Friday 3 May 2013

Question Bank

REVALUATION RESULT OF MUMBAI UNIVERSITY

REVALUATION RESULT

 

Software Testing Reevaluation Result.

 

Advanced Java Reevaluation Result.
 
ATKT / Re - Examination Timetable

B.Sc.(I.T.) (SEM.VI) Old

 
 
 
 
Sem VI (old) Reevaluation Result.

REVALUATION RESULT

 

Software Testing Reevaluation Result.

 

Advanced Java Reevaluation Result.
 
ATKT / Re - Examination Timetable

B.Sc.(I.T.) (SEM.VI) Old

 
 
 
 
Sem VI (old) Reevaluation Result.

Tybsc (IT) SEM 6

Geographic Information Systems

Unit I

Spatial Data Concepts:
Introduction to GIS, Geographically referenced data, Geographic, projected and planer coordinate system, Map projections, Plane coordinate systems, Vector data model, Raster data model

Unit II

Data Input and Geometric transformation:
Existing GIS data, Metadata, Conversion of existing data, Creating new data, Geometric transformation, RMS error and its interpretation, Resampling of pixel values.

Unit III

Attribute data input and data display :
Attribute data in GIS, Relational model, Data entry, Manipulation of fields and attribute data, cartographic symbolization, types of maps, typography, map design, map production

Unit IV

Data exploration:
Exploration, attribute data query, spatial data query, raster data query, geographic visualization

Unit V

Vector data analysis:
Introduction, buffering, map overlay, Distance measurement and map manipulation.

Raster data analysis:
Data analysis environment, local operations, neighbourhood operations, zonal operations, Distance measure operations

Spatial Interpolation:

Elements, Global methods, local methods, Kriging, Comparisons of different methods

Text Book

Introduction to Geographic Information Systems by Kang-Tsung Chang Published by Tata Mcgraw Hill

Reference Books and websites

Concepts and Techniques in Geographic Information Systems by Chor Pang Lo and Albert K. W. Yeung

http://www.ncgia.ucsb.edu/giscc/

 


Tybsc (IT) SEM - 6

Project Management

Unit-I

Conventional Software Management :
The waterfall model, conventional software Management performance.

Evolution of Software Economics :

Software Economics, pragmatic software cost estimation.

Improving Software Economics :
Reducing Software product size, improving software processes, improving team effectiveness, improving automation, Achieving required quality, peer inspections.

Unit-II

The old way and the new :
The principles of conventional software Engineering, principles of modern software management, transitioning to an iterative process.

Life cycle phases :
Engineering and production stages, inception, Elaboration, construction, transition phases.

Artifacts of the process :
The artifact sets, Management artifacts, Engineering artifacts, programmatic artifacts.

Model based software architectures :
A Management perspective and technical perspective.

Unit-III

Work Flows of the process :
Software process workflows, Iteration workflows

Checkpoints of the process :
Major mile stones, Minor Milestones, Periodic status assessments.

Iterative Process Planning :

Work breakdown structures, planning guidelines, cost and schedule estimating, Iteration planning process, Pragmatic planning.

Unit-IV

Project Organizations and Responsibilities:
Line-of-Business Organizations, Project Organizations, evolution of Organizations.

Process Automation:

Automation Building blocks, The Project Environment.

Unit-V

Project Control and Process instrumentation:

The seven core Metrics, Management indicators, quality indicators, life cycle expectations, pragmatic Software Metrics, Metrics automation.

Tailoring the Process:
Process discriminants.

Unit-VI

Future Software Project Management:
Modern Project Profiles, Next generation Software economics, modern process transitions.

Books:

1. Software Project Management, Walker Royce: Pearson Education, 2005.

2. Information Technology Project management (4th Edition) – Kathy Schwalbe (Centgage Learning – Indian Edition)

Reference Books:

1. Project Management Core Textbook – Mantel Jr., Meredith, Shafer, Sutton with Gopalan (Wiley India Edition)

2. Information Technology project Management,: a concise study, (3rd ed.) by S A Kelkar (PHI)

3. Project Management- A systems Approach to planning, scheduling and controlling - Harold Kerzner (John Wiley & Sons, Inc)

4. A Guide to the Project Management Body of Knowledge (3rd Edition)- Newtown Square, PA, Project Management Institute, 2005.

Tybsc (IT) SEM 6 SYLLABUS IPR & CYBER LAW

IPR and Cyber Laws

Unit-I

Basic Principles and Acquisition of Intellectual Property Rights:
Focus on the: Philosophical Aspects of Intellectual Property Laws, Basic Principles of Patent Law, Patent Application procedure, Drafting of a Patent Specification, Understanding Copyright Law, Basic Principles of Trade Mark, Basic Principles of Design Rights, International Background of Intellectual Property.

Unit II

Information Technology Related Intellectual Property Rights : 
Computer Software and Intellectual Property-Objective, Copyright Protection, Reproducing, Defences, Patent Protection.

Database and Data Protection-
Objective, Need for Protection, UK Data Protection Act, 1998,US Safe Harbor Principle, Enforcement.

Protection of Semi-conductor Chips-

Objectives Justification of protection, Criteria, Subject-matter of Protection, WIPO Treaty, TRIPs, SCPA.

Domain Name Protection-

Objectives, domain name and Intellectual Property, Registration of domain names, disputes under Intellectual Property Rights, Jurisdictional Issues, and International Perspective.

Unit-III

Patents (Ownership and Enforcement of Intellectual Property) : 
Patents-Objectives, Rights, Assignments, Defences in case of Infringement Copyright-Objectives, Rights, Transfer of Copyright, work of employment Infringement, Defences for infringement Trademarks-Objectives, Rights, Protection of good will, Infringement, Passing off, Defences.
Designs-Objectives, Rights, Assignments, Infringements, Defences of Design Infringement.

Unit-IV

Enforcement of Intellectual Property Rights - Civil Remedies, Criminal Remedies, Border Security measures.
Practical Aspects of Licencing – Benefits , Determinative factors, important clauses, licensing clauses.

Unit-V

Cyber Law:

Basic Concepts of Technology and Law :
Understanding the Technology of Internet, Scope of Cyber Laws, Cyber Jurisprudence.

Law of Digital Contracts :
The Essence of Digital Contracts, The System of Digital Signatures, The Role and Function of Certifying Authorities, The Science of Cryptography.

Intellectual Property Issues in Cyber Space:
Domain Names and Related issues, Copyright in the Digital Media, Patents in the Cyber World.

Rights of Netizens and E-Governance : Privacy and Freedom Issues in the Cyber World, E-Governance, Cyber Crimes and Cyber Laws

Unit-VI

Information Technology Act 2000 :
Information Technology Act-2000-1 (Sec 1 to 13), Information Technology Act-2000-2 (Sec 14 to 42 and Certifying authority Rules), Information Technology Act-2000-3 (Sec 43 to 45 and Sec 65 to 78), Information Technology Act-2000-4(Sec 46 to Sec 64 and CRAT Rules), Information Technology Act-2000-5 (Sec 79 to 90), Information Technology Act- 2000-6 ( Sec 91-94) Amendments in 2008.

International Scenario in Cyber Laws :

Data Protection Laws in EU and USA, Child Abuse Protection Laws in EU and USA, Cyber Laws - the Malaysian Approach.

Cyber Law Issues for Management :
Cyber Law Issues in E-Business Management, Major issues in Cyber Evidence Management, Cyber Law
Compliancy Audit. References:

References:

1. Peter Weill , Jeanne Ross “IT Governance: How Top Performers Manage IT Decision Rights for Superior Results”

2. Jeanne W. Ross “Enterprise Architecture As Strategy: Creating a Foundation for Business Execution”

3. Peter Weill “IT Savvy: What Top Executives Must Know to Go from Pain to Gain

4. www.wipo.org

5. IT Act 2000 with amendments in 2008

6. How To Register Your Own Copyright by Marx Warda, Sphinx Publishing

7. Licensing Art & Design by Caryn R. Leland, Allworth Press

8. Managing Intellectual Property: The Strategic Importance, (2 ed.) V. V. Sopale ( PHI)

Tybsc (IT) SEM - 6

Data warehousing

Unit-I

History of data warehousing:
Database management system, personal computers and 4GL technology, spider web environment, evolution from business perspective, data warehouse environment, what is datawarehouse? , integrating data, volumes of data, different development approach, evolution to DW 2.0 environment, business impact of the data warehouse, components of datawarehouse environment, evolution of data warehouse from the business perspective, other notions about data warehouse, federated data warehouse, star
schema, data mart.

Introduction:
Lifecycle of data warehouse, reasons for different sectors, metadata, Access of data, structures data/ unstructured data, Textual analysis, blather, issue of terminology, specific text, metadata – a major component, local metadata, changing business requirements, flow of data within DW 2.0, volumes,
useful applications, DW 2.0 and referential integrity, reporting in DW 2.0

DW components:
Interactive sector, integrated sector, Near Line sector, Archival sector.

Unit-II

Metadata in DW:
Reusability of data analysis, Metadata, Active/ passive repository, enterprise metadata, metadata and the system record, Taxonomy, Internal and external taxonomy, metadata in archival sector, maintaining metadata, using metadata – an example, end user perspective.

Methodology and Approach for DW:
Spiral model methodology, seven streams approach, enterprise reference model, enterprise knowledge coordination stream, information factory development stream, Data correction stream, infrastructure stream, Total information quality management stream.

Statistical processing and DW:
Two types of transaction, statistical analysis, integrity of comparison, heuristic analysis, freezing data, exploration processing, frequency of analysis, exploration facility, sources for exploration processing, refreshing exploration data, project based data, Data marts and exploration facility, A backflow of data, using exploration data internally, perspective of business analyst.

Unit-III

Data models and DW:
Datamodel and business, scope of integration, making the distinction between granular and summarized data, levels of the data model, data models and interactive sector, corporate data model, transformation of models,
data models and unstructured data, perspective of business user.

Monitoring the DW environment:
Monitoring DW environment, transaction monitor, monitoring data quality, datawarehouse monitor, transaction monitor, peak period processing, ETL data quality monitor, Dormant data.

DW and security:
Protecting access to data, encryption, drawbacks, firewall, moving data offline, limiting encryption, direct dump, datawarehouse monitor, sensing an attack, security for near line data.

Unit-IV

Time variant data:
All data in DW, Time relativity in the interactive sector, data relativity elsewhere in DW, Transactions in integrated sector, discrete data, continuous time span data, a sequence of records, nonoverlapping records, beginning and ending a sequence of records, continuity of data, Time-collapsed data, time variance in the archival sector

Flow of data in DW:
flow of data throughout the architecture, entering the interactive sector, role of ETL, data flow into integrated sector, near line, archival sector, falling probability of data access, exception flow of data.

ETL processing and DW:
Changing states of data, Where ETL fits, application data to corporate data, ETL in online mode and batch mode, source and target, ETL mapping, more complex transformation, ETL and throughput, ETL and metadata, ETL and an audit trail, ETL and data quality, creating ETL, code creation or parametrically driven ETL, ETL and rejects, changed data capture, ETL and rejects, Changed data capture, ELT

Unit-V

DW and granularity manager:
granularity manager, raising the level of granularity, filtering data, functions of the granularity manager, homegrown versus third party granularity manager, parallelizing the granularity manager.

DW and performance:
Online response time, analytical response time, flow of data, Queues, heuristic processing, analytical productivity and response time, many facets to performance, indexing, removing dormant data, end user education, monitoring the environment, capacity planning, metadata, batch parallelization, parallelization for transaction processing, workload management, data marts, exploration facilities, separation of transactions into classes, service level agreements, protecting the interactive sector, partitioning data, choosing the proper hardware, separating farmers and explorers, physically group data.

Migration:
Migration in perfect world, adding components incrementally, adding archival sector, creating enterprise metadata, building the metadata infrastructure, swallowing source system, ETL as shock absorber, migration to the unstructured environment.

Unit-VI

Implementation And Maintenance:
Physical design process, data warehouse deployment, growth and maintenance.

Books

DW2.0 The architecture for Next Generation of Datawarehousing W.H. Inmon, Derek Strauss, Genia Neushloss, ELSEVIER. (Unit I to V)

Paulraj Ponnian, “Data Warehousing Fundamentals”, John Wiley. (Unit VI)


Practical List:

1.            Create around 25 records and design the tabular view using Excel. Create around         25 records and  design the Chart view using Excel.

2.            Extract the data from excel , access and sql and integrate it in SQL server.

3.            Perform the same process using DTS package

4.            Design the star schema and create a cube using OLAP services

5.            Perform the cube analysis on MOLAP

6.            Perform the cube analysis on ROLAP

7.            Perform the cube analysis on   HOLAP

8.            Consider a data warehouse storing data about sales, where the total items sold    are stored, organised by customer order and product. Each customer order includes the name of the customer and the date of the order; each product includes a description of the product and its price.

i.   Devise the relational schema (specifying the relations, the attributes, the primary keys, and the foreign keys) of the above data warehouse using the star schema.

ii.   Write a SQL query to answer the following question: ”Which customer(s) made an order containing at least five products with different descriptions?”

iii.   Write a SQL query for the following report: ”W hich customer(s) made the largest order (i.e., those that would result in the largest bill)?”

iv.   Consider to add a new level product categories to the product dimension. Devise the new relational star schema, and write a SQL query for the following report: ”Select the total number of products sold per product category”.

9.            Design at least five queries for the created cube using MDX application.

10.           Retrieve the cube data into the excel sheet and present the information in tabular and graphical form.

 


Tybsc (IT)  SEM - 6

Digital Signals and Systems

Unit-I

Classification of Signals and systems:
Introduction, Continuous Time and discrete time signals, classification of signals, simple manipulations of discrete time signals, amplitude and phase spectra, classification of systems, analog to digital conversion of signals

Fourier Analysis of Periodic and Aperiodic Continuous Time Signals and Systems:
Introduction, trigonometric Fourier series, Complex or exponential form of Fourier series, Parsevals identity for Fourier series, Power spectrum of a periodic function. Fourier transform and its properties, Fourier transforms of some important signals, Fourier transforms of power and energy signals.

Unit-II

Applications of Laplace Transform to System Analysis
Introduction, definition, region of convergence (ROC) LT of some important functions, Initial and final value theorems, convolution integral, Table of Laplace transforms, partial fraction expansions, network transfer function. S-plane Poles and zeros. LT of periodic functions. Application of LT in analysing networks.

Unit-III

Z Transform:
Introduction, definition of z-transform, properties of z-transform, evaluation of inverse z-transform.

Unit-IV

Linear Time Invariant Systems:
Introduction, properties of DSP system, Discrete convolution, solution of linear constant coefficient difference equation. Frequency domain representation of discrete time signals and systems. Difference equation and its relationship with system function, impulse response and frequency response

Unit-V

Discrete and Fast Fourier Transforms:
Introduction, discrete Fourier series, Discrete time Fourier transform (DTFT), Fast Fourier transform (FFT), Computing an inverse DFT by doing direct DFT, Composite radix FFT, Fast (Sectioned) convolution, Correlation.

Unit-VI

Finite Impulse Response (FIR) Filters
Introduction, magnitude response and phase response of digital filters, frequency response of linear phase FIR filters, Design techniques of FIR filters, design of optimal linear phase FIR filters.

Infinite Impulse Response (IIR) Filters:
Introduction, IIR filter design by approximation of derivatives, IIR filter design by impulse invariant method, IIr filter design by the bilinear transformation, Butterworth filters, Chebyshev filters, Elliptic filters, frequency transformation.

Books:

Digital Signal Processing by S. Salivahanan, C. Gnanapriya Second Edition, TMH

ractical : ( To be conducted using Scilab / MATLAB)

1. Write a program to study and implement Discrete Time Signals and systems.
a. Unit Step Sequence
b. Unit Ramp Sequence
c. Exponential Sequence
d. Exponential Increasing Sequence
e. Exponential Decreasing Sequence
f. Even Signals
g. Odd Signals

2. Write a program to implement Z-Transforms.
a. Z-transform of Finite duration signals
b. Time shifting property of Z transform

3. Write a program to demonstrate convolution property.

4. Write a program to demonstrate correlation property.

5. Write a program to implement Frequency Response of First order Difference Equation.

6. Write program to
a. Determine N-Point DFT.
b. Find DFT and IDFT of the given sequence.

7. Write a program to implement circular convolution using DFT

8. Write a program to perform linear filtering (linear convolution using DFT.

9. Write a program to implement/Design of FIR Filter using Frequency Sampling Technique.

10. Write a program to implement low pass, high pass and band pass filters.

 

Software Testing
B.Sc. (IT) Sem. V  

Syllabus


Unit 1.
Introduction to quality, software quality, fundamentals of software testing, VV model of testing.

Unit 2. Functional Testing : Boundary value Testing, Equivalence class testing, Decision Table based testing, Retrospection.

Unit 3. 
Structural Testing : Path Testing, Data Flow Testing, Retrospection.

Unit 4. 
Levels of Testing, Integration Testing, System Testing, Interaction Testing.

Unit 5. 
Object Oriented Testing : Issues, Class Testing, Object Oriented Integration Testing, Object Oriented System Testing

Unit 6. 
Testing Process : Planning, Metrics and Reports, Quantitative and Qualitative Analysis,Improvements.

Books


Software Testing Principles, Techniques and Tools, M.G. Limaye, TMH, (Unit- I and VI)

Software Testing A Craftman’s Approach, Second Edition, Paul C. Jorgensen, CRCPress.(Unit-II to V)
 

Practical List:


1. Prepare a small project and submit SRS, design, coding and test plan.

2. Study of any one of the testing tools. ( e.g winrunner, testdirect,etc)

3. MANUAL TESTING for the project
a. Walkthrough
b. Whitebox Testing
c. Blackbox Testing
d. Unit Testing
e. Integration Testing

4. Functional Testing
a. Boundary value Testing
b. Equivalence class testing
c. Decision Table based testing
d. Cause-effect graphs

5. Structural Testing
a. Path testing
b. Data-flow testing

6. Regression Testing (use VTEST tool) using automated testing for website.

7. AUTOMATED TESTING for websites
a. Load Testing(use WAPT)
b. Performance Testing(use WAPT)

8. Implement the process Object oriented testing

9. For automated testing, design the test plan and test cases for integration testing on the
given case.

10.For automated testing, design the test plan for unit testing.
 

Network Security
B.Sc. (IT) Sem. V

 

Syllabus

Unit 1. Cryptography
Introduction. Some Simple Cryptosystems, The Shift Cipher, The Substitution Cipher, The AffineCipher, The Vigenere Cipher, The Hill Cipher, The Permutation Cipher, Stream Ciphers,Cryptanalysis, Cryptanalysis of the Affine Cipher, Cryptanalysis of the Substitution Cipher,Cryptanalysis of the Vigenere Cipher, Cryptanalysis of the LFSR-based Stream Cipher. Shannon'sTheory, Perfect Secrecy, Entropy, Huffman Encodings and Entropy, Properties of Entropy, SpuriousKeys and Unicity Distance.The Data Encryption Standard, Description of DES, An Example of DES Encryption, The DES Controversy, DES in Practice, DES Modes of Operation, A Time-memory Trade-off, DifferentialCryptanalysis, An Attack on a 3-round DES, An Attack on a 6-round DES.Introduction to Public-key Cryptography, More Number Theory, The Euclidean Algorithm, TheChinese Remainder Theorem, Other Useful Facts, The RSA Cryptosystem, Implementing RSA,Probabilistic Primality Testing, Attacks On RSA, The Decryption Exponent, Partial InformationConcerning Plaintext Bits, The Rabin Cryptosystem, Factoring Algorithms, The p - 1 Method,Dixon's Algorithm and the Quadratic Sieve, Factoring Algorithms in Practice.

Unit 2. Signature Schemes
Introduction, The ElGamal Signature Scheme, The Digital Signature Standard, One-time Signatures,Undeniable Signatures, Fail-stop Signatures.

Hash Functions
Signatures and Hash Functions, Collision-free Hash Functions, The Birthday Attack, A Discrete LogHash Function, Extending Hash Functions, Hash Functions from Cryptosystems, The MD4 HashFunction, Timestamping.

Key Distribution and Key Agreement
Introduction, Key Predistribution , Blom's Scheme, Diffie-Hellman Key Predistribution, Kerberos,Diffie-Hellman Key Exchange, The Station-to-station Protocol, MTI Key Agreement Protocols, KeyAgreement Using Self-certifying Keys

Unit 3. 
Security Trends, The OSI Security Architecture Security Attacks, Security services, SecurityMechanisms, A Model for Network Security

Unit 4. 
Authentication Applications

Kerberos, X.509 Authentication Service, Public-Key Infrastructure, Recommended Reading and WebSites, Key Terms, Review Questions and Problems, A Kerberos Encryption Techniques, ElectronicMail Security, Pretty Good Privacy, S/MIME, Key Terms, Review Questions, and Problems, A DataCompression Using Zip, Radix-64 Conversion, PGP Random Number Generation.

Unit 5. 
IP Security
IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating SecurityPayload, Combining Security Associations, Key Management, Recommended Reading and Web Site,Key Terms, Review Questions, and Problems.

Web Security
Web Security Considerations, Secure Socket Layer and Transport Layer, Security, Secure ElectronicTransaction, Recommended Reading and Web Sites.

Unit 6. 
Intruders
Intrusion Detection, Password Management, Recommended Reading and Web Sites.

Malicious Software
Viruses and Related Threats, Virus Countermeasures, Distributed Denial of Service Attacks,Recommended Reading and Web Sites.

Firewalls
Firewall Design Principles, Trusted Systems, Common Criteria for Information Technology Security Evaluation, Recommended Reading and Web Sites.

Books


Cryptography: Theory and Practice, Douglas Stinson, CRC Press, CRC Press LLC (Unit I and II)

Cryptography and Network Security Principles and Practices, Fourth Edition, William
Stallings, PHI(Pearson), (Unit: III-VI)
 

Practical List:


1 Substitution Techniques :

a Write a program to perform substitution ciphers to encrypt the plain text to Caesar cipher and to decrypt it back to plain text.

b Write a program to perform substitution ciphers to encrypt the plain text to Modified Caesar cipher and to decrypt it back to plain text.

c Write a program to perform substitution ciphers to encrypt the plain text to homophonic cipher and to decrypt it back to plain text.


d Write a program to perform substitution ciphers to encrypt the plain text to monoalphabetic cipher and to decrypt it back to plain text.

e Write a program to perform substitution ciphers to encrypt the plain text to homophonic cipher and to decrypt it back to plain text.


f Write a program to perform substitution ciphers to encrypt the plain text topolyalphabetic cipher and to decrypt it back to plain text.

2 Transposition Ciphers
a Write a program to perform transposition ciphers to encrypt the plain text to cipher and to decrypt it back to plain text using rail fence technique.

b Write a program to perform transposition ciphers to encrypt the plain text to cipher and to decrypt it back to plain text using Simple Columnar technique.

c Write a program to perform transposition ciphers to encrypt the plain text to cipher andto decrypt it back to plain text using Columnar with multiple rounds.

d Write a program to encrypt a plain text to a cipher text and decrypt it back to plain textusing vernam cipher as the transposition technique

3 Write a program to generate Symmetric Keys for the following Cipher algorithms DES, AES, Blowfish, TripleDES, HmacMD5 and HmacSHA1.

4 Write a program to generate assymmetric Keys for the following Cipher algorithms a)DSA (Digital Signature Algorithm), b) DH (DiffieHellman), c) RSA.

5 Write a program to encrypt input string by using SecretKey of the following algorithms, and then decrypt the encrypted string and compare the decrypted string with the input string. Use the following algorithms for encryption and decryption:a. DES
b. BlowFish
c. IDEA
d. Triple DES

6 Write a program to encrypt input string by using SecretKey of the following algorithms, and then decrypt the encrypted string and compare the decrypted string with the input string. Use the following algorithms for encryption and decryption:
a. RSA
b. AES
c. DSA

7 Implement following HashFunctions: RSHash, JSHash, BKDRHash, SDBMHash, DJBHash.

8 Write a program to encrypt the given string by using RC4 , MD5, algorithms.

9 Write a program for creating, exporting and validating Digital Certificate.

10 Create a permission that controls access to pages of a book. The permission nameconsists of a book id, a colon, and a set of allowable pages.


 

Linux Administration
B.Sc. (IT) Sem. V

Syllabus

Unit 1.
Introduction :

Introduction to UNIX, Linux, GNU and Linux distributions Duties of the System Administrator The Linux System Administrator, Installing and Configuring Servers, Installing and Configuring Application Software, Creating and Maintaining User Accounts, Backing Up and Restoring Files, Monitoring and Tuning Performance, Configuring a Secure System, Using Tools to Monitor Security.

Booting and shutting down : Boot loaders-GRUB, LILO, Bootstrapping, Init process, rc scripts, Enabling and disabling services.

The File System : Understanding the File System Structure, Working with Linux-Supported File Systems, Memory and Virtual File Systems, Linux Disk Management,Network Configuration Files.

Unit 2.
System Configuration Files : 

System wide Shell Configuration Scripts, System Environmental Settings, Network Configuration Files, Managing the init Scripts, Configuration Tool, Editing Your Network Configuration.

TCP/IP Networking : Understanding Network Classes, Setting Up a Network Interface Card (NIC), Understanding Subnetting, Working with Gateways and Routers, Configuring Dynamic Host Configuration Protocol, Configuring the Network Using the Network.

The Network File System : NFS Overview, Planning an NFS Installation, Configuring an NFSServer, Configuring an NFS Client, Using Automount Services, Examining NT'S Security.

Unit 3.
Connecting to Microsoft Networks :

Installing Samba, Configuring the Samba Server, CreatingSamba Users 3, Starting the Samba Server, Connecting to a Samba Client, Connecting from aWindows PC to the Samba Server.

Additional Network Services : Configuring a Time Server, Providing a Caching Proxy Server,Optimizing Network Services

Internet Services : Secure Services, SSH, scp, sftp Less Secure Services (Telnet, FTP, sync, rsh, rlogin, finger, talk and ntalk, Linux Machine as a server, Configuring the xinetd Server, Comparingxinetd and Standalone, Configuring Linux Firewall Packages.

Unit 4. Domain Name System :
Understanding DNS, Understanding Types of Domain Servers, ExaminingServer Configuration Files, Configuring a Caching DNS Server, Configuring a Secondary MasterDNS Server, Configuring a Primary Master Server, Checking Configuration

Configuring Mail Services : Tracing the Email Delivery Process, Mail User Agent (MUA),Introducing SMTP, Configuring Sendmail, Using the Postfix Mail Server, Serving Email with POP3and IMAP, Maintaining Email Security

Configuring' FTP Services : Introducing vsftpd, Configuring vsftpd, Advanced FTP ServerConfiguration Using SFTP.

Unit 5. Configuring a Web Server :
Introducing Apache, Configuring Apache, Implementing SSI, EnablingCGI, Enabling PHP, Creating a Secure Server with SSL.

Providing Web Services : Creating Mailing Lists, Setting Up Web-Based Email, Configuring anRSS Feed, Adding Search Functionality.

Unit 6.
Optimizing Internet Services :

Optimizing LDAP Services, Optimizing DNS Services, OptimizingMail Services, Optimizing FTP Services, Optimizing Web Services

System Administration: updating system, upgrading and customizing kernel, Administering Usersand Groups Installing and Upgrading Software Packages

Books


1. Beginning Linux by Neil Mathew 4th Edition

2. Red hat Linux Networking and System Administration by Terry Collings
 

Practical List:


1. Installation of Red HAT/Fedora Linux operating system.:
a. Partitioning drives
b. Configuring boot loader (GRUB/LILO)
c. Network configuration
d. Setting time zones
e. Creating password and user accounts
f. Shutting down

2. Software selection and installation

3. Programming Shell scripts for Linux administration

4. Linux system administrationa.
a, Becoming super userb.
b. Temporarily changing user identity with su commandc.
c. Using graphical administrative toolsd. Administrative commandse.
d. Administrative configuration files

5. Connecting to the internet and configuring samba
a. Setting up dial-up PPP
b. Creating a dial- up connection with the internet configuration wizard
c. Launching PPP connection.
d. Setting up linux as a proxy server.
e. Configuring mozilla or firefox to use as a proxy.

6. Setting up local area network
a. LAN topologies
b. LAN equipment
c. Networking with TCP/IP
d. Configuring TCP/IP
e. Adding windows computer’s to user LAN
f. IP address classes

7. Server setup and configuration
a. Setting up NFS file server
b. Setting up Samba file server
c. The Apache web server
d. Setting up FTP server
e. Setting up proxy server

8. Understanding COMPUTER SECURITY: Firewall and security configurations
a. LINUX security checklist
b. Securing linux with IP table firewalls
c. Configuring an IP table firewall
d. Securing Linux features

9. Programming using C.

10. Implementing Socket programs.

11.Setting up hardware devices including sound card and printers and others(USB devices etc).

12.Working with X-windows
a. Switching between text and graphical consoles
b. set up my video card, monitor and mouse for the X-server.
c. Install KDE, change default desktop to KDE (or Gnome)
d. Accessing X-window remotely.
e. Installing TrueType fonts from my MS Windows partition.
f. Display and Control a Remote Desktop using VNC.

 

ASP .NET with C#
B.Sc. (IT) Sem. V

 

Syllabus

Unit 1.
Review of.NET frameworks, Introduction to C#, Variables and expressions, flow controls, functions, debugging and error handling, OOPs with C#, Defining classes and class members. Assembly, Components of Assembly, Private and Shared Assembly, Garbage Collector, JIT compiler, Namespaces.

Unit 2.

Collections, Comparisons and Conversions, Delegates and Events, Windows programming: Controls (Button, Label, Link Label, Radio Button, CheckBox, Text Box, Rich TextBox, List Box, Checked List Box, List View, Tabbed), Forms (Menus and Tool Bars, SDI and MDI applications, Building MDI applications.

Unit 3. Introduction to ASP.NET 4 :Microsoft.NET framework, ASP.NET lifecycle. Themes in ASP.NET.

CSS : Need of CSS, Introduction to CSS, Working with CSS with visual developer.

ASP.NET server controls : Types of control, ASP.NET state management engine. Web.config andglobal.asax files.

Unit 4. Programming ASP.NET web pagesIntroduction, data types and variables, statements, organizing code, object oriented basics. MasterPages, Caching.

Navigation: Using navigation controls, programmatic redirection

User Controls: Introduction to user controls

Validating User Controls

Unit 5. Databases
Introduction, Using SQL to work with database, retrieving and manipulating data with SQL, workingwith ADO.NET, ADO.NET, ADO.NET architecture, ASP.NET data control, data source control,deploying the web site. Crystal reports.

LINQ : Operators, implementations, LINQ to objects, XML, ADO.NET, Query Syntax

ASP.NET Security : Authentication, Authorization, Impersonation, ASP.NET provider model.


Unit 6. ASP.NET Ajax
Introducing AJAX, Using ASP.NET AJAX, Web Services and Page methods in AJAX websites.

JQuery : Introduction to JQuery, JQuery syntax, modifying DOM with JQuery, effects with JQuery,JQuery and extensibility.

Books


Beginning Visual C# 2010, K. Watson, C. Nagel, J.H Padderson, J.D. Reid, M.Skinner, Wrox (Wiley) 2010. (Unit I and II).

Beginning ASP.NET 4 in C# and VB, I. Spanjaars, Reprint 2011 (Unit III to VI).

ASP.NET 4.0 programming, J. Kanjilal, Tata McGraw-Hill (Unit III to VI).


Practical List:


1. Simple Programs with C#:

a) Write a console application that obtains four int values from the user and displays the product. Hint: you may recall that the Convert.ToDouble() command was used to convert the input from the console to a double; the equivalent command to convert from a string to an int is Convert.ToInt32().

b) If you have two integers stored in variables var1 and var2, what Boolean test can you perform to see if one or the other (but not both) is greater than 10?

c) Write an application that includes the logic from Exercise 1, obtains two numbers from the user, and displays them, but rejects any input where both numbers are greater than 10 and asks for two new numbers.

d) Write a console application that places double quotation marks around each word in a string

e) Write an application that uses two command-line arguments to place values into a string and an integer variable, respectively. Then display these values.

f) Write an application that receives the following information from a set of students:
Student Id:
Student Name:
Course Name:
Date of Birth:
The application should also display the information of all the students once the data is entered. Implement this using an Array of Structs.

g) Write programs using conditional statements and loops:
i Generate Fibonacci series.
ii. Generate various patterns (triangles, diamond and other patterns) with
numbers.
iii. Test for prime numbers.
iv. Generate prime numbers.
v. Reverse a number and find sum of digits of a number.
vi. Test for vowels.
vii. Use of foreach loop with arrays.

2. Object oriented programs with C#

a. Program using classes.
b. Program with different features of C#
Function Overloading
Operator Overloading
Inheritance (all types)
Constructor overloading
Interfaces
Using Delegates and eventsException handling

3. Programs using different controls.

4. Programs using CSS.

5. Programs using ASP.NET Server controls.

6. Database programs with ASP.NET and ADO.NET

7. Programs using Language Integrated query.

8. Programs securing web pages.

9. Programs using AJAX.

10 Programs using JQuery.

Tybsc (IT)  -SEM 5 Syllabus w.e.f 2011 - 2012

Advanced Java 

Syllabus

Unit 1: Swing 
Event Handling, JFrames, Lists, Tables, Trees, Text Components, Progress Indicators,  Component Organizers.

Unit 2:  Introduction to servlets
Need for dynamic content, Java servlet technology, why servlets?

Servlet API and Lifecycle: Servlet API, servletConfig interface, ServletRequest and ServletResponse Interfaces, GenericServlet Class. ServletInputStream And ServletOutputStream Classes, Request Dispatcher Interface, Http Servlet Class, HttpServletRequest and HttpServletResponse Interfaces, HttpSession Interface, Servlet Lifecycle.

Working with servlets : organization of a web application, creating a web application (usingnetbeans) , creating a servlet, compiling and building the web application.

Unit 3: JDBC 
Design of JDBC, JDBC configuration, Executing SQL statement, Query Execution,Scrollable and updatable result sets, row sets, metadata, Transaction.

JSP : Introduction, disadvantages, JSP v/s Servlets, Lifecycle of JSP, Comments, JSP documents,JSP elements, Action elements, implicit objects, scope, characterquoting conventions, unifiedexpression language

Unit 4: Java server Faces Need of MVC , what is JSF?, components of JSF, JSF as an application, JSF lifecycle, JSFconfiguration, JSF web applications (login form, JSF pages)

EJB : Enterprise bean architecture, Benefits of enterprise bean, type of beans, Accessing beans,packaging beans, creating web applications creating enterprise bean, creating web client, creating JSPfile, building and running web application.

Unit 5:  HIBERNATE
Introduction, Writing the application, application development approach, creating database and tables in MySQL, creating a web application, Adding the required library files, creating a Java bean class, creating hibernate configuration and mapping file, adding a mapping resource, creating JSPs.

STRUTS :Introduction, Struts framework core components, installing and setting up struts, getting started withstruts.

Unit 6. WEB Services :
SOAP, Building a web services using JAX-WS, Building web service.

JAVAMAIL : Mail Protocols, Components of the Javamail API, JAVAMAIL API, Starting with API.

JNDI : NAMING Service, Directory service, JNDI, Resources and JNDI.STRUTS Introduction, Struts framework core components, installing and setting up struts, getting started withstruts.

Books


Java EE 6 for Beginners, Sharanam Shah, Vaishali Shah, SPD (Unit II to VI)

Core Java Vol. II – Advanced Features, Cay S. Horstmans, Gary Coronell, Eight Edition, Pearson (Unit I and III)

Java Complete Reference, Herbert Schildt, Seventh Edition,TMH. (Unit I)



Practical List:


1. Write a java program to present a set of choices for a user to select Stationary products and display the price of Product after Selection from the list.

2. Write a java program to demonstrate typical Editable Table, describing employee details for a software company.

3. Write a java program using Split pane to demonstrate a screen divided in two parts, one part contains the names of Planets and another Displays the image of planet. When user selects the planet name form Left screen, appropriate image of planet displayed in right screen.

4. Develop Simple Servlet Question Answer Application to demonstrate use of HttpServletRequest and HttpServletResponse interfaces.

5. Develop Servlet Application of Basic Calculator (+,-,*, /, %) using ServletInputStream and ServletOutputStream.

6. Develop a JSP Application to accept Registration Details form user and Store it intothe database table.

7. Develop a JSP Application to Authenticate User Login as per the registration details.If login success the forward user to Index Page otherwise show login failure Message.


8. Develop a web application to add items in the inventory using JSF.

9. Develop a Room Reservation System Application Using Enterprise Java Beans.

10.Develop a Hibernate application to store Feedback of Website Visitor in MySQL Database.

11. a .Develop a simple Struts Application to Demonstrate 3 page Website of Teaching Classes which passes values from every page to another.b.Develop a simple Struts Application to Demonstrate E-mail Validator.

12. a. Develop a simple “Hello World” Web Service with SOAP in Java.
b. Develop a Simple Web Service and Client with JAX-WS.c. Develop an application to show searching the Directory using JNDI capabilities.