Professional Documents
Culture Documents
Information Technology & Related Legislations X
Information Technology & Related Legislations X
k|fljlws ;d"x, tx &, cfO{= 6L= jl/i7 clws[t kbsf] v'nf / cfGtl/s k|ltof]lutfTds k/LIffsf] kf7\oqmd
Pj+ k/LIff of]hgf
kf7\oqmdsf] ?k/]vf M— o; kf7\oqmdsf] cfwf/df lgDgfg';f/ r/0fdf k/LIff lnOg] 5 M
k|yd r/0f M— lnlvt k/LIff k"0ff{Í M— @))
låtLo r/0f M— -s_ k|of]ufTds k/LIff k"0ff{Í M— %)
-v_ cGtjf{tf{ k"0ff{Í M— #)
b|i6Jo M
!= lnlvt k/LIffsf] dfWod efiff g]kfnL jf c+u|]hL jf b'j} x'g ;Sg]5 .
@= k|yd / låtLo kqsf] kqsf] ljifoj:t' Pp6} x'g]5 .
#= k|yd / låtLo kqsf] lnlvt k/LIff 5'§f5'§} x'g]5 .
$= lnlvt k/LIffdf oyf;Dej kf7\oqmdsf ;a} PsfO{af6 k|Zgx? ;f]lwg]5 .
%= j:t'ut ax'j}slNks (Multiple Choice) k|Zgx?sf] unt pQ/ lbPdf k|To]s unt pQ/ afkt @)
k|ltzt cÍ s§f ul/g]5 . t/ pQ/ glbPdf To; afkt cÍ lbOg] 5}g / cÍ s§f klg ul/g] 5}g .
^= ljifout k|Zgdf k|To]s v08sf nflu 5'§f5'§} pQ/k'l:tsfx? x'g]5g\ . kl/IffyL{n] k|To]s v08sf k|Zgx?sf]
pQ/ ;f]xL v08sf pQ/k'l:tsfdf n]Vg'kg]{5 .
&= o; kf7\oqmd of]hgf cGtu{tsf kq÷ljifosf ljifoj:t''df h];'s} n]lvPsf] eP tfklg kf7\oqmddf k/]sf
sfg"g, P]g, lgod tyf gLltx? k/LIffsf] ldlt eGbf # dlxgf cufl8 -;+zf]wg ePsf jf ;+zf]wg eO{
x6fO{Psf jf yk u/L ;+zf]wg eO{_ sfod /x]sfnfO{ o; kf7\qmddf k/]sf] ;Demg'' kb{5 .
*= k|yd r/0fsf] k/LIffaf6 5gf}6 ePsf pDd]bjf/x?nfO{ dfq låtLo r/0fsf] k/LIffdf ;lDdlnt u/fOg]5 .
(= kf7\oqmd nfu" ldlt M— @)&&/!!/!$
1
g]kfn :6s PS;r]~h lnld6]8
k|fljlws ;d"x, tx &, cfO{= 6L= jl/i7 clws[t kbsf] v'nf / cfGtl/s k|ltof]lutfTds k/LIffsf] kf7\oqmd
k|yd / låtLo kq M— Information Technology & Related Legislations
Section -A (50 Marks)
1. Introduction of Computer and Architecture
1.1 Computer System and Types of Computer.
1.2 Components and Architecture of Computers
1.3 Input Devices: Keyboard, Mouse, other input devices
1.4 Processor: ALU, CU, Registers
1.5 Memory : Primary and Secondary Memory
1.6 Storages devices: Hard Drive, USB Devices and other Storage Devices
1.7 Output devices: Monitors, Printers
4. Operating system
4.1 OS Fundamentals: Definition of OS, Functions of OS, Components of OS,
Types of Operating System, Application Software vs System Software,
LINUX vs. UNIX, Primary, Extended and Logical Partition
4.2 CPU scheduling and scheduling algorithm
2
g]kfn :6s PS;r]~h lnld6]8
k|fljlws ;d"x, tx &, cfO{= 6L= jl/i7 clws[t kbsf] v'nf / cfGtl/s k|ltof]lutfTds k/LIffsf] kf7\oqmd
4.3 Deadlock detection and prevention
4.4 Memory Management: Memory hierarchy, Storage Placement Policies:
First Fit, Best Fit, Worst Fit, Fixed Partitioning and Variable Partitioning
memory management, Virtual Memory, Paging, Demand Paging, Memory
Protection and Sharing, Limit Register, Swapping, Segmentation, Paging and
Segmentation Combined, Concept of Thrashing, Page Replacement
Algorithms, Overlays, TLBs
4.5 Windows and Linux based networking architecture
4.6 Monitoring and Troubleshooting Windows and Linux network
4.7 Users, Groups and Permission on Linux and Windows.
4.8 Security: Security breaches, Types of Attacks, Security Policy and Access
Control, Basics of Cryptography, Protection Mechanisms, Authentication,
OS Design Considerations For Security, Access Control Lists And OS
Support
3
g]kfn :6s PS;r]~h lnld6]8
k|fljlws ;d"x, tx &, cfO{= 6L= jl/i7 clws[t kbsf] v'nf / cfGtl/s k|ltof]lutfTds k/LIffsf] kf7\oqmd
5.16 Data Mining and Data Warehousing
5.17 Database Security, Performance Tuning, Concept of Big Data, NoSQL,
Hadoop
7. Software Engineering
7.1 Software and Software Engineering
7.2 Software development Model: Waterfall, RAD, Spiral, RUP, Agile
7.3 System Requirement Specification (SRS)
7.4 Feasibility Analysis
7.5 Software Design: Logical vs Physical Design; UML Diagrams: Use Case
Diagram, Class Diagram, Communication Diagram, State Chart Diagram,
Sequence Diagram; Activity Diagram; Structure Chart, Qualified
Association in Class Diagram DFD ( Level-0,1,2); Software Coupling and
Cohesion and its Types; User Interface Design: Wireframe Diagrams
7.6 Software Development: Software frameworks and CASE tools
7.7 Software Testing: Black Box, White Box, Gray Box, Unit, Integration
Testing, Regression Testing, Software Fault Tolerance
7.8 Software maintenance types, Reverse Engineering; Refactoring and
Restructuring
7.9 Software Quality: Software Quality Assurance process ;Verification vs
Validation; Software Inspection; Clean Room Software Engineering,
Software Reviews and FTR; Statistical software quality assurance; Software
reliability; ISO Standards; CMMI model
7.10 Software Issues: Social, Legal and Ethical Issues; Business Process
Engineering and Re-Engineering; Concept of Big Data
7.11 Software Configuration Management: Main software configuration
management (SCM) concepts, SCM repository; SCM process; Change
Management; Version and release management
8. Computer Network
8.1 Network Definition, Network Models, Network Topology, Network
Addressing
8.2 Network Connectivity: Data Communication Media
4
g]kfn :6s PS;r]~h lnld6]8
k|fljlws ;d"x, tx &, cfO{= 6L= jl/i7 clws[t kbsf] v'nf / cfGtl/s k|ltof]lutfTds k/LIffsf] kf7\oqmd
8.3 The Data Package, Establishing a Connection, Reliable Delivery, Network
Connectivity, Noise Control, Building Codes, Connection Devices
8.4 The OSI reference model
8.5 Common Network Protocols
8.6 TCP/IP Protocol
8.7 Network LAN Infrastructure
8.8 Remote Networking: Remote Networking, Remote Access protocols, VPN
Technologies.
8.9 Network Security: Introduction, Virus Protection, Local Security, Network
Access, Internet Security.
8.10 Disaster Recovery: The need for Disaster Recovery, Disaster Recovery plan,
Data backup, Fault Tolerance.
8.11 Network Troubleshooting: Using Systematic Approach to Troubleshooting
8.12 Network Support Tools: Utilities, the Network Baseline
8.13 Digital Signature and Digital Certificate, HSM, Root Server and CA server,
Calculations based on RSA Algorithm; Electronic Payment Gateway and e-
Payment Transaction Steps, Credit Card Operation Steps; IPS, IDS,
Firewalls, Hacking and Viruses
8.14 Distributed System, Cluster based system, Grid Based System; Concept of
traffic analyzer: MRTG, PRTG, SNMP, Packet tracer, Wireshark
8.15 Firewall and Routers
9. Emerging Technology and Security Threat
9.1 Artificial Intelligence: Expert system, Neural Network
9.2 E-commerce: EDI, Cryptography
9.3 GIS, Remote sensing and GPS
9.4 Web 2.0 and Virtual meeting
9.5 Mobile computing
9.6 Security and privacy
9.7 Computer Virus
9.8 Cyber Crime
9.9 Social Media Threat
9.10 Computer Ethics
5
g]kfn :6s PS;r]~h lnld6]8
k|fljlws ;d"x, tx &, cfO{= 6L= jl/i7 clws[t kbsf] v'nf / cfGtl/s k|ltof]lutfTds k/LIffsf] kf7\oqmd
k|Zg ;+Vof
v08 cÍef/
j:t'ut ljifout
-s_ %) @% k|Zg x @ cÍ = %) –
-v_ %) @% k|Zg x @ cÍ = %)
låtLo kq -ljifoutsf] nflu_
k|Zg ;+Vof
v08 cÍef/
j:t'ut ljifout
# k|Zg x%cÍ = !%
-s_ %) – @ k|Zg x!)cÍ = @)
! k|Zg x!%cÍ = !%
# k|Zg x%cÍ = !%
-v_ %) – @ k|Zg x!)cÍ = @)
! k|Zg x!%cÍ = !%
Part B: Practical Exam
1. Linux or Window sever Configuration
2. Web server Concept
3. LAN Network troubleshoot
4. DBMS configuration
5. Data Handling