5sem Bca
5sem Bca
Page 1 of 25
SRI VENKATESWARA UNIVERSITY
BACHELOR OF COMPUTER APPLICATIONS
SEMESTER SYSTEM WITH CBCS
SEMESTER VI
W.E.F. 2022-2023
MACHINE LEARNING USING PYTHON
(Skill Enhancement Course, 3 credits)
Total Hrs: 60 Max Marks: 100
Course Educational Objective: The objective of the course provides the basic concepts and
techniques of Machine Learning and helps to use recent machine learning software for solving
practical problems. It enables students to gain experience by doing independent study and
research.
Course Outcomes: At the end of this course, the student will be able to
CO1: Identify the characteristics of machine learning.(Understand- L2)
CO2: Summarize the Model building and evaluation approaches(Understand- L2)
CO3: Apply Bayesian learning and regression algorithms for real-world Problems.(Apply-
L3)
CO4: Apply supervised learning algorithms to solve the real-world Problems. (Apply- L3)
CO5: Apply unsupervised learning algorithms for the real world data. (Apply- L3)
UNIT-I: Introduction to Machine Learning and Preparing to Model
Introduction to Machine Learning-Introduction, What is Human Learning? Types of Human
Learning, What is Machine Learning? Types of Machine Learning, Problems Not To Be Solved
Using Machine Learning, Applications of Machine Learning.
Preparing to Model-Introduction, Machine Learning Activities, Basic Types of Data in
Machine Learning, Exploring Structure of Data, Data Quality and Remediation, Data Pre-
Processing
Page 2 of 25
UNIT-4: Supervised Learning: Classification, Ensemble Learning
Classification-Introduction, Example of Supervised Learning, Classification Model,
Classification Learning Steps, Common Classification Algorithms - k-Nearest Neighbour (kNN),
Decision tree, Random forest model, Support vector machines.
Ensemble Learning- Boosting, Bagging
Text Books:
1. Subramanian Chandramouli, SaikatDutt, Amit Kumar Das, “Machine Learning”,Pearson
Education India ,1stedition.
2. Tom M. Mitchell, “Machine Learning’, MGH, 1997.
Reference Books:
1. Shai Shalev-Shwartz, ShaiBen David, “Understanding Machine Learning: From Theory to
Algorithms”, Cambridge.
2. Peter Harington, “Machine Learning in Action” , Cengage, 1st edition, 2012.
3. Peter Flach, “Machine Learning: The art and science of algorithms that make sense of data”,
Cambridge university press,2012.
4. Jason Brownlee, “Machine Learning Mastery with Python Understand Your Data, Create
Accurate Models and Work Projects End-To-End”,Edition: v1.4, 2011.
Page 3 of 25
SRI VENKATESWARA UNIVERSITY
BACHELOR OF COMPUTER APPLICATIONS
SEMESTER SYSTEM WITH CBCS
SEMESTER VI
W.E.F. 2022-2023
DIGITAL IMAGING
(Skill Enhancement Course, 3 credits)
Total Hrs: 60 Max Marks: 100
Course Objective:
Learn about different types of images and how to use basic and advanced features of GIMP
Software for creating and image editing tools.
Course Learning Outcomes:
Upon successful completion of the course, a student will be able to:
1. Gain knowledge about Types of Graphics, Types of Objects, Types of video editing tools
2. Show their skills in editing and altering photographs for through a
basic understanding of the tool box.
3. Gain knowledge in using the layers.
4. Gain knowledge in using the selection tools, repair tools.
5. Gain knowledge in using selection tools , applying filters and can show their skills.
UNIT-I 12 HRS
1.Types of Graphics
1.1 Raster vs Vector Graphics
2.Types of Objects
2.1 Audio formats
2.2 Video formats
2.3 Image formats
2.4 Text document formats
3. Types of video editing
4. Different color modes.
5. Image Scanner
5.1 Types of Image Scanners
UNIT-II 12 HRS
1.What is GIMP
2.GIMP tool box window
3.layers Dialog
4.Tool Options Dialog
5.Image window
Page 4 of 25
6.Image window menus
UNIT-III 12 HRS
Improving Digital Photos
1.1 Opening files
1.1.1 rescaling saving files
1.2.Cropping
1.3. Brightening & Darkening
1.4. Rotating
1.5. Sharpening
1.6. Fixing Red Eye
Introduction to layers
2.What is layer
2.1.Using layer to add text
2.2.Using move tool
2.3.Changing colors
2.4.Simple effects on layers
2.5 Linking layers together
2.6 Performing operations on layers
2.7 Using layers to copy and paste
2.8 Tour of layers dialog
UNIT-IV 12 HRS
Drawing:
1.1 Drawing lines and curves
1.2 Changing colors and brushes
1.3 Erasing
1.4 Drawing rectangles
1.5 Circles, other shapes
1.6 Outlining and filling regions
1.7 Filling with patterns and gradients
1.8 Importing brushes or gradients or making your own.
Selection:
2.1 Working with selections
2.2 Select by color and fuzzy
2.3 Select Bezier paths
2.4 Intelligent scissors tool
2.5 Modifying selections with selection modes
UNIT-V 12 HRS
Erasing and Touching Up:
1.1 Dodge and burn tool
1.2 Smudging tool
1.3 Clone tool
1.4 Sharpening using convolve tool
1.5 Blurring with Gaussian Blur
Page 5 of 25
1.6 Correcting Color Balance
1.7 Hue
1.8 Saturation
1.9 Color balance using curves and levels.
Filters:
2.1 Filters
2.1.1 Blur
2.1.2 Enhance
2.1.3 Distort
2.1.4 Noise Filters
Text Book: Beginning GIMP From Novice to professional by Akkana Peck, Second Edition,
Apress
(Co-curricular activities shall not promote copying from textbook or from others work and shall
encourage self/independent and group learning)
A. Measurable
1. Assignments (in writing and doing forms on the aspects of syllabus content and outside the
syllabus content. Shall be individual and challenging)
2. Student seminars (on topics of the syllabus and related aspects (individual activity))
3. Quiz (on topics where the content can be compiled by smaller aspects and data (Individuals or
groups as teams))
4. Study projects (by very small groups of students on selected local real-time problems
pertaining to syllabus or related areas. The individual participation and contribution of students
shall be ensured (team activity))
B. General
1. Group Discussion
2. Others
******
Page 7 of 25
SRI VENKATESWARA UNIVERSITY
BACHELOR OF COMPUTER APPLICATIONS
SEMESTER SYSTEM WITH CBCS
SEMESTER VI
W.E.F. 2022-2023
COURSE: CYBER SECURITY AND MALWARE ANALYSIS
(Skill Enhancement Course, 3 credits)
COURSE OBJECTIVES:
The main objective of the course is to impart conceptual understanding on Cyber security and protection
of electronic systems and information from malware attacks.
COURSE OUTCOMES:
Upon successful completion of this course, students should have the knowledge and skills to
Page 8 of 25
tcpview
What is OWASP?
OWASP Top 10 Vulnerabilities
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XXE)
Broken Access Control
Security Misconfiguration
Cross-Site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
OWASP Juice Shop
Web application firewall
What is malware
Types of malware
Keyloggers
Trojans
Ransome ware
Rootkits
Antivirus
Firewalls
Malware analysis
VM ware
How to use sandbox
How to create virtual machine
Page 9 of 25
Process explorer
Process monitor
SYS-internals Suite
Text books:
Website References:
https://csrc.nist.gov/Projects/cybersecurity-framework/nist-cybersecurity-framework-a-quick-
start-guide
https://owasp.org/www-project-top-ten/
https://owasp.org/www-project-juice-shop/
Co-Curricular Activities:
(Co-curricular activities shall not promote copying from textbook or from others work and shall
encourage self/independent and group learning)
A. Measurable
1. Assignments (in writing and doing forms on the aspects of syllabus content and outside the
syllabus content. Shall be individual and challenging)
2. Student seminars (on topics of the syllabus and related aspects (individual activity))
Page 10 of 25
3. Quiz (on topics where the content can be compiled by smaller aspects and data (Individuals or
groups as teams))
4. Study projects (by very small groups of students on selected local real-time problems
pertaining to syllabus or related areas. The individual participation and contribution of students
shall be ensured (team activity)
B. General
1. Group Discussion
COURSE OBJECTIVES:
The purpose of this course is to impart practical understanding on Cyber security and protection of
electronic systems and information from malware attacks.
1. configure a LAN by using a switch
2. configure a LAN by using Router
3.steps to attack a victim computer by using "ProRat" trojan tool
4. Perform the packet sniffing mechanism by download the “wireshark” tool and extract the packets
5. Perform the task of creating mail messages by using fake mail id by using the "fake mailer" website (
https://emkei.cz)
6.Perform the IP scanning mechanism by using “tracert”and “arp” commands
7.Perform the port scanning mechanism by using NMAP tool
8. Perform an SQL Injection attack and its preventive measure to avoid Injection attack
9. Perform an activity to access a locked computer without knowing the user's password.
*****
Page 11 of 25
SRI VENKATESWARA UNIVERSITY
BACHELOR OF COMPUTER APPLICATIONS
SEMESTER SYSTEM WITH CBCS
SEMESTER VI
W.E.F. 2022-2023
COURSE- INTERNET OF THINGS
(Skill Enhancement Course- 5 credits)
Total Hrs: 60 ax Marks: 100
Course Outcomes: ·
* Able to understand various applications of IOT in real world and industry domain·
* Able to realize the revolution of Internet in Mobile Devices, Cloud & Sensor Networks·
* Able to understand building blocks of Internet of Things and characteristics.
* Able to design and develop IOT devices.
UNIT-1
1.1 IOT. Explain Characteristics and component of IOT.
1.2 Advantages and disadvantages of IOT.
1.3 various application areas of IoT.
1.4 Time for Convergence for IoT.
1.5 reasons to converge the technologies and shift to IOT.
1.6 smart parking IOT application using figure.
1.7 smart home IOT application using figure.
1.8 smart health using IoT.
1.9 Smart City application of IoT
UNIT-2
2.1 M2M Value Chains.
2.2 IoT architecture outline withdiagram.
2.3 IOT Value Chains using figure.
2.4 shifting from M2M to IoT.
2.5 design principles and needed capabilities of IOT.
2.6 I-GVC using figure.
2.7 Global Value Chain
2.8 M2M Value Chains.
2.9 IoT-Architecture.
Page 12 of 25
UNIT 3:
3.1 ETSI M2M high-level architecture.
3.2 IOT referencemodel.
3.3 IOT function view.
3.4 IOT reference architecture’s deployment and operational view.
3.5 reference architecture of IOT using figure.
3.6 Functional View, Information View, Deployment and Operational View, Other Relevant
architectural views of IOT reference architecture.
3.7 Architecture Reference Model of IOT using figure.
3.8 IoT Domain Model
3.9 Open Geospatial Consortium Architecture with a diagram.
UNIT 4
UNIT 5
Page 13 of 25
Co-Curricular Activities:
(Co-curricular activities shall not promote copying from textbook or from others work and shall
encourage self/independent and group learning)
A. Measurable
1. Assignments (in writing and doing forms on the aspects of syllabus content and outside the
syllabus content. Shall be individual and challenging)
2. Student seminars (on topics of the syllabus and related aspects (individual activity))
3. Quiz (on topics where the content can be compiled by smaller aspects and data (Individuals or
groups as teams))
4. Study projects (by very small groups of students on selected local real-time problems
pertaining to syllabus or related areas. The individual participation and contribution of
students shall be ensured (team activity)
B. General
1. Group Discussion
2. Try to solve MCQ’s available online.
RECOMMENDED CONTINUOUS ASSESSMENT METHODS:
Page 14 of 25
SRI VENKATESWARA UNIVERSITY
BACHELOR OF COMPUTER APPLICATIONS
SEMESTER SYSTEM WITH CBCS
SEMESTER VI
W.E.F. 2022-2023
MOBILE APPLICATION DEVELOPMENT
(Skill Enhancement Course , 3 credits)
Total Hrs: 60 Max Marks: 100
Course objectives:
Learning Outcomes:
Upon successful completion of the course, a student will be able to:
CO 1. Identify basic terms ,tools and software related to android systems
CO 2. Describe components of IDE, understand features of android development tools
CO 3. Describe the layouts and controls
CO 4. Explain the significance of displays using the given view
CO 5. Explain the features of services and able to publish android Application
C0 6. Developing interesting Android applications using MIT App Inventor
UNIT-1 10 Hrs
UNIT-2 12 Hrs
Page 15 of 25
UNIT-3 14 Hrs
UNIT-4 12 Hrs
UNIT-5 12 Hrs
5.1 Introduction of MIT App Inventor
5.2 Application Coding
5.3Programming Basics & Dialog
5.4 More Programming Basics
5.5 Alarm Clock Application
5.6 Audio & Video
5.7 Drawing Application
5.8 File
5.9 Game
5.10 Device Location
5.11 Web Browsing
Text Books:
1. Erik Hellman, “Android Programming – Pushing the Limits”, 1st Edition, Wiley India Pvt
Ltd, 2014.
2. App Inventor : create your own Android apps by Wolber, David (David Wayne)
Reference Books:
1. Dawn Griffiths and David Griffiths, “Head First Android Development”, 1st
Edition, O’Reilly SPD Publishers, 2015.
Page 16 of 25
2. J F DiMarzio, “Beginning Android Programming with Android Studio”, 4th
Edition, Wiley India Pvt Ltd, 2016. ISBN-13: 978-8126565580
3. Anubhav Pradhan, Anil V Deshpande, “ Composing Mobile Apps” using
Android, Wiley 2014, ISBN: 978-81-265-4660-2
4. Android Online Developers Guide
5. http://developer.android.com/reference/ Udacity: Developing Android
6. Apps- Fundamentals
7. https://www.udacity.com/course/developing-android-appsfundamentals--ud853-
nd
8. http://www.appinventor.mit.edu/
RECOMMENDED CO-CURRICULAR ACTIVITIES:
(Co-curricular activities shall not promote copying from textbook or from others
work and shall encourage self/independent and group learning)
A. Measurable
1. Assignments (in writing and doing forms on the aspects of syllabus content
and outside the syllabus content. Shall be individual and challenging)
2. Student seminars (on topics of the syllabus and related aspects (individual activity))
3. Quiz (on topics where the content can be compiled by smaller aspects and
data (Individuals or groups as teams))
4. Study projects (by very small groups of students on selected local real-time
problems pertaining to syllabus or related areas. The individual participation
and contribution of students shall be ensured (team activity
B. General
1. Group Discussion
2. Try to solve MCQ’s available online.
3. Others
Course objectives:
1. know the components and structure of mobile application development framework for
android
2. learn the basic and important design concepts
3. learn the development of mobile application
Outcomes:
Page 18 of 25
SRI VENKATESWARA UNIVERSITY
BACHELOR OF COMPUTER APPLICATIONS
SEMESTER SYSTEM WITH CBCS
SEMESTER VI
W.E.F. 2022-2023
Course-PC HARDWARE AND NETWORKING
(Skill Enhancement Course (Elective), 5 credits)
Total Hrs: 60 Max Marks: 100
Course objectives:
Text Book:
Reference Books:
1. PC Troubleshooting and Repair Stephen J. Bigelow Dream tech Press, New Delhi
2. “Data and Computer Communications”, Stallings, PHI,
3. “DataCommunication”, William Schewber, McGrawHill,1987
4. IT essential V7 companion guide – Cisco Networking Academy 2020
5. Upgrading and repairing PCs(22nd edition) – Scott Mueller – 2015 Que
Page 21 of 25
LAB EXPERIMENTS
Course objectives:
To train the officials to acquire basic knowledge in computer hardware and
peripherals for installation, PC assembly, trouble shooting and maintenance
including system management and its backup and to undertake disaster
prevention, a basic knowledge of TCP/IP networks work group, internet and
intranet.
Outcomes:
The student will able to know the Basic of Computer assembling and trouble
shooting. This course will provide the brief knowledge of Computer networking
and trouble shooting
Experiments:
Page 22 of 25
Tools required for PC assembling and software installation
1. Multimeter - 1Rs 500/ basic version
or
Digital voltage tester – 1 Rs 150 (taparia)
2. Earth checking plug – 1 Rs 350 (Mx)
3. Mother board diagnosis card -1 Rs 400/-
4. SMPS power supply tester - 1 Rs 400/-
5. Screw driver kit – 4 Nos Rs 40 each
6. External CD/DVD writer – 1 Rs 2000/-
6. Media for operating system (CD/DVD) or USB drive
(Try with trial versions for windows) or Ubuntu desktop(Linux)
Note : Un used old desktops can be used for installation
Page 23 of 25
SRI VENKATESWARA UNIVERSITY
B.C.A. DEGREE COURSE
VI-SEMESTER
W.E.F. 2020-21
PART – A
1.
2.
3.
4.
5.
6.
7.
8.
Page 24 of 25
PART – B
Answer All The Questions. Each question carries 10 marks (5X10= 50M)
9. (A)
OR
(B)
10. (A)
OR
(B)
11. (A)
OR
(B)
12. (A)
OR
(B)
13. (A)
OR
(B)
Page 25 of 25