3IT
3IT
Develop a leave management system for an organization where users can apply different
types of leaves such as casual leave and medical leave. They also can view the available
number of days.
7. Develop a simple dashboard for project management where the statuses of various tasks
are available. New tasks can be added and the status of existing tasks can be changed
among Pending, InProgress or Completed.
8. Develop an online survey application where a collection of questions is available and users
are asked to answer any random 5 questions.
TOTAL: 60 PERIODS
COURSE OUTCOMES:
CO1: Design full stack applications with clear understanding of user interface, business
logic and data storage.
CO2: Design and develop user interface screens
CO3: Implement the functional requirements using appropriate tool
CO4: Design and develop database based on the requirements
CO5: Integrate all the necessary components of the application
100
Object modelling using UML – Use case Model – Class diagrams – Interaction diagrams – Activity
diagrams – State chart diagrams – Functional modelling – Data Flow Diagram- CASE TOOLS.
COURSE OUTCOMES:
CO1: Compare various Software Development Lifecycle Models
CO2: Evaluate project management approaches as well as cost and schedule estimation
strategies.
CO3: Perform formal analysis on specifications.
CO4: Use UML diagrams for analysis and design.
CO5: Architect and design using architectural styles and design patterns, and test the system
45 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
LIST OF EXPERIMENTS:
1. Identify a software system that needs to be developed.
2. Document the Software Requirements Specification (SRS) for the identified system.
3. Identify use cases and develop the Use Case model.
4. Identify the conceptual classes and develop a Domain Model and also derive a Class Diagram
from that.
5. Using the identified scenarios, find the interaction between objects and represent them using
UML Sequence and Collaboration Diagrams
6. Draw relevant State Chart and Activity Diagrams for the same system.
7. Implement the system as per the detailed design
8. Test the software system for all the scenarios identified as per the usecase diagram
9. Improve the reusability and maintainability of the software system by applying appropriate
design patterns.
10. Implement the modified system and test it for various scenarios.
101
3. Exam registration
4. Stock maintenance system.
5. Online course reservation system
6. Airline/Railway reservation system
7. Software personnel management system
8. Credit card processing
9. e-book management system
10. Recruitment system
11. Foreign trading system
12. Conference management system
13. BPO management system
14. Library management system
15. Student information system
TOTAL:75 PERIODS
TEXT BOOKS
1. Bernd Bruegge and Allen H. Dutoit, “Object-Oriented Software Engineering: Using UML,
Patterns and Java”, Third Edition, Pearson Education, 2009.
2. Roger S. Pressman, Object-Oriented Software Engineering: An Agile Unified Methodology,
First Edition, Mc Graw-Hill International Edition, 2014.
REFERENCES
1. Carlo Ghezzi, Mehdi Jazayeri, Dino Mandrioli, Fundamentals of Software Engineering, 2nd
edition, PHI Learning Pvt. Ltd., 2010.
2. Craig Larman, Applying UML and Patterns, 3rd ed, Pearson Education, 2005.
3. Len Bass, Ingo Weber and Liming Zhu, ―DevOps: A Software Architect‘s Perspective‖,
Pearson Education, 2016
4. Rajib Mall, Fundamentals of Software Engineering, 3rd edition, PHI Learning Pvt. Ltd.,
2009.
5. Stephen Schach, Object-Oriented and Classical Software Engineering, 8th ed, McGraw-
Hill, 2010.
CO’s-PO’s & PSO’s MAPPING
CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 2 2 - - - - 1 1 2 2 2 1
2 2 3 2 3 2 - - - 2 2 3 2 3 2 1
3 2 3 2 1 1 - - - 2 2 3 2 2 3 1
4 2 3 2 2 3 - - - 2 2 3 2 2 3 1
5 2 3 1 2 2 - - - - - - 1 3 2 2
AVg. 2 2 1 2 2 - - - - 1 1 2 2 2 1
1 - low, 2 - medium, 3 - high, ‘-“- no correlation
102
3. Krutz, R. L., Vines, R. D, “Cloud security. A Comprehensive Guide to Secure Cloud
Computing”, Wiley Publishing, 2010.
REFERENCES
1. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and
Processes”, Elsevier/Morgan Kaufmann, 2005.
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, “Cloud Security and Privacy: an
enterprise perspective on risks and compliance”, O’Reilly Media, Inc., 2009.
140
UNIT IV STORAGE VIRTUALIZATION 5
Memory Virtualization-Types of Storage Virtualization-Block, File-Address space Remapping-Risks
of Storage Virtualization-SAN-NAS-RAID
COURSE OUTCOMES:
CO1: Analyse the virtualization concepts and Hypervisor
CO2: Apply the Virtualization for real-world applications
CO3: Install & Configure the different VM platforms
CO4: Experiment with the VM with various software
TOTAL :60 PERIODS
TEXT BOOKS
1. Cloud computing a practical approach - Anthony T.Velte , Toby J. Velte Robert Elsenpeter,
TATA McGraw- Hill , New Delhi – 2010
2. Cloud Computing (Principles and Paradigms), Edited by Rajkumar Buyya, James Broberg,
Andrzej Goscinski, John Wiley & Sons, Inc. 2011
3. David Marshall, Wade A. Reynolds, Advanced Server Virtualization: VMware and Microsoft
Platform in the Virtual Data Center, Auerbach
4. Chris Wolf, Erick M. Halter, “Virtualization: From the Desktop to the Enterprise”, APress,
2005.
5. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and
Processes”, Elsevier/Morgan Kaufmann, 2005.
6. David Marshall, Wade A. Reynolds, “Advanced Server Virtualization: VMware and
Microsoft Platform in the Virtual Data Center”, Auerbach Publications, 2006.
142
UNIT I INTRODUCTION 8
Basics of cryptography, conventional and public-key cryptography, hash functions, authentication,
and digital signatures.
COURSE OUTCOMES:
At the end of this course, the students will be able:
CO1: Classify the encryption techniques
CO2: Illustrate the key management technique and authentication.
CO3 Evaluate the security techniques applied to network and transport layer
CO4: Discuss the application layer security standards.
CO5: Apply security practices for real time applications.
TOTAL:60 PERIODS
161
TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice, 6th Edition, William Stallings,
2014, Pearson, ISBN 13:9780133354690.
REFERENCES:
UNIT I INTRODUCTION 7
Introduction to Virtual Reality and Augmented Reality – Definition – Introduction to Trajectories
and Hybrid Space-Three I’s of Virtual Reality – Virtual Reality Vs 3D Computer Graphics –
Benefits of Virtual Reality – Components of VR System – Introduction to AR-AR Technologies-
Input Devices – 3D Position Trackers – Types of Trackers – Navigation and Manipulation
Interfaces – Gesture Interfaces – Types of Gesture Input Devices – Output Devices – Graphics
Display – Human Visual System – Personal Graphics Displays – Large Volume Displays – Sound
Displays – Human Auditory System.
162
CCW332 DIGITAL MARKETING LTPC
202 3
COURSE OBJECTIVES:
The primary objective of this module is to examine and explore the role and importance of
digital marketing in today’s rapidly changing business environment.
It also focuses on how digital marketing can be utilized by organizations and how
its effectiveness can be measured.
COURSE OUTCOMES:
CO1: To examine and explore the role and importance of digital marketing in today’s
rapidly changing business environment..
CO2: To focuses on how digital marketing can be utilized by organizations and how its
effectiveness can be measured.
169
CO3: To know the key elements of a digital marketing strategy.
CO4: To study how the effectiveness of a digital marketing campaign can be measured
CO5: To demonstrate advanced practical skills in common digital marketing tools such as SEO,
SEM, Social media and Blogs.
TOTAL:60 PERIODS
TEXT BOOKS
1. Fundamentals of Digital Marketing by Puneet Singh Bhatia;Publisher: Pearson
Education;
2. First edition ( July 2017);ISBN-10: 933258737X;ISBN-13: 978-9332587373.
3. Digital Marketing by Vandana Ahuja ;Publisher: Oxford University Press ( April 2015).
ISBN-10: 0199455449
4. Marketing 4.0: Moving from Traditional to Digital by Philip Kotler;Publisher: Wiley; 1st
edition ( April 2017); ISBN10: 9788126566938;ISBN 13: 9788126566938;ASIN:
8126566930.
5. Ryan, D. (2014 ). Understanding Digital Marketing: Marketing Strategies for Engaging the
Digital Generation, Kogan Page Limited..
6. Barker, Barker, Bormann and Neher(2017), Social Media Marketing: A Strategic
Approach, 2E South-Western ,Cengage Learning.
7. Pulizzi,J Beginner's Guide to Digital Marketing , Mcgraw Hill Education
170
To learn how to prevent a cyber attack.
UNIT I INTRODUCTION 6
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for Cyber Crime –
Need for Cyber Security – History of Cyber Crime; Cybercriminals – Classification of Cybercrimes
– A Global Perspective on Cyber Crimes; Cyber Laws – The Indian IT Act – Cybercrime and
Punishment.
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
CO1: Explain the basics of cyber security, cyber crime and cyber law (K2)
CO2: Classify various types of attacks and learn the tools to launch the attacks (K2)
CO3 Apply various tools to perform information gathering (K3)
CO4: Apply intrusion techniques to detect intrusion (K3)
178
CO5: Apply intrusion prevention techniques to prevent intrusion (K3)
TOTAL:60 PERIODS
TEXTBOOKS
1. Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”,
Notion Press, 2021 (Unit 1)
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley Publishers, 2011 (Unit 1)
3. https://owasp.org/www-project-top-ten/
REFERENCES
1. David Kim, Michael G. Solomon, “Fundamentals of Information Systems Security”, Jones &
Bartlett Learning Publishers, 2013 (Unit 2)
2. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made easy”, Elsevier, 2011 (Unit 3)
3. Kimberly Graves, “CEH Official Certified Ethical hacker Review Guide”, Wiley Publishers,
2007 (Unit 3)
4. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”, Third Edition,
Pearson Education, 2015 (Units 4 and 5)
5. Georgia Weidman, “Penetration Testing: A Hands-On Introduction to Hacking”, No Starch
Press, 2014 (Lab)