHODOLOGY Organizing learning sequences – Common lesson structures – Creating building blocks – Designing learning sequences – Learning activities – Test and exercise learning – Planning tests – Selecting questions – Sequencing test questions – Feedback – Improve testing – Prevent cheating. “Web-Based Training Cookbook”. 2. Don Morrison.

MANAGEMENT OF IT CHALLENGES Organizing information technology services – IT alignment and strategic planning – IT governance and management. 4. HEALTH CARE INFORMATION SYSTEMS History and evolution of health care information systems – Current and emerging use of clinical information systems – system acquisition – System implementation and support. Jossey-Bass/Wiley. “ Managing Health Care Information Systems: A Practical Approach for Health Care Executives”. IT INITIATIVES Management’s role in major IT initiatives – Assessing and achieving value in health care information systems. INFORMATION TECHNOLOGY Information architecture and technologies that support health care information systems – Health care information system standards – Security of health care information systems. 5. Springer 2005. 3. INTRODUCTION Introduction to health care information – Health care data quality – Health care information regulations. “Clinical Information Sytems: A Componenet based approach”. Karen A Wager. 2. John P Glaser. laws and standards. . TEXT BOOK 1. 2005.Page 41 of 47 DMC 1979 HEALTH CARE INFORMATION SYSTEMS 1. Frances Wickham Lee. Rudi Van De Velde and Patrice Degoulet. REFERENCE 1.

5. New Delhi.Encryption .Client Application .Digital Currencies . 2.Netscape Commerce Server .Security Considerations – CyberCash: Model .DigiCash .Security .Digital Signature .Payment Systems : Electronic. “Electronic Commerce”.Electronic Data Interchange . 4th Edition. INTRODUCTION Networks and Commercial Transactions . Digital and Virtual Internet Payment System . ONLINE COMMERCE ENVIRONMENTS Servers and Commercial Environments .Cryptographic Applications .Ecash Client Software and Implementation .Functions and Features . Ltd.Virtual Transaction Process . TEXT BOOK 1.. Ltd.. Jaworski. REFERENCES 1.Payment Methods . 2003.World Wide Web. An imprint of laxmi publications Pvt. 2. Tata Mc-Graw Hill Pvt.SET .Internet Advantage ..Nonrepudiation and Message Integrity. ELECTRONIC PAYMENT METHODS Traditional Transactions : Updating . 2000.Rayport and Bernard J.Microsoft Internet Servers .Secure Web Servers . “Electronic Commerce”.Security Protocols .The Chip .Account Setup and Costs .Establishing Trust ..Data Encryption Standard Trusted Key Distribution and Verification . Tata Mc-Graw Hill Pvt. Jeffrey F. 3.Server Market Orientation . SECURITY TECHNOLOGIES Why Internet Is Unsecure . “Introduction to E-Commerce”. Techniques and Tools.InfoHaus . 2004.Electronic Transactions Today . .Cryptography : Objective Codes and Ciphers .Using Ecash .Internet Strategies..Smart Cards .Digital Currencies and Payment Systems Protocols for the Public Transport .Selling through CyberCash.Breaking Encryption Schemes .Internet Security Holes .Offline and Online Transactions . Firewall media.Customer Protection . Ltd. ELECTRONIC COMMERCE PROVIDERS Online Commerce Options .Commercial Transactions .Internet Environment .Page 42 of 47 DMC 1980 ELECTRONIC COMMERCE 1. 2nd Edition. Greenstein. 4.Required Facilities .Credit Card Business Basics.Internet and Other Novelties . Pete Loshin.

“Advanced Web-based Training Strategies: Unlocking InstructionallySound Online Learning”. R C Clark and R E Mayer. Driscoll. REFERENCE 1. “E-Learning and the Science of Instruction”. PRINCIPLES OF E-LEARNING Philosophy of education – Theory of learning – Applying principles of multimedia – Applying principles of contiguity – Applying principles of modality – Applying principles of redundancy – Applying principles of coherency – Applying principles of personalization. Pfeiffer Wiley. “E-Learning: the key concepts”. . HIGH LEVEL DESIGN Simulations – e-Monitoring and e-Coaching – m-Learning – Live virtual classroom. TECHNIQUES Leveraging examples in E-learning – Collaborative E-learning – Learner control in E-learning – E-Learning and problem solving skills – Applying guidelines. 2. TEXT BOOKS 1. 5. Pfeiffer Wiley. 2. “E-Learning by Design”. 3. 4. Routledge. William Horton. 2006. DETAIL DESIGN STRATEGIES Openings and closings – Exposition techniques for writing e-learning content – Interaction – Visual communication techniques. 2.Page 43 of 47 DMC 1981 INSTRUCTIONAL DESIGN FOR E-LEARNING 1. Pfeiffer Wiley. 2005. New Ed Edition. 2006. 2003. Robin Mason.INTRODUCTION E-learning – Types – Foundations – Problem based Approach to designing ELearning – Design E-learning – Design and curriculum strategies – Story telling and contextual based design strategies – Blended learning and curriculum design – Informal learning.

Knowledge Management System Theory and practice. Knowledge Management – Classic and contemporary works Edited by Daryl Morey & others Universities Press India Private Limited. 2. structure and life cycle – Knowledge Management infrastructure – Knowledge Management applications – Collaborative platforms. Edited by CW.Page 44 of 47 DMC 1982 KNOWLEDGE MANAGEMENT UNIT I . 3. 4. UNIT II . UNIT III . McElroy. techniques – Knowledge Management and measurements – Knowledge audit – Knowledge careers – Practical implementation of Knowledge management systems – Case studies. Firestone and Mark W. Knowledge Management. Knowledge Management. 5. UNIT V . Sudhir Warier. Handbook on knowledge management. conversion and diffusion.KNOWLEDGE MANAGEMENT SYSTEMS Knowledge Management and organizational learning. architecture – important considerations – collection and codification of knowledge – Repositories. Hol Sapple Springer. John Wiley & Sons. 6. Key issues in the New Knowledge Management –Joseph M.KNOWLEDGE CULTURE IN ORGANISATIONS Developing and sustaining knowledge culture – Knowledge culture enablers – implementing knowledge culture enhancement programs – Communities of practice – Developing organizational memory. Shelda Debowski.Vikas Publishing House Private Limited. . Butterworth – Hienemann.INTRODUCTION Knowledge Economy – Technology and Knowledge Management – Knowledge Management Matrix – Knowledge Management Strategy – Prioritizing knowledge strategies – knowledge as a strategic asset. UNIT IV .Edited by Stwart Barnes Thomson Learning.KNOWLEDGE MANAGEMENT – LOOKING AHEAD Knowledge Management tools. REFERENCES 1.KNOWLEDGE ACQUISITION AND PROCESSING Knowledge Attributes – Fundamentals of knowledge formation – Tacit and Explicit knowledge – Knowledge sourcing. abstraction.

“Internet and World Wide Web How to program”.0 Graphics. .Animations with sound effects . “Flash 5.Layers Creating new Images .Adding audio or Video Windows Media Player ActiveX Control . Jon Warren Lentz .GIF .Agent control . Richard Schrand. Hungry Minds Inc. “Flash 5 Bible”.Scaling Images . Animation & Interaction”.Using style Palette Animation.Web page design and site building .Tool Palette . 3.Adding multimedia to the web.Moving and Merging Layers . INTRODUCTION HTML coding .Color calibration . PAINT SHOP PRO/PHOTOSHOP Introduction .Grids .Embedding VRML in a web page .Oil paint effect. (Unit 4 & 5) REFERENCES 1.Grey styling .Real Player ActiveX control.2 & 3) 2.Screen capturing .Creating gradients . IMAGE HANDLING Scanning Images . Deitel.Basic web graphics .Adding Text to the images .JPEG .Image Basics . 2000.Brushes . Robert Reinhardt. 2001. APPLICATIONS Creating web site with a particular theme using all the utilities .Creating background images .Color models . 4. James L. Prentice Hall 2003. MULTIMEDIA Creating clippings .File Formats .Color Palette . (Unit 1.Graphics Animations and Interaction.Color depths . Mohles.Image maps . 5. 2. Adobe Press. TEXT BOOKS 1. Macromedia 2000. “Photoshop 6 Visual Jumpstrat”. 2.Designing icons .Page 45 of 47 DMC1983 WEB GRAPHICS 1.

Page 46 of 47 DMC1984 E-LEARNING TECHNOLOGY 1. 2.Designing a learning site – Customizing a learning site. 3. 2003. Rapid Intake Press. Besty Bruce. 2006. TRACKING LEARNER DATE Learning site for tracking – Learning site database – Tracking and scoring issues – Setting up data tracking – Enhancements – Communicating with learning management system. “Macromedia Dreamweaver E-learning Tool-kit: Building Webbased Traning with Course builder”. LEARNING SITE Introduction to learning site – Possibilities – Installation . 2002. Michael Doyle.CB java script. 4. Learning and Performance”. Peachpit Press. 2. Gain Hess & Steven Hancock. EXTENDING COURSE BUILDERS Using custom . INTRODUCTION Using Dreamweaver for e-learning – Advantages – Disadvantages – Other web technologies – Course binder – Possibilities – Installation – Basics – Getting started – Multiple choice & time/false interaction.style sheet to enhance CB – Action manager – Overview – Customizing action manager tab – action management object – crating custom – course builder interactions – deciphering. . 2. “E-learning with Dreamweaver MX: Building online Learning Applications”. REFERENCE 1. 5. “Beyond E-Learning: Approaches and Technologies to Enhance Organizational Knowledge. TEXT BOOKS 1. Marc L Rosenberg. Pfeiffer Wiley. ADVANCED INTERACTION Explore interaction – Button interaction – Text interaction – Timer interaction – Slider interaction – Global interaction enhancements. “ Using Dreamweaver MX to create E-Learning : A Comprehensive Guide to Course Builder and Learning sites”. 2004.

"Data Warehousing In Action". "Advances In Knowledge Discovery And Data Mining". John Wiley & Sons Inc.Stephen J. Databases.-Need.Overview Of Data Mining Techniques. Tata McGraw. Morgan Kaufmann Publishers. Transformation.Categorization Of Major Clustering Methods: Partitioning Methods – Hierarchical Methods 4.Data Mining Functionalities-Steps In Data Mining Process-Architecture Of A Typical Data Mining Systems.. Jiawei Han. 2004. "The Data Warehouse Life Cycle Toolkit". TEXT BOOK 1. “Data Warehousing. Micheline Kamber. The M. 1997.Data Warehouse Architecture-Data Warehouse Implementation..& OLAP”. Discretization Concept Hierarchies-Concept Description: Data Generalization And Summarization Based Characterization.Fayyad. 1996.Hill. Integration. 2002. 3.-Mapping the Data Warehouse to Multiprocessor Architecture.OLAP. Alex Berson. APPLICATIONS Applications of Data Mining-Social Impacts Of Data Mining-Tools-An Introduction To DB Miner-Case Studies-Mining WWW-Mining Text Database-Mining Spatial Databases. Padhrai Smyth And Ramasamy Uthurusamy. PREDICTIVE MODELING Classification And Prediction: Issues Regarding Classification And PredictionClassification By Decision Tree Induction-Bayesian Classification-Other Classification Methods-Prediction-Clusters Analysis: Types Of Data In Cluster Analysis. Data Mining. Ralph Kimball. 4.Classification Of Data Mining Systems . John Wiley & Sons Inc. DATA WAREHOUSING Data Warehousing Components -Multi Dimensional Data Model. 5. 1998. Gregory Piatetsky . Reduction. 3.Shapiro.T Press. 2. Usama M. REFERENCES 1. 2. "Data Mining: Concepts and Techniques". DATA PREPROCESSING AND ASSOCIATION RULES Data Preprocessing-Data Cleaning.Mining Association Rules In Large Databases. Smith.I. Sean Kelly.Categorization of OLAP Tools. INTRODUCTION Relation To Statistics.Page 47 of 47 DMC 1985 DATA WAREHOUSING AND DATA MINING 1. .

Sign up to vote on this title
UsefulNot useful