0 ratings0% found this document useful (0 votes) 122 views15 pagesComputer Science Major - 0001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Session: 2022-23
Program: Diploma
Subject: Computer Science
1. | Course Code ‘S2-COSCIT
2._| Course Title Computer Networks & Information Security
3._| Course Type (Core Course? | CoreCourse -(Major — 1)
Elective/ Generic Elective!
‘Vocational
4, | Pre-Requisite Gf any) NIL
5. | Course Learning Outcomes After completing this:coursé i stilent al ‘be able
(CLO) to:
1. Define and dasibe
Communications §5
OSI Model, na
format.
2. Identify and’ reed Raong the network devices
and deve,
3a Le and deser rious error detection and
eS ore xis, Define the various terminologies
u 2 in and Application layers.
¢ various network technologies and can
suitable technology installation as per
Srequifement and environment at any work place.
. Describe the various protocols and can identify the
application areas of each protocol.
Know the fundamentals of network and information
security issues, laws, and various security technologies
which can be applied on work place.
Theory—4 Credits Practical — 2 Credits
Max. Marks: 30+70 | Min. Passing Marks: 33
‘Course’
No. of Lectures (in hours per week): 2 Hrs. per week
Total No. of Lectures (in hours):60 Hrs.
Module. Topics No. of
Lectures
T _ | Introduction to Computer Network: 8
Use of computer network: Access to information, person to person
‘communication, electronic commerce, internet of things;
Types of computer network: Broadband access network, Mobile and
wireless network, content delivery network, transit network, Enterprise
network.
Network Technology: Personal _Area Network, Local Area Network,
y
Abhilasha Kumar
Chairman, Central Board of Studies, Computer Science‘Metropolitan Area Network, Wide Area Network, intemetworks, example of
network (Internet, Mobile network, wireless network-Wi-Fi);
Reference Model: OSI, TCP/IP, Critique of the OSI and TCP/IP reference
models;
Policy, Legal & Social Issues: Online speech, net neutrality, security &
privacy, disinformation.
Keywords: IoT, Broadband, LAN, MAN, WAN, OSL, TCP/IP.
1
Physical Layer:
Guided Transmission Media: Twisted pairs, coaxial cable, Fiber Optics;
Wireless ‘Transmission: The electromagnetic spectrum, frequency hopping
spread spectrum, direct sequence, spread . spectrum, ultra-debng
communication; 5
Cellular Network: Common concepts ~ cells, handoff, Bagin; Oe, "AG
4G & 5G technology. ~~"
oP
1G. 3G,
mL
Data Link Layer: =
Service Provided to Network Layer: Data LinkéGontrgl: Framing, Flow and
Error Control; Error detecting codes, Error cor :
Data Link Protocols: Basic transmission an
protocol, Full duplex, Sliding windoty,protgcol,
Point-to-Point Protocol. th, “a,
Switching Techniques: Ratket Switchiig, “Circuit Switching, Datagram
Networks, Virtual-Circuit Nétyor Strubture of a Switch.
Network Devices & Drivers: Réjiter, Modim, Repeater, Hub, Switch, Bridge
and Gateways (fundamental concepts),
Keywords: error cgirectii codes, error detecting codes, SONET, ADSL,
point -to;point profocgl*Roliter, Modem, Repeater, Hub, Switch, Bridge,
Gateways". a, “UE a
jimplex link layer
ver SONET, ADSL,
12
Ne
at
| Adc
‘Network Layer: “%,
or suedRouting Algorithm: Optimality, principle of shortest
fe ding, Distance Vector Routing, Broadcast Routing;
gestion “tir 4c, traffic management approaches; IP Addresses, IPv4
SEP TG Adiresses,
ikCireuit'Nétworks: Frame Relay and ATM,
*gnsport Layer:Process-Process Delivery: UDP, TCP.
Appligation layers: DNS, SMTP, POP, ftp, http and https.
Basics of Wi-Fi (Fundamental concepts only).
Streaming audio and vidéo: digital audio and video, streaming stored media,
real-time streaming.
Keywords: routing algorithm, IPv4, IPvé, ATM, SMTP, POP, ftp, http, https,
WiFi, video streaming.
12
Network Security and Information Security: Fundamentals of network and
information security: principles of security and attack. Security Goals
(Confidentiality, Integrity, and Availability), Not udiation. ]
Overview of Security Threats and Vulneral Types of attacks on
10
ye
Abhilasha Kumar
Chairman, Central Board of Studies, Computer ScienceConfidentiality, Integrity and Availability. Vulnerability and Threats:
Phishing Attacks, E-mail threats, Web-threats, Intruders and Hackers, Insider
threats, SQL injection Attacks, Ransomware. Malware: Worms, Virus,
Spams, Adware, Spyware, Trojans.
Security Technology: Firewalls, Intrusion detection and prevention systems,
Scanning and Analysis Tools: Biometric access controls, Cipher methods,
Cryptographic algorithms, Cryptographie tools, Protocols for secure
communication.
Keywords: phishing, SQL injection, Worms, Computer virus, Spyware,
Trojans, Firewall, Cipher, Cryptography ae
‘Vi__| Computer and Cyber-crimes: Cyber-crimes and related concepts, distinction | 10
between cyber-crimes and conventional crimes, Cyber, criminglssandstheir
objectives. Kinds of eyber-crimes, cyber stalking, forgéty and frau
related to IPRs, cyber terrorism, Ransom ware attacks, compiiter Vand
Cyber Laws- Introduction to IT laws & Cyber Crimes _ ,
Cracking, Viruses, Virus Attacks, Software Piracy Intl sctual:, property,
Legal System of Information Technology, Social ial HO ‘Mail Bombs,
Bug Exploits. Scope of cyber laws: e-comniite, oflinescontacts IPRs
(copyright, trademarks and software patenting), oe ee "governance and
cyber-crimes, Cyber law in India vith ae hg to Information
Technology Act, 2000 and Recent amendment
»
Keywords: cyber-crime, gir st st sefraud, IPR, IT laws, e-
commerce, e-taxation, e-govemance, ae
jources:
TexibookS, Referetices Books, Other Resources
Suggested Readings
Textbooks:
© Andrew S. Tanéhibs yctaeam rer; David J. Wetherall, Computer Networks, 6th Edition,
(2021), Pearson. —)
* Michael ie a Mattord, Principles of Information Security, Fourth Edition,
CENGAC 6tliiindian Reprint.
° Mg at Ge formation Security Principles and Practices, 2™ Edition, 2014,
. oN letwork Security, Cengage Learning.
Praveen ‘Kumar ‘Shukla, Surya Prakash Tripathi, Ritendra Goel “Introduction to Information
Security and’Cyber Laws”, 2014, Dreamtech Press.
© Faiyaz Ahamad, KLSI “Cyber Law and Information Security”, 2013, Dreamtech Press.
© Books published by M.P. Hindi Granth Academy, Bhopal
Reference books:
‘© Kurose James F., Ross Keith W., Computer Networking, A Top-Down Approach, Sixth Edition,
2017, Pearon
© Micki Krause, Harold F. Tipton, Handbook of Information Security Management, Vol. 1-3, CRC
Press LLC.
B.A. Forouzan: Data Communications and Networking, Fourth edition, TMH Publishing
ye
Abhilasha Kumar
Chairman, Central Board of Studies, Computer Science‘Company Ltd.
© Basta, W.Halton, Computer Security: Concepts, Issues and Implementation, Cengage Learning
India,
Suggestive digital platform web links
+ https'//www. youtube. com/watch?v=qiORSrTSshw_
2 Free CONA | Network Fundamentals - Day 1 (https://www.youtube.com/watch?v=n2D10-
aM-2s)
Free CONA | Network Deviceshttps://www.voutube.com/watch?v=H8W90MNSuwo
Free CCNA | OSI Model & TCP/IP Suite (hitps://Awww. youtube.com/watch?v=t-ai8JzhHuY)
Free CCNA | Interfaces and Cables | Day3
(attps://www.youtube.com/watch?v=ieTHSIVhNaY)
Free CCNA | Intro to the CLI Day 4 (https://www. youtube.com/watch?v=1Ybtai7Nu2:
Free CCNA | Ethernet LAN Switching (Part 1) | Day 5
- — Ghttps://www-youtube.com/watch?v=u2n762WGOVo)
8. eCCNA | Analyzing Ethemet Switching | Day 6 Lab
(https://www youtube.com/watch?v=l0dSa0QDI8)
9. Free CCNA | IPv4 Addressing (Part 1) | Day7
(https://wwwyoutube.com/watch?v=3ROdsfEUuhs)
10. Free CCNA | IPv6 Part 1 | Day 31 (https://www. youtube,com/watch?v=ZNuXyOXae5U)
11, Free CCNA | IPv6 Part 3 | Day 33 (https://www.youtube.com/watch?v=rwkHfsWQwy8
12. btpl/www.mphindigranthacademy.org/
i,
yay
no
Suggested equivalent online courses 2°
NPTEL:
1. Demystifying Networking (04 week) i
z Cyber Security (15 Weeks),
5. https/www.edx.ore/learn/cbinputer-nel Workin:
2 =
is. Pant D2Assessmeitand Evaluation’
Suggested guciny i Methods:
55
Maximum,
Continuous ae] luation (CCE) : 30 marks University Exam (UE) : 70marks
onset) Class Test Total 30
Assignment/Presentation
Evaluation (CCE):
External Asséigment + Section(A) : Objective Questions | Total 70
‘University Exam Section: 70 | Section (B): Short Questions
Time : 03.00 Hours Section (C) : Long Questions
y*
Abhilasha Kumar
Chairman, Central Board of Studies, Computer ScienceProgram: Diploma Session: 2022-23
Subject: Computer Science
1. | Course Code $2-COSCIP
2._| Course Title Computer Networks Lab
3. | Course Type (Core Course/ Core Course - (Major —1)
Elective/ Generic Elective/
Vocational
4_| Pre-Requisite GFany) Open for all y
5. | Course Learning Outcomes After completing ths lab Sotnge!Sfudents will be
(CLO) able to: ‘3,
1. Leam and identify’
networking. %
2. Leam, identifyvarigus Conneciors used to connect
different cables.
Use the, zis tobls.9F preparing the connectors
for cb,
fe
lage various local area networks
aes place.
6._| Credit Value Prigtici 2 GFedits
7._| Total Marks
“Min. Passing Marks: 33,
No. of Lab. Practicals (in hours per week): 1Hr. Elen weale
Be, “Total No. of Labs: 30 Hrs.
©" SuBgestive List of Practicals ‘No. of Labs.
TL. Stag Se cable 30
‘Slor code of UTP cable
tics of UTP n/w cable
P
es: lding of n/w cable
~ ‘Teétricity interference with n/w cable
%q, ‘Magimum length for which data cable can be used
rimping of RJ45 connector and Punching of data n/w.
cable
‘©. Penta scanning of cabling work
©. Rules of UTP laying
2. Knowledge of Structured Cabling and its components
Information outlet with box
o Network Rack (4U, 6U, 9U, 12U, 24U, 32U, 42U)
o Patch Panel
© Rack Management
=
3._Study of Optical Fiber cable
we
Abhilasha Kumar
Chairman, Central Board of Studies, Computer Science&
4, Use of tools
5. Configuration/ Manageme Pettit Rn Nevork
&
ky coaitye ‘Dynamic routing using packet tracer
& Ned ‘tracer
S
Different cores of OFC 6 core, 12, 24 core)
Multimode & Single mode OFC cable
Shielding of OFC
Splicing/Termination of OFC
OTDR Testing
LIU fixing
LIU management (pigtail/fiber patchoord)
Media Convertor
SFP module
©” Rules of OFC laying
000000000
© Crimping Tool
Punching Tool
‘Nose plier
Wire Stripping and Cable Cutter
Multimeter
RU45 RIL RY12 Cat5 Cat6 Network C: +
In-Line Coupler (RI45 F/F) Shee
RJ45 NETWORK, SETTER Ros Way.
0000000
°
Implementatigt of fil
Installation 61 van ent.
Connect the tiie Beal Area Network.
Configuring Class, IPsddress on LAN Connection in
ComputéiLAB and then use following tools:
pingsipe getmac, hostname, nslookup, tracert,
ping, systeminfo.
tatic routing using packet tracer software
oo°
Configure VLAN using Managed switch Device / Packet
plementation of Subnetting in Class A, B and C
6 Sa 2 systems using IPv6
© Configuration of NAT for incoming packet request
© Configuration of Software / Hardware firewall to block
outgoing requests to facebook.com
we
Abhilasha Kumar
Chairman, Central Board of Studies, Computer Science.PART. C: Learning Resources,”
Textbooks, Reference Books, Other Resources
Suggested Readings
© Andrew S. Tanenbaum Nick Feamster, David J. Wetherall, Computer Networks, 6th Edition,
(2021), Pearson.
© Michael E Whitman and Herbert J Mattord, Principles of Information Security, Fourth Edition,
CENGAGE Leaning, 6th Indian Reprint.
© Books published by M.P. Hindi Granth Academy, Bhopal
Reference books:
‘* Hacking Exposed, Stuart McClure, Joel Scrambray, George Kurtz, TMH.
«Computer Security Art and Science, Matt Bishop, Pearson/PHI..._
‘Suggestive digital platform web links
hitps://www.edx.org/learn/computer-networking
http/www.mphindigranthaeademy.org/
‘Suggested equivalent online courses
hittps://nptel.ac.in/courses/106/105/1061050817
Internal Assessment External Assessment Marks
Class Interaction /Quiz Viva Voce on Practical
Attendance Practical Record File
Assignmesig a si Table work / Experiments
Seminar / Rutal
Technology Dissemin:
Report. ae sion, Lab Visits!
Survey India visi)
TOTAL 30 70
y*
Abhilasha Kumar
Chairman, Central Board of Studies, Computer ScienceProgram: Diploma
Session: 2022-23
Subject: Computer Science
T. | Course Code
'S2-COSC2T
2. | Course Title
Object Oriented Programming with Java
3. | Course Type (Core
Course/Blective/Generic
Blective/ Vocational
Core Course— (Major —I) / Minor / Elective
Dee
4, [Pre-Req
ite (if any)
To study this course, a stude
completed the course on’
Certificate Level.
3. | Course Leaming
Outeomes(CLO)
After the completion: of isco, a successful student
will be able to a followin:
1 Inlet Secorenied programming concept using
ini ‘ea 1 Structures, strings and function
foe veloping skills of logic building activity
2. Tak uset objects, members ofa class and the
desing ‘among them needed for a finding the solution
“e a specific problem.
3. Dénjonstrates how to achieve reusability using inheritance,
interfaces and packages and describes faster application
development can be achieved.
. Demonstrate understanding and use of different exception
handling mechanisms and concepts of multi-threading for
robust faster and efficient application development.
. Identify and describe common abstract user interface
components to design GUI in Java using Applet & AWT.
along with response to events.
>. Identify, Design & Develop complex Graphical user
interfaces using principal Java Swing classes based on
MVC architecture.
6. | Credit Value
Theory -4 Credits Practical —2 Credits
7. | Total Marks
‘Max. Marks : 30+70 Min, Passing Marks: 33
wpe
Abhilasha Kumar
Chairman, Central Board of Studies, Computer Science'No. of Leotures (in hours per week): 2 His. per week
Total No. of Lectures: 60 Hrs.
Topies
‘No. of Lectures
OOPS - Object Oriented Paradigm, Benefits of OOP, Applications of OOP.
Java - History, Java Features, How Java Differs from C and C+, Java and
internet, Java and World Wide Web, Web Browsers, Hardware and
Software Requirements, Java Supports Systems, Java Environment.
Java Program Structure - Java Tokens, Java Statements, Implemy
Java Program, Java Virtual Machine, Command Line ‘Arguments,
Programming Style.
Keywords: OOPS, JVC, WWW, Java Environment
12
I
Ke
‘ava Basies -Constants, Variables, Data Types, Deplaratigi Of Variables,
Giving Values to Variables, Scope of Variable, Symbolic Constants, Type
Casting, Getting Values of Variablessigiandgrd Defi tYlues.
Operators - Arithmetic Operator, Relatighal 6 rat 3, Logical Operators,
Assignment Operators, Incremefit and ‘pecreinent 0} srators, Conditional
Operators, Bitwise Operators, Special, Operator
Arithmetic Expressions - Evaluation of Expressions, Precedence of
Arithmetic Operators, Type Conversioigin Expressions, Operator
Precedence and AssogjativityMathematical Functions. Decision Making
with if Statement, SimpleifStatement, if.......Else Statement, Nesting of if
..clse Stater hse Ladder, 7 The Switch Statement, The ? Operator.
-meiit,,Do Statement, For Statement, Jump in Loops,
1 aU 2p
ving Cree Arithmetic Expressions, Decision Making, Loops
12
fi
Class - fsa a'Class, Adding Variables, Adding Methods, Creating
Obits Actessing Class Members,
Constructors — definition and types, Methods Overloading, Static
Members, Nesting of Methods.
Inheritance - Extending a Class, Overloading Methods, Final Variables and
Methods, Final Classes, Finalize Methods, Abstract Methods and Classes,
Visibility Control Arrays, One Dimensional Array, Strings, Vectors,
Wrapper Classes. Defining Interfaces, Extending Interfaces, Implementing
Interfaces, Accessing Interface Variables.
Keywords: Class, Constructors, Inheritance, Final, Abstract Methods,
12
yp
Abhilasha Kumar
Chairman, Central Board of Studies, Computer Science10
Overloading
Java API Packages - Using System Packages, Naming Conventions,
Creating Packages, Accessing a Package, Using a Package, Adding a Class
toa Package, and Hiding Classes. Creating Threads, Extending the Thread
Class, Stopping and Blocking a Threads, Life Cycle of a Thread, Using
Threads Methods, Threads Exceptions, Threads Priority, Synchronization,
Implementing the ‘Runnable’ interface.
a
‘Types of Errors - Exceptions, Syntax of Exception Handling Code,
Multiple Catch Statements, Using Finally Statements, Throwing Qur
Exceptions, Using Exceptions for Debugging.
Preparing to Write Applets - Building Applet Code, Applet Lite Gyci
Creating an Executable Applet, Designing a Web Pages! fag, Adding
Applet to HTML File, Running the Applet.
Keywords: API, threads, synchronization, eros, Applets, debugeing
Se
12
More About the Applet fag - Passing Baraiglerstg, Applets, Aliguing the
Display, More About HTML Tags, Disp ‘ing Values, Getting
Input from the user. £ e
‘The Graphics Class - Lines
Ares, Drawing Polygons, Li
Drawing Bar Charts.
Mech ies and Ellipses, Drawing
Graplis, Using Control Loops in Applets,
BP
Concept of Stream Str
Stream Clasies, Using S
Other Usefi 70.Caikes = ising the File Class, Input / Output Exceptions,
Credtion off Fils, Reading / Writing Characters, Reading / Writing Bytes,
ia sinBPrintve Daa ‘Types, Concatenating and Buffering Files, Random
Kes S Ti Geaciye Input and Output, other Stream Classes.
Sywvor
les, Graphics class, buffering, HTML tags
Classes, Byte Stream Classes, Character
S,
—
12
\p”
Abhilasha Kumar
Chairman, Central Board of Studies, Computer Science1
“Textbooks, Reference Books, Other Resources
Suggested Readings
Textbooks -
© E Balguruswami, Programming with Java, Tata McGraw-Hill Publication.
Reference Books -
© Bruce Eckel, Thinking in Java.
Herbert Schildt, Java: The Complete Reference .
Y. Daniel Liang, Introduction to Java Programming .
Paul Deitel, Harvey Deitel, Java: How To Program .
Cay S. Horsttnann, Core Java Volume I Fundamentals .
Java Projects, BPB Publication.
Dr. $.S, Kandare, Programming in Java, $ Chand Publication,
Books published by M.P. Hindi Granth Academy, Bhopal
Suggestive digital platform web Tinks
https:/www.youtube.com/watch?v=7s3:
httoe//uwu.mphindlgranthacademy.ors/
‘Suggested equivalent online courses
Se
‘itps/nptel.ac.in/eourses/ 1067105110 POS1OR/
\ssessment and Evaluation.
Suggested ContinuousiEvaluation Method:
Maximum Marks'%100
Continuous Comprehensive Evaluation (CCE) : 30marks University Exam (UE) 70marks
Internal Assessment : Class Test
Continuous Comprehensive | Assignment/Presentation
Evaluation (CCE):30
External Assessment Section(A) : Objective Questions | Total 70
University Exam Section: 70. | Seetion (B) : Short Questions
Time : 03.00 Hours Section (C) : Long Questions
yp
Abhilasha Kumar
Chairman, Central Board of Studies, Computer Science13
Program: Diploma
‘Session: 2022-23
Subject: Computer Science
T. | Course Code
'S2-COSC2P.
2. | Course Title
‘Java Programming Lab
3. | Course Type (Core
Course/Elective/Generic
Blective/ Vocational
Core Course - (Major- II) /Minor / Elective
4. | Pro-Requisite GF any)
Tmushhave guocessfully
To study this course, a stud
completed the course on gait ing’Methodology at
Certificate Level.
5. | Course Leaming
Outcomes(CLO)
After the completion of {his course, a successful student
willbe able tad aéithe following:
- plein 1 Baie ectt@fiented programming concept using
” ie ytaxes ‘GEcontrol Structures, strings and function
fou developitifiskills of logic building activity.
2. Identify classes, objects, members of a class and the
lationiips among them needed for a finding the solution
na.sbécific problem.
3. Demonstrates how to achieve reusability using inheritance,
interfaces and packages and describes faster application
development can be achieved.
. Demonstrate understanding and use of different exception
handling mechanisms and concepts of multi-threading for
robust faster and efficient application development.
. Identify and describe common abstract user interface
components to design GUI in Java using Applet & AWT
along with response to events.
. Identify, Design & Develop complex Graphical user
interfaces using principal Java Swing classes based on
MVC architecture.
6. | Credit Value
Practical - 2 Credits
7. | Total Marks
Max. Marks : 100 Min. Passing Marks: 33
wy"
Abhilasha Kumar
Chairman, Central Board of Studies, Computer Science14
‘No. of Lab, Practicals (in hours per week): I Hr. per week
Total No. of Lab.: 30 Hrs.
Suggestive List of Practicals
No. of Labs.
(Using any Text editor: Notepad/Eclipse/Netbeans/Sublime ete.)
1. Find greater number between two numbers -using conditional,
operator. oe
2. Find the factorial of number if number is given by user using &_
‘command line argument. , 7
3. Write a program to check if'a number is prime or not.
4. Write a program to display tables from 2 to 10.
5. Write a program to print Fibonacci series.
6
7.
8.
9
10.
be employee if salary is
Of service is greater than or
"
nea ye called “Arithmetic” that contains methods to deal all
ions. Also write a program to use the package,
SG Bie program to demonstrate use of constructor and destructor,
Define an exception called “Marks out of Bound” exception that is
thrown if the entered marks are greater than 100.
17, Write a program using application of single inheritance. Find the area
of rectangle & volume of cube,
18. Develop a simple real life application to illustrate the use of
multithreading.
19. Write a program using multiple inheritance to calculate area and
perimeter of a circle using interface.
20. Write an applet program to draw a Rectangle (color = orange) and a
30
\p*
Abhilasha Kumar
Chairman, Central Board of Studies, Computer Science15
Tight aligned oval.
21. Develop an applet that receives 3 numeric values as inputs from the
user and then displays the largest no, on the screen.
22 Write a Java Program to read data from the inputted text file name,
and print its content on the console,
23. Write a Java Program to merge two files into third file
24. Write a Java program to delete duplicate lines in text file
25, Write a Java Program to implement FileInputStream class to read
binary data from any image file,
PART C: Learning Resources
Textbooks, Reference Books, Other Resources
Suggested Readings
Textbooks -
¢ EBalguruswami, Programming with Java, Tata McGraw-Hill Publica
© Books published by M.P. Hindi Granth Academy, Bhopiil
|, 2nd Edition
Reference Books -
© Bruce Eckel, Thinking in Java (4e)
Herbert Schildt, Java: The Complete Refergivet s
Y. Daniel Liang, Introduction to Java Programming (108)
Paul Deitel, Harvey Deitel, Java: He TopPrébeam|(T0e)
Cay S. Horsttnann, Core Java Volume® ete funda (10e)
Java Projects, BPB Publicatior
#_Dr.$.S. Kandare, Programmingsin Java,
evcee
Gland Publication
Suggestive digital Platform web likes
hitps/nnw.cs.cmu.edulat/eioan ‘du/user/echen/www/download/java/LearnJava. pdf
https://www.tutorialspoint com/jaa/javi tutorial. pdf
httpsil/www. youtube. céntiwath2v=783xDfdafDw
http://www.mphindigranithacademyiore/ '
Suggested, equivalent online, tyes
https/ Ulapte.seaiVeotes/T0G7 1571061051917
S
we
Abhilasha Kumar
Chairman, Central Board of Studies, Computer Science16
F ae
SURE eas
D-Assessin
ent and
fuation:
Suggested Continuous Evaluation Methods:
Internal Assessment Marks External Assessment Marks
Class Interaction /Quiz ‘Viva Voce on Practical
Attendance Practical Record File
Assignments (Charts/ Model
Seminar / Rural Service/
Technology Dissemination/
Report of Excursion/ Lab Visits/
Survey / Industrial visit)
TOTAL
70
y*
Abhilasha Kumar
Chairman, Central Board of Studies, Computer Science