Professional Documents
Culture Documents
UNIT-II
Classes and Objects: INTRODUCTION, class specification, class objects, accessing class
members, friend functions and friend classes, constant parameters and member functions,
static data and member functions, and memory resource. Object initialization and cleanup,
Dynamic objects, Operator overloading, data conversion
UNIT-III
Virtual Functions: Introduction, need for virtual functions, Runtime Polymorphism, Pure
Virtual Functions, Abstract Classes, Virtual destructors.
UNIT-IV
Working with I/O Streams: Predefined console streams, hierarchy of console stream classes,
unformatted I/O operations, formatted console I/O operations, manipulators, custom/user-
defined manipulators, stream operator with user-defined classes.
Working with File Streams: Introduction, Hierarchy of file stream classes, opening and
closing of files, testing for errors, file pointers and their descriptors /manipulators, sequential
access to a file, object retrieval, random access to a file.
UNIT-V
Books Recommended:
7. Object oriented Programming in C++ and Java: D Samantha; Prentice Hall India
4 IT 2 : SOFTWARE ENGINEERING
3L MM: 100 Exam: 3 Hrs.
UNIT-I
UNIT-II:
UNIT-III
Software Design: Basic Concept of Software Design, Architectural Design, Low Level Design:
Modularization, Design Structure Charts, Pseudo Codes, Flow Charts, Coupling and Cohesion
Measures, Design Strategies: Function oriented Design, Object oriented Design, Top-Down and
Bottom-Up Design. Software Measurement and Metrics: Various Size oriented Measures:
Halestead’s Software Science, Function Point (FP) Based Measures, and Cyclomatic Complexity
Measures: Control Flow Graphs.
UNIT-IV
Software Testing: Testing Objectives, Unit Testing, integration Testing, Acceptance Testing,
Regression Testing, Testing for Functionality and Testing for Performance, Top-Down and
Bottom-Up Testing Strategies: Test Drivers and Test Stubs, Structural Testing (White Box
Testing), Functional Testing (Black Box Testing), Test Data Suit Preparation, Alpha and Beta
Testing of Products. Static Testing Strategies: Formal Technical Reviews (Peer Reviews), Walk
Through, Code inspection, Compliance with Design and Coding Standards.
UNIT-V
Books Recommended:
UNIT-II
UNIT-III
UNIT-IV
I/O Management: Device drivers, disk scheduling, Introduction to loaders, linkers and
relocating loaders,
Security: Security Problem, Program Threats, System and Network Threats, Cryptography as a
Security Tool, User Authentication, and Implementing Security Defenses, Firewalling to Protect
Systems and Networks, Computer-Security Classifications.
UNIT-V
Case Study: The LINUX System-History, Design Principles, Kernel Modules, Process
Management, Scheduling, Memory Management, File Systems, input and Output, Interprocess
Communication, Network Structure.
Books Recommended:
1. Operating System Concepts Seventh Edition: Avi Silberchatz, Peter Baer Galvin,
Greg Gagne; John Wiley & Sons Inc.
Data Modeling Using The Entity Relationship Model: Entity Types, Entity Sets, Attributes, Keys,
Concepts of Super Key, Candidate Key, Primary Key, Relationships, Relationship Types, Roles, and
Structural Constrains, Weak Entity Types , E-R Model Concepts, Notation For ER Diagram, Naming
Conventions, Mapping Constraints, and Design Issues Generalization, Aggregation, Reduction of an ER
Diagrams to Tables, Extended ER Model, Relationships of Higher Degree.
UNIT-II
Relational Data Model and Language: Relational Data Model Concepts and Relational Database
Schema, Integrity Constraints: Entity Integrity, Referential Integrity, Keys Constraints, Domain
Constraints, Relational Constraints, Update Operations and Dealing With Constraint Violations,
Relational Algebra Operations, Relational Calculus, Example of Queries In Relational Algebra, Tupple
and Domain Calculus.
Introduction To SQL: Characteristics of SQL. Advantage, Data Types and Literals. Types of SQL
Commands. SQL Operators and Their Procedure. Tables, Views and Indexes. Queries and Sub Queries.
Aggregate Functions. Insert, Update and Delete Operations. Joins, Unions, Intersection, Minus, Cursors
In SQL.
UNIT-III
Data Base Design & Normalization: Informal Design Guidelines For Relation Schemas, Functional
Dependencies, Normal Forms, First, Second, Third Normal Forms, Bcnf, Inclusion Dependences, Loss
Less Join Decompositions, Normalization Using Fd, Mvd, and Jds, Alternative Approaches To Database
Design.
UNIT-IV
UNIT-V
Database Recovery Techniques: Recovery Concepts, Recovery Techniques Based on Deferred Update,
Recovery Techniques Based on Immediate Update, Shadow Paging. Database Security and
Authorization: Introduction to Database Security Issues, Discretionary Access Control Based on
Granting/Revoking of Privileges, Introduction to Statistical Database Security.
Books Recommended:
8. SQL, PL/SQL: The Programming Language of Oracle: Ivan Bayross; BPB Publication
4 IT 5 : COMPUTER ARCHITECTURE
3L MM: 100 Exam: 3 Hrs.
UNIT-I
Introduction to Computer Architecture: Overview and history - The cost factor; Performance
metrics and evaluating computer designs, Memory hierarchy, Memory addressing, Assembly /
machine language; Von Neumann machine cycle; Microprogramming / firmware, Classifying
instruction set architectures - RISC versus CISC, Processor vs. memory speed, Introduction
and Classification of Parallel Computers.
UNIT-II
UNIT-III
Control Design: Hardwired & Micro Programmed (Control Unit), instruction execution,
Multiple-Bus organization, Microinstruction, Micro program sequencing, Wide-Branch
addressing, Microinstruction with Next-address field, Perfecting Microinstruction.
UNIT-IV
Input-Output organization: I/O devices (Video terminals and Printers), Programmed and
interrupt control mechanism, I/O controllers, Computer Buses, interfacing buses, bus format
& bandwidths. I/O interface, Modes of transfer, interrupts & interrupt handling, Direct
Memory access, input-Output processor, Serial Communication.
UNIT-V
Memory Organization: Memory Hierarchy, Main Memory - RAM, static and Dynamic; ROM,
EPROM, EAROM, EEPROM, Cache and Virtual memory, Auxiliary storage devices - hard disk,
floppy disk, magnetic tape, cassettes, cartridges and compact disks. Virtual Memory, Memory
management hardware.
Books Recommended:
1. Hawang, K., Briggs, F. a.: Computer Architecture and Parallel Processing, McGraw Hill.
UNIT-II
Introduction of Coding: Types of errors, Types of codes, Error control coding, Methods of
controlling errors. Linear Block and Binary Cyclic Codes: Matrix decryption of linear block
codes, Error detection and error correction capabilities of linear block codes. Hamming codes,
structure of cyclic codes, encoding using an (n-k) bit shift register syndrome calculation, its
error detection & correction, Special classes of cyclic codes BCH.
UNIT-III
Burst and Convolution Codes: Burst and random error correcting codes, Encoders for
convolution codes. Decoders for convolution codes, Performance of convolution codes,
performance of block codes in error correction & detection. Comparison of error rates in coded
and uncoded transmission.
UNIT-IV
Importance of System Security and factors affecting it. Conventional Encryption: Classical
Techniques, Modern Techniques, AES, Introduction to Finite Fields, Contemporary Symmetric
Ciphers, Confidentiality Using Conventional Encryption
UNIT-V
Books Recommended:
1. Digital and Analog Communication System: K. Sam Shanmugam; John Wiley Sons.
3. Cryptography and Network Security-Principles and Practice: William Stallings: 3rd Ed.
PHI
4 IT 7 : OBJECT ORIENTED PROGRAMMING LAB
4P MM: 100 Exam: 3 Hrs.
2. Design a UML Diagram for the various entities in “Online Examination System”.
b. Difference between function call by value, call by address, and call by reference
(reference variables) – swap function
g. Similarities & differences in enumerated data types –Using colour codes to refer
to colour types in a program
i. h.1. Single line macros for finding maximum, minimum, cube, etc.
7. How operator overloading can make programs look neat and how it can make
operations / expressions simpler to understand -
8. Defining a friend function (overload == operator) to compare two objects of type Student
and Employee as in previous assignment.
9. Overload insertion (<<) & operator (>>) operators to input and output Person, Student,
and Employee objects respectively
10. Differences in new operator of C++ and malloc() / calloc() of C – Creating runtime 1D
arrays and applying following on them:
ii. Recursive Binary Search to locate an elements position (Hint: make use
of a global variable to check for sort order)
iii. Later de-allocate memory using delete operator (do not use free()
function)
11. Differences in new operator of C++ and malloc() / calloc() of C – Creating runtime 2D
arrays (Matrix) and applying following on them:
12. How inheritance can help in reusability of code – Making a class Vehicle with private
data members {regNo, engineCC, weight, noofWheels}. Derive classes TwoWheeler and
FourWheeler with data members {engineType}. Derive classes GoodsCarrier and
PublicCarrier from class FourWheeler with data members {noofSeats/loadCapacity,
permitType}. Make public methods {constructors, input, and output} for each of the
classes and use them in a program
13. Use of virtual function, defining the run time object linking.
14. Use of Templates. Designing template class STACK and provide the basic operations on
it.
e. Automobile System
b. Draw ER-Diagram.
1. Design a complete data base system that includes various database table and procedures
to access the data in them. Specify an ER-Diagram for each project listed and steps of
normalization used. Design the front end using FoxPro programs or MS-Access forms:
2. Design a Hotel Management System. System provides facility for room reservation (for
different category rooms), and Catering service billing. Customer's order for various food
items are recorded during his stay at Hotel and Complete Bill (including Room Rent and
Food consumed) is generated when customer checkouts.
3. Design a Computer Terminal Booking System for booking of 5 named computer terminals
for 12-hour duration each day. User may book Terminals after entering their User ID and
password and they can book a terminal for maximum 5 hour/day (in continuous slot or
fragmented slots). Terminal booking chart is generated for each day for each terminal.
4. Design a Loan Approval and Repayment System to handle Customer's Application for Loan
and handle loan repayments by depositing installments and reducing balances.
5. Design a Video Library Management System for managing issue and return of Video
tapes/CD and manage customer's queries.
6. Design a Time Management System for an office with 10-executives who record their daily
appointments in the system. When Manager wants to conduct a meeting of Executives on a
particular day System finds a free time slot to conduct the meeting.
7. Design an Outdoor-Management System for a Hospital where several experts sit in outdoor
room and system registers patients and sends them to appropriate expert. Each Expert can
handle a limited number of patients a day.
4 IT 10 : INFORMATION THEORY AND CODING LAB
3P MM: 75 Exam: 2 Hrs.
e. Arithmetic Coding
f. Golomb Coding
1. LZ-77
2. LZ-78
3. LZSS
4. LZW
5. LZMA
6. LZX
7. LZT
i. Parity Codes
ii. Checksum
v. Hash Function