0% found this document useful (0 votes)
11 views28 pages

Hammad Raza.

The document outlines a course on Data Science, detailing its objectives, learning outcomes, and topics covered, including data preprocessing, machine learning, and data visualization. Students will gain hands-on experience with popular Data Science libraries and learn to communicate insights effectively. Additionally, the document includes a course on Cloud Computing and Web Services, focusing on cloud fundamentals, web service technologies, and security practices.

Uploaded by

itsuc.official
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views28 pages

Hammad Raza.

The document outlines a course on Data Science, detailing its objectives, learning outcomes, and topics covered, including data preprocessing, machine learning, and data visualization. Students will gain hands-on experience with popular Data Science libraries and learn to communicate insights effectively. Additionally, the document includes a course on Cloud Computing and Web Services, focusing on cloud fundamentals, web service technologies, and security practices.

Uploaded by

itsuc.official
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

Semester VI

Lectures
Course Code Course Title Credits /Week

USCS601 Data Science 2 3

About the Course: This course introduces the field of Data Science, covering the fundamental concepts,
techniques, and tools used for data analysis, machine learning, and data visualization. Students will learn
how to preprocess and analyze data, build predictive models, evaluate model performance, and effectively
communicate insights through visualizations. The course also explores data management principles and
practices. Practical hands-on exercises and projects using popular Data Science libraries and technologies
are included to reinforce the concepts learned.

Course Objectives:
• Understand the foundations and scope of Data Science, including its applications and comparison
to related fields like Business Intelligence and Artificial Intelligence.
• Develop skills in data preprocessing, including cleaning, transforming, selecting, and merging
data, to ensure data quality and suitability for analysis.
• Gain knowledge of machine learning algorithms and techniques, such as regression, classification,
clustering, and ensemble learning, to build predictive models and make data-driven decisions.
• Learn how to evaluate and select models using appropriate evaluation metrics and crossvalidation
techniques to ensure reliable and robust model performance.
• Develop proficiency in data visualization techniques and tools to effectively communicate insights
and tell compelling stories using data.

Learning Outcomes:
After successful completion of this course, students would be able to
• Apply data preprocessing techniques to clean and transform raw data, handle missing values and
outliers, and merge datasets.
• Implement machine-learning algorithms to perform tasks such as regression, classification,
clustering, and ensemble learning.
• Evaluate and compare different machine learning models using appropriate evaluation metrics and
cross-validation techniques.
• Create informative and visually appealing data visualizations to communicate insights and
patterns in data.
• Understand the principles and practices of data management, including data governance, data
quality assurance, and data privacy considerations.

Topics No of
Unit Lectures
Introduction to Data Science and Data Preprocessing

What is Data Science?: Definition and scope of Data Science, Applications


I 15
and domains of Data Science, Comparison with other fields like Business
Intelligence (BI), Artificial Intelligence (AI), Machine Learning (ML), and

Data Warehousing/Data Mining (DW-DM)

Data Types and Sources: Different types of data: structured, unstructured,


semi-structured, Data sources: databases, files, APIs, web scraping, sensors,
social media

Data Preprocessing: Data cleaning: handling missing values, outliers,


duplicates, Data transformation: scaling, normalization, encoding categorical
variables, Feature selection: selecting relevant features/columns, Data
merging: combining multiple datasets

Data Wrangling and Feature Engineering: Data wrangling techniques:


reshaping, pivoting, aggregating, Feature engineering: creating new features,
handling time-series data Dummification: converting categorical variables
into binary indicators, Feature scaling: standardization, normalization

Tools and Libraries: Introduction to popular libraries and technologies used


in Data Science like Pandas, NumPy, Sci-kit Learn, etc.

Data Analysis and Machine Learning


Exploratory Data Analysis (EDA): Data visualization techniques:
histograms, scatter plots, box plots, etc., Descriptive statistics: mean, median,
mode, standard deviation, etc., Hypothesis testing: t-tests, chi-square tests,
ANOVA, etc.
Introduction to Machine Learning: Supervised learning: classification and
regression, Unsupervised learning: clustering and dimensionality reduction,
Bias-variance tradeoff, underfitting, and overfitting
Regression Analysis: Simple linear regression, Multiple linear regression,
II Stepwise regression, Logistic regression for classification 15

Model Evaluation and Selection: Techniques for evaluating model


performance: accuracy, precision, recall, F1-score, Confusion matrix and
ROC curve analysis, Cross-validation: k-fold cross-validation, stratified
cross-validation, Hyperparameter tuning and model selection
Machine Learning Algorithms: Decision Trees and Random Forests,
Support Vector Machines (SVM), Artificial Neural Networks (ANN),
Ensemble Learning: Boosting and Bagging, K-Nearest Neighbors (K-NN),
Gradient Descent for optimization

Page 2 of 28
Model Evaluation, Data Visualization, and Management

Model Evaluation Metrics: Accuracy, precision, recall, F1-score, Area


Under the Curve (AUC), Evaluating models for imbalanced datasets

Data Visualization and Communication: Principles of effective data


visualization, Types of visualizations: bar charts, line charts, scatter plots,
III etc. Visualization tools: matplotlib, seaborn, Tableau, etc. Data storytelling: 15
communicating insights through visualizations

Data Management: Introduction to data management activities, Data


pipelines: data extraction, transformation, and loading (ETL), Data
governance and data quality assurance, Data privacy and security
considerations

Textbook(s):
1. Data Science from Scratch First Principles with Python- Joel Grus O'reilly, 2nd Edition
2. Advancing into Analytics From Excel to Python and R, George Mount, Oreilly, First Edition
3. Introduction to Machine Learning with Python, Andreas C. Muller, Sarah Guido, Oreilly, First
Edition
Additional Reference(s):
1. Doing Data Science, Rachel Schutt and Cathy O’Neil, O’Reilly,2013
2. Mastering Machine Learning with R, Cory Lesmeister, PACKT Publication,2015
3. Hands-On Programming with R, Garrett Grolemund,1st Edition, 2014
4. An Introduction to Statistical Learning, James, G., Witten, D., Hastie, T., Tibshirani,
R.,Springer,2015

Page 3 of 28
T.Y.B.Sc. (CS) Sem VI Data Science Question Bank

Unit I

Introduction to Data Science and Data Preprocessing:


1. Explain the concept of Data Science and its significance in modern-day industries.
2. Explain the term Data Science and its role in extracting knowledge from data.
3. Discuss three key applications of Data Science in different domains.
4. Compare and contrast Data Science with Business Intelligence (BI) in terms of
goals/objectives, methodologies, and outcomes.
5. Differentiate between Artificial Intelligence (AI) and Machine Learning (ML) with respect to
their scope and applications.
6. Analyze the relationship between Data Warehousing/Data Mining (DW-DM) and Data
Science, highlighting their similarities and differences.
7. Discuss the importance of Data Preprocessing in the Data Science pipeline and its impact on
the quality of analysis and modeling outcomes.

Data Types and Sources:


1. Define structured data and provide examples of structured datasets. Describe the
characteristics of structured data.
2. Define structured, unstructured, and semi-structured data, providing examples for each type.
3. Discuss the challenges associated with handling unstructured data and propose solutions.
4. Explain how semi-structured data differs from structured and unstructured data, citing
examples.
5. Evaluate the advantages and disadvantages of different data sources such as databases, files,
and APIs in the context of Data Science.
6. Describe the process of data collection through web scraping and its importance in data
acquisition.
7. Illustrate how data from social media platforms can be leveraged for sentiment analysis and
market research purposes.
8. Discuss the challenges associated with sensor data and social media data, and propose
strategies for handling and analyzing such data effectively.

Data Preprocessing:
1. Demonstrate the importance of data cleaning in the context of Data Science projects.
2. Describe the steps involved in data cleaning and the techniques used to handle missing values,
outliers, and duplicates.
3. Explain the rationale behind data transformation techniques such as scaling, normalization,
and encoding categorical variables.
4. Discuss the importance of feature selection in machine learning models and the criteria used
for selecting relevant features.
5. Outline the process of data merging and the challenges associated with combining multiple
Page 4 of 28
datasets for analysis.
6. Discuss the challenges and strategies involved in data merging when combining multiple
datasets for analysis.
7. Analyze the impact of data preprocessing on the quality and effectiveness of machine learning
algorithms.

Data Wrangling and Feature Engineering:


1. Define data wrangling and explain its role in preparing raw data for analysis.
2. Describe common data wrangling techniques such as reshaping, pivoting, and aggregating.
3. Illustrate the concept of feature engineering and its impact on model performance, with a
focus on creating new features and handling time-series data.
4. Explain the process of dummification and feature scaling, including techniques such as
converting categorical variables into binary indicators and standardization/normalization of
numerical features. Discuss the implications of dummification on machine learning
algorithms.
5. Compare and contrast feature scaling techniques such as standardization and normalization,
discussing their effects on model training and performance.

Tools and Libraries:


1. Explain the functionalities of popular libraries and technologies used in Data Science,
including Pandas, NumPy, and Sci-kit Learn.
2. Describe how Pandas facilitates data manipulation tasks such as reading, cleaning, and
transforming datasets.
3. Discuss the advantages of using NumPy for numerical computing and its role in scientific
computing applications. OR Discuss the role of NumPy in numerical computing and its
advantages over traditional Python lists.
4. Explain how Sci-kit Learn facilitates machine learning tasks such as model training,
evaluation, and deployment.
5. Discuss the importance of using libraries and technologies in Data Science projects for
efficient and scalable data analysis.

Unit II
Exploratory Data Analysis (EDA):
1. Explain the importance of exploratory data analysis (EDA) in the data science process.
2. Describe three data visualization techniques commonly used in EDA and their applications.
3. Discuss the role of histograms, scatter plots, and box plots in understanding the distribution
and relationships within a dataset.
4. Define descriptive statistics and provide examples of commonly used measures such as mean,
median, and standard deviation. OR Define descriptive statistics and discuss their role in
summarizing and understanding datasets. Compare and contrast measures such as mean,
median, mode, and standard deviation.
5. Discuss the significance of histograms, scatter plots, and box plots in visualizing different
Page 5 of 28
types of data distributions.
6. Explain the concept of hypothesis testing and provide examples of situations where t-tests,
chi-square tests, and ANOVA are applicable.

Introduction to Machine Learning:


1. Differentiate between supervised and unsupervised learning algorithms, providing examples
of each.
2. Explain the concept of the bias-variance tradeoff and its implications for model performance.
3. Define underfitting and overfitting in the context of machine learning models and suggest
strategies to address each issue.
4. Explain the process of model training, validation, and testing in the context of supervised
learning algorithms.
5. Describe how clustering and dimensionality reduction are used in unsupervised learning
tasks.
6. Discuss the impact of data preprocessing techniques on model performance in supervised and
unsupervised learning tasks.
7. Provide examples of real-world applications for classification and regression tasks in
supervised learning.

Regression Analysis:
1. Explain the principles of simple linear regression and its applications in predictive modeling.
2. Discuss the assumptions underlying multiple linear regression and how they can be validated.
3. Outline the steps involved in conducting stepwise regression and its advantages in model
selection.
4. Describe logistic regression and its use in binary classification problems. OR Discuss the
application of logistic regression in classification tasks and its advantages over linear
regression.
5. Compare and contrast the assumptions underlying linear regression and logistic regression
models.

Model Evaluation and Selection:


1. Define accuracy, precision, recall, and F1-score as metrics for evaluating classification
models and explain their significance. Discuss the strengths and limitations of each metric.
2. Describe how a confusion matrix is constructed and how it can be used to evaluate model
performance.
3. Explain the concept of a ROC curve and discuss how it can be used to evaluate the
performance of binary classification models.
4. Explain the concept of cross-validation and compare k-fold cross-validation with stratified
cross-validation.
5. Describe the process of hyperparameter tuning and model selection and discuss its importance
in improving model performance.

Page 6 of 28
Machine Learning Algorithms:
1. Describe the decision tree algorithm and its advantages and limitations in classification and
regression tasks.
2. Explain the principles of decision trees and random forests and their advantages in handling
nonlinear relationships and feature interactions.
3. Discuss the mathematical intuition behind support vector machines (SVM) and their
applications in both classification and regression tasks.
4. Describe artificial neural networks (ANN) and their architecture, including input, hidden, and
output layers.
5. Compare and contrast ensemble learning techniques like boosting and bagging, highlighting
their strengths and weaknesses.
6. Discuss the working principle of K-nearest neighbors (K-NN) algorithm and its use in
classification and regression tasks.
7. Explain the concept of gradient descent and its role in optimizing the parameters of machine
learning models.

Unit III

Model Evaluation Metrics:


1. Define accuracy, precision, recall, and F1-score as metrics for evaluating classification models.
Discuss its limitations, especially in the presence of imbalanced datasets. Also discuss scenarios
where each metric might be more appropriate.
2. Explain the concept of the Area Under the Curve (AUC) in ROC curve analysis. How does
AUC help in evaluating the performance of a binary classification model?
3. Discuss the challenges of evaluating models for imbalanced datasets. How do imbalanced
classes affect traditional evaluation metrics?
4. Describe techniques that can be used to address these challenges and ensure reliable model
evaluation.
5.
Data Visualization and Communication:
1. Outline the principles of effective data visualization. How do these principles contribute to
better communication of insights? OR Outline the principles of effective data visualization.
2. Outline the principles of effective data visualization, including clarity, simplicity, and
relevance.
3. What factors should be considered when creating visualizations to communicate insights?
4. Compare and contrast different types of visualizations such as bar charts, line charts, and scatter
plots. Provide examples of when each type of visualization would be appropriate.
5. Discuss the role of visualization tools such as matplotlib, seaborn, and Tableau in creating
compelling visualizations. What are the advantages and limitations of each tool?
6. Explain the concept of data storytelling. How can data storytelling enhance the impact of data
visualizations in conveying insights to stakeholders?

Page 7 of 28
Data Management:
1. Define data management activities and their role in ensuring data quality and usability. OR
Provide an overview of data management activities and their importance in ensuring data
quality and usability.
2. Explain the concept of data pipelines and the stages involved in the data extraction,
transformation, and loading (ETL) process.
3. Discuss the importance of data governance and data quality assurance in maintaining data
integrity and reliability.
4. Discuss the importance of data governance and data quality assurance in maintaining data
integrity and compliance with regulatory standards.
5. Describe the considerations for data privacy and security in data management practices. Discuss
strategies for protecting sensitive data and complying with regulations such as GDPR and
HIPAA.
6. Explain the considerations and best practices for ensuring data privacy and security throughout
the data management process. What measures can organizations implement to protect sensitive
information?
7. Discuss the ethical considerations surrounding data privacy and security, including regulatory
compliance and measures to protect sensitive information.
8. Analyze the considerations for data privacy and security in data management practices. How
can organizations protect sensitive data while still enabling data-driven insights? OR Explain the
considerations for data privacy and security in data management practices. What measures
should organizations take to protect sensitive data?

Page 8 of 28
Lectures
Course Code Course Title Credits /Week

USCS602 Cloud Computing and Web Services 2 3

About the Course: The course "Cloud Computing and Web Services" provides an in-depth understanding
of cloud computing fundamentals and web service technologies. Students will learn about different types
of clouds, cloud deployment models, and cloud platforms. They will also explore key concepts of
virtualization, security in cloud computing, and popular cloud computing platforms such as OpenStack
and AWS. Through practical exercises and hands-on projects, students will gain the skills required to
design, deploy, and manage cloud-based applications and services.

Course Objectives:
• Understand the basics of cloud computing, including types of clouds, deployment models, and
essential characteristics of cloud platforms.
• Explore web services technologies such as SOAP and REST and understand their role in
distributed computing and parallel computing.
• Gain proficiency in utilizing virtualization technologies, including creating virtual machines and
managing virtualized environments using tools like KVM and oVirt.
• Explore and utilize popular cloud computing platforms such as OpenStack and AWS to architect,
deploy, and manage cloud-based applications and services.
• Learn about cloud security fundamentals, including confidentiality, integrity, availability, and
secure development practices.

Learning Outcomes:
After successful completion of this course, students would be able to
• Demonstrate a comprehensive understanding of cloud computing concepts, including different
types of clouds and their characteristics.
• Implement and utilize web service technologies, such as SOAP and REST, to develop distributed
and parallel computing applications.
• Design, deploy, and manage cloud-based applications and services using popular cloud computing
platforms such as OpenStack and AWS.
• Apply secure development practices and implement cloud security policies to ensure the
confidentiality, integrity, and availability of cloud software solutions.
• Utilize virtualization technologies to create and manage virtualized environments, considering the
benefits and drawbacks of virtualization.

Topics No of
Unit Lectures

Page 9 of 28
Cloud Computing Basics

Web Services – Distributed Computing, Parallel Computing, WSDL


structure, SOAP- Structure of SOAP Message (In JAX-WS), SOAP
I Messaging Architecture, SOAP Header, Client-side SOAP Handler, REST- 15
What is REST? HTTP methods, Java API for RESTful Web Services
(JAXRS)

Virtulization:- Characteristics of Virtualized Environments.. Pros and Cons


of Virtualization. Virtualization using KVM, Creating virtual machines, oVirt
- management tool for virtualization environment.

Introduction to Cloud Computing:

Definition, Types of Clouds, Deployment of software solutions and web


applications, Types of Cloud Platforms, Essential characteristics –
Ondemand self-service, Broad network access, Location independent
resource pooling ,Rapid elasticity , Measured service, Comparing cloud
II providers with traditional IT service providers 15
Cloud Computing Software Security fundamentals: Cloud Information
Security Objectives, Confidentiality, Integrity, Availability, Cloud Security
Services, Relevant Cloud Security Design Principles, Secure Cloud Software
Requirements, Secure Development practices, Approaches to Cloud
Software Requirement Engineering, Cloud Security Policy Implementation.

Cloud Applications
CloudSim: Introduction to Simulator, understanding CloudSim simulator,
CloudSim Architecture(User code, CloudSim, GridSim, SimJava)
Understanding Working platform for CloudSim,
OpenStack: Introduction to OpenStack, OpenStack test-drive, Basic
OpenStack operations, OpenStack CLI and APIs, Tenant model operations,
III Quotas, Private cloud building blocks, Controller deployment, Networking 15
deployment, Block Storage deployment, Compute deployment, deploying
and utilizing OpenStack in production environments, Building a production
environment, Application orchestration using OpenStack Heat
AWS: Architecting on AWS, Building complex solutions with Amazon
Virtual Private Cloud (Amazon VPC)

Page 10 of 28
T.Y.B.Sc. (CS) Sem VI Cloud Computing and Web Services Question Bank

Unit 1

1. Differentiate between parallel and distributed computing.


2. Describe about distributed system and its architecture.
3. List and explain the characteristics of distributed systems
4. Describe distributed systems and hence discuss their components.
5. Explain Architectural styles for distributed computing
6. Explain briefly about the technologies for Distributed Computing.
7. Explain RPC in detail.
8. Explain Distributed object frameworks in detail.
9. Explain hardware Architecture for Parallel Processing.
10. Explain the concept of distributed computing.
11. Explain the level of parallelization.
12. What is a Web Service?
13. What are the different types of web services?
14. What are the different characteristics of web services?
15. Explain the difference between SOAP and REST.
16. What is WSDL?
17. What role does XML play in Web Services?
18. Explain the purpose of HTTP methods (GET, POST, PUT, DELETE) in RESTful WebServices.
19. What is SOAP? Explain the architecture of SOAP messages.
20. Explain the SOAP header.
21. What is Client-side SOAP handler? Explain the steps to create Client-side SOAP Handlers.
22. Explain REST along with its key principles.
23. Explain Java API for RESTful Web Services
24. Explain Characteristics of Virtualized environment.
25. List and explain the advantages and disadvantages of virtualization.
26. Explain in detail about KVM.
27. Write a note on oVirt.
28. What is Virtualization explain its types in detail?
29. Distinguish between Hot/Live and Cold/Regular Migration
30. Explain the Life Cycle of virtualization in detail.
31. Explain Hypervisor in detail.
32. Explain the process of creating a virtual machine.

Page 11 of 28
Unit 2

1. Explain cloud computing security fundamentals


2. Write a note on Confidentiality with respect to cloud information security
3. Write a note on Integrity with respect to cloud information security.
4. Write a note on Availability with respect to cloud information security
5. Explain the cloud security design principles.
6. Explain the requirements for secure cloud software.
7. Explain secure development practice with respect to cloud computing.
8. Explain the approaches to Cloud Software Requirement Engineering.
9. Explain Cloud Security Policy Implementation.
10. Discuss about cloud computing in detail.
11. List and explain the types of cloud in depth.
12. Explain the concept of Public Cloud in detail.
13. Explain the concept of Private Cloud in detail.
14. Explain the concept of Hybrid Cloud in detail.
15. Explain the concept of Community Cloud in detail.
16. What is cloud reference model? List and explain three different models.
17. Explain IaaS in detail.
18. Explain PaaS in detail.
19. Explain SaaS in detail.
20. Define cloud computing. Explain essential characteristics of cloud computing.
21. Explain open challenges of cloud computing.
22. Described the vision introduced by cloud computing.
23. What is the Cloud Deployment Model?
24. What are the advantages and disadvantages of cloud computing

Page 12 of 28
Unit 3

1) Write a note on the CloudSim simulator.


2) Explain CloudSim architecture with a diagram.
3) Write a note on GridSim and SimJava.
4) Explain the Java working platform operations for CloudSim.
5) Write a short note on OpenStack.
6) Write a short note on the OpenStack operation.
7) Explain OpenStack Client Command-Line Interface (CLI).
8) What are the key components of OpenStack?
9) What is DevStack? Explain the installation steps.
10) Explain the concept of QUOTAS in OpenStack.
11) Explain Architecture of Neutron.
12) Explain Architecture of Nova.
13) Explain the Controller deployment in OpenStack.
14) Explain networking deployment in OpenStack.
15) Explain Heat Orchestration in OpenStack.
16) Write a note on Architecting on AWS.
17) Explain Components and services of AWS.
18) Write a note on Amazon VPC.
19) Write an example of building a complex solution.

Page 13 of 28
Lectures
Course Code Course Title Credits /Week

USCS6031 Wireless Sensor Networks 2 3

About the Course: This course provides a comprehensive understanding of Wireless Sensor Networks
(WSNs) and their applications. It covers the fundamental concepts, architectural elements, advantages,
and challenges of WSNs. Students will explore sensor node technology, network architecture,
optimization goals, and design principles for WSNs. The course also delves into wireless transmission,
telecommunication systems, and introduces the concepts of WSN operating systems and ad-hoc networks.
Through practical examples and case studies, students will gain hands-on experience in medium access
control protocols, routing strategies, transport control protocols, and WSN middleware architecture.

Course Objectives:
• Provide students with a comprehensive understanding of Wireless Sensor Networks (WSNs),
including their basic architectural elements, advantages, and challenges.
• Introduce students to the key technologies and protocols used in WSNs, such as medium access
control (MAC) protocols, routing strategies, and transport control protocols.
• Familiarize students with wireless transmission principles and telecommunication systems
relevant to WSNs, including frequency, signals, antennas, and satellite systems.
• Develop students' practical skills in designing and implementing WSN solutions by exploring
WSN operating systems, ad-hoc networks, and optimization goals.

Learning Outcomes:
After successful completion of this course, students would be able to
• Understand the fundamental concepts, architectural elements, and optimization goals of Wireless
Sensor Networks (WSNs) and apply this knowledge to analyze and design WSN solutions.
• Evaluate and compare different medium access control protocols and routing strategies in WSNs,
and make informed decisions to ensure efficient and reliable communication.
• Demonstrate knowledge of wireless transmission technologies, such as frequency, signals,
antennas, and propagation, and analyze their impact on WSN performance.
• Assess the role of telecommunication systems, satellite, broadcast systems in WSNs, and
understand their applications and implications for WSN deployments.

Topics No of
Unit Lectures

Page 14 of 28
Introduction and Overview of Wireless Sensor Networks: Basic Sensor
Network Architectural Elements, Advantage and challenges, Applications,
Sensor Node Technology, Sensor Taxonomy, WN Operating Environment,
Radio Technology, Network architecture, Optimization goals and figures of
merit, Design principles for WSNs, Service interfaces of WSNs, Gateway
I concepts. 15
Wireless Sensor Network Operating Systems and Ad-hoc Networks:
Overview of Wireless Sensor Network Operating Systems, Examples of
WSN Operating Systems Ad-hoc Networks in Wireless Sensor Networks,
Characteristics and Challenges of Ad-hoc Networks in WSNs, Energy

Efficiency Considerations in Ad-hoc Networks, Security and Privacy in


Adhoc Networks, Examples of WSN OS, Ad-hoc Network.

Medium Access Control Protocol: Fundamentals of MAC Protocols,


Sensor-MAC Case Study

Routing in WSN: Routing Challenges and Design Issues in Wireless Sensor


II Networks, , IEEE 802.15.4 LR-WPANs Standard Case Study, Routing 15
Strategies in Wireless Sensor Networks,

Transport Control Protocol: Traditional Transport Control Protocols,


Transport Protocol Design Issues, WSN Middleware Architecture

Wireless Transmission: Frequency for radio transmission, Signals,


Antennas, Signal propagation, Multiplexing, Modulation, Spread spectrum,
Cellular systems.
Telecommunication, Satellite and Broadcast Systems: Satellite and
III Broadcast Systems: GSM: Mobile services, System architecture, Radio 15
interface, Protocols, Localization And Calling, Handover, security, New data
services; DECT: System architecture, Protocol architecture; ETRA, UMTS
and IMT- 2000. Satellite Systems: History, Applications, Basics: GEO, LEO,
MEO; Routing, Localization, Handover.
Textbook(s):
1. Wireless Sensor Networks Technology, Protocols, and Applications ,Kazem Sohraby, Daniel Minoli
and TaiebZnati, John Wiley & Sons, 2017
2. Protocols and Architectures for Wireless Sensor Network, Holger Kerl, Andreas Willig, John Wiley
and Sons, 2015 Additional Reference(s):
1. Fundamentals of Wireless Sensor Networks, Theory and Practice, Waltenegus Dargie, Christian
Poellabauer , Wiley Series on wireless Communication and Mobile Computing, 2011
2. Networking Wireless Sensors, Bhaskar Krishnamachari , Cambridge University Press, 2005

Page 15 of 28
T.Y.B.Sc. (CS) Sem VI wireless sensor network Question Bank
UNIT 1:
Answer the following:

1. What is a Wireless Sensor Network and its application? (Apr 23) (Apr 19)
2. Discuss on Issues and Challenges in Designing a Sensor Networks? (Apr 23)
3. Explain in detail various components of WSN.
4. Explain sensor taxonomy in WSNs.
5. Explain Design principles for WSNs.
6. State the reasons why gateways are needed in WSN. (Apr 23)
7. What are the different functionalities that a service interface should provide in WSN?
8. Explain Ad-hoc Network. Describe its characteristics and state the challenges faced By it
in WSN.
9. Explain various optimization goals for Wireless Sensor Networks. (Apr 19)
10. What are the characteristics of an ideal routing-protocol for Adhoc networks? (Apr 23)
11. Describe Network Architecture in WSNs.
12. What is Low- Energy Adaptive Clustering Hierarchy? State its advantages and
disadvantages.
13. In Wireless Sensor Networks, state the three types of Mobility. (Apr 23)
14. Explain about mobile adhoc network with a neat diagram? (Apr 23)
15. Explain sensor node with its different categories (Apr 19)
16. Explain the block diagram of a sensor node (Apr 19)
17. Define and explain any five tasks of transceivers (Apr 19)
18. How to turn relatively imprecise optimization goals into measurable figures of merit For
sensor node network? (Apr 23)
19. Write a short note on WSN tunnelling. (Apr 23)
20. Discuss Salient features of TinyOS. (Apr 19)
21. Discuss any 2 Mobile and wireless devices. (Apr 19)

Page 16 of 28
UNIT II:
Answer the following

1. Explain in brief common MAC protocols used in WSN. (Apr 23)


2. List and explain components of Sensor MAC. (Apr 23)
3. Explain Routing Strategies in Wireless Sensor Networks. (Apr 19) (Apr 23)
4. Explain Transport Control Protocol. Explain its design issue. (Apr 23) OR What are The
issues need to consider to design transport protocols for WSNs. (Apr 19)
5. Explain WSN Middleware Architecture.
6. Give the examples existing Transport Control Protocols for WSN. (Apr 23)
7. What are Requirements and design constraints for wireless MAC protocols. (Apr 23)
8. Discuss issues in designing MAC protocol for adhoc-networks. (Apr 23)
9. Explain SPIN protocol. (Apr 19)
10. Explain periodic listen and sleep operation in S-MAC. (Apr 19)
11. How Power-efficient gathering in sensor information systems (PEGASIS) routing
Protocol works? (Apr 19)
12. Explain different performance requirements of MAC protocol. (Apr 19)
13. What is Low Energy Adaptive Clustering Hierarchy? State its advantages and
Disadvantages. (Apr 23)
14. Explain directional busy-tone-based MAC protocol in detail (Apr 23)
15. Explain Single-Hop versus Multi-Hop Networks. (Apr 23)
16. How Congestion Detection and Avoidance works? (Apr 19)
17. Explain TCP operation.
18. Explain feasibility of using TCP/UDP for WSN.
19. Write a short note on SMACS.

Page 17 of 28
UNIT III
ANSWER THE FOLLOWING:

1. What are the tele services provided by GSM? (Apr 19)


2. Difference between GEO, LEO, MEO. (Apr 19)
3. Explain with diagram System architecture of UMTS. (Apr 19)
4. Explain features of DECT system. (Apr 19)
5. Write short note on GSM security services. (Apr 23)
6. List and explain the three basic physical mechanisms affect radio Propagation.
7. Explain signal propagation using different types of antennas. (Apr 23)
8. Explain satellite system for Global mobile telecommunications. (Apr 23)
9. What are the applications of Satellite communication? (Apr 23)
10. Explain range for signal propagation in Wireless transmission. (Apr 19)
11. Explain is HSCSD. (Apr 19)
12. Explain the block diagram of sensor node.
13. Explain Link Control Protocol (LCP) and Network Layer Control (NLC).
14. Explain DECT system architecture with suitable diagram. (Apr 23)
15. Write a short note on Radio subsystem and its components. (Apr 19)
16. Discuss the advantages of cellular systems with small cells. (Apr 19)
17. Explain Inclination angle of a satellite with suitable diagram. (Apr 23)
18. Explain the steps of Spread Spectrum.
19. Write short note on TETRA.
20. Explain system architecture of DECT.
21. Explain protocol architecture of DECT.

Page 18 of 28
Lectures
Course Code Course Title Credits /Week

USCS6042 Ethical Hacking 2 3

About the Course: This course provides an in-depth exploration of ethical hacking and penetration
testing methodologies. Students will learn about hacking technology types, the phases of ethical hacking,
footprinting, social engineering, system hacking, web server and application vulnerabilities, wireless
hacking, and more. The course emphasizes hands-on lab exercises and real-world scenarios to develop
practical skills in identifying and mitigating security vulnerabilities.

Course Objectives:
• Understand the terminology and concepts related to ethical hacking and penetration testing.
• Explore various hacking technologies and the skills required to become an ethical hacker.
• Learn the different phases involved in ethical hacking and the methodologies used in penetration
testing.
• Gain knowledge of common hacking techniques, such as footprinting, scanning, enumeration, and
session hijacking.
• Develop proficiency in identifying and exploiting vulnerabilities in web servers, web applications,
and wireless networks.

Learning Outcomes:
After successful completion of this course, students would be able to
• Apply ethical hacking methodologies to conduct comprehensive security assessments and
penetration tests.
• Perform effective footprinting and reconnaissance techniques to gather critical information about
target systems.
• Identify and exploit vulnerabilities in various network and system components using appropriate
tools and techniques.
• Evaluate the security posture of web servers, web applications, and wireless networks, and
recommend appropriate countermeasures.
• Demonstrate an understanding of ethical and legal considerations in conducting ethical hacking
activities and adhere to professional codes of conduct.

No of
Unit Topics Lectures

Page 19 of 28
Introduction: Terminology, Hacking Technology Types, Ethical Hacking
Phases, Hacktivism, Hacker Classes, Skills Required for an Ethical Hacker,
Vulnerability Research, Ways to Conduct Ethical Hacking
Footprinting: Definition, Information Gathering Methodology, Competitive
Intelligence, DNS Enumeration, Whois and ARIN Lookups, Types of DNS
I Records, Traceroute in Footprinting, E-Mail Tracking 15
Social Engineering: Common Types Of Attacks
Scanning and Enumeration: Port Scanning, Network Scanning,
Vulnerability Scanning, CEH Scanning Methodology, Ping Sweep
Techniques, Nmap Command Switches, SYN, Stealth, XMAS, NULL,

IDLE, FIN Scans, Anonymizers, HTTP Tunneling Techniques, IP Spoofing


Techniques, SNMP Enumeration, Steps Involved in Enumeration

System Hacking: Password-Cracking Techniques, Types of Passwords,


Keyloggers and Other Spyware Technologies, Escalating Privileges,
Rootkits
Sniffers: Protocols Susceptible to Sniffing, Active and Passive Sniffing, ARP
Poisoning, MAC Flooding, DNS Spoofing Techniques, Sniffing
Countermeasures

II Denial of Service: Types of DoS Attacks, Working of DoS Attacks, 15


BOTs/BOTNETs, “Smurf” Attack, “SYN” Flooding, DoS/DDoS
Countermeasures
Session Hijacking: Spoofing vs. Hijacking, Types, Sequence Prediction,
Steps, Prevention
Hacking Web Servers: Web Server Vulnerabilities, Attacks against Web
Servers, Patch Management Techniques, Web Server Hardening
Web Application Vulnerabilities: Web Application Hacking, Web
Application Threats, Google Hacking, Countermeasures
Web-Based Password Cracking Techniques: Authentication Types,
Password Crackers, Countermeasures
SQL Injection: Steps, SQL Server Vulnerabilities, Countermeasures
Buffer Overflows: Types, Stack-Based Buffer Overflows, Mutation
III 15
Techniques
Wireless Hacking: WEP, WPA Authentication Mechanisms, and Cracking
Techniques, Wireless Sniffers, Rogue Access Points, Wireless Hacking
Techniques, Securing Wireless Networks
Penetration Testing Methodologies: Methodologies, Steps, Automated
Tools, Pen-Test Deliverables

Textbook(s):
1. CEH official Certfied Ethical Hacking Review Guide, Wiley India Edition Additional
Reference(s):
1. Certified Ethical Hacker: Michael Gregg, Pearson Education
2. Certified Ethical Hacker: Matt Walker, TMH.

Page 20 of 28
T.Y.B.Sc. (CS) Sem VI Ethical Hacking Question Bank

Unit 1
1. What is hacking also explain what are hacker classes in short.
2. Explain the types of Ethical Hacking
3. Explain Hacking Technology and its types in detail
4. What are the phases to understand Ethical Hacking explain it in detail
5. Define Hacktivism and explain ways to manifest it
6. Explain any five hacker classes
7. What are the skills required for becoming an Ethical Hacker
8. Define vulnerability research and several key
9. What are the ways to conduct Ethical Hacking
10. Define Footprinting and its types
11. Explain the methods to perform Information Gathering
12. What are the competitive Intelligence in Ethical Hacking
13. Write a short note on DNS Enumeration .
14. Explain WHOIS and ARIN Lookups in detail
15. What are the types of DNS Records in Ethical Hacking
16. What is Traceroute in Footprinting
17. Define E-mail Tracking and explain its working
18. Explain following attacks in detail
a. Key Stroke logging
b. Denial – of Service attack
c. Watering hole attack
d. Brute force attack
e. Phishing and fake WAP
OR
a. Eaves dropping attack
b. Man in the middle attack
c. Session hijacking
d. Clikjacking
e. Cookie Theft

19. What is scanning/Explain Port Scanning in detail


20. Define port Scanning with example
21. Write a brief note on Network Scanning
22. Explain Vulnerability Scanning in detail
23. Explain CEH Scanning Methodology in brief
24. What are the ping Sweep Techniques and define its approaches
25. What are the Nmap Command Switches
26. Explain how SYN is getting used to transfer the connection in Ethical Hacking
27. Define Stealth in Ethical Hacking
28. Explain how XMAS Scanning techniques is used in Ethical Hacking
29. What is the term NULL defines in Ethical Hacking
Page 21 of 28
30. Explain the role of IDLE Scan in Ethical Hacking
31. Explain in FIN scans and its role in Ethical Hacking
32. What are the anonymizers in Ethical Hacking
33. What are the HTTP Tunneling Techniques in Ethical Hacking
34. What are the IP Spoofing Techniques in Ethical Hacking
35. Explain SNMP Enumeration in detail
36. What are the steps involved in Enumeration

Unit 2
1. Explain password hacking techniques.
2. ⁠ List and explain different types of passwords used.
3. ⁠ Explain spyware technologies in detail
4. ⁠ What are the preventions used in root notes
5. ⁠ What are DNS spoofing technique?
6. ⁠ Explain protocol susceptible to sniffing
7. ⁠ What is ARP spoofing? Explain in detail.
8. ⁠ Write short note on MAC flooding
9. ⁠ Explain how DNS attack works.
10. ⁠ Give different techniques of common DOS attack
11. ⁠ Explain Smurf attack in detail.
12. ⁠ Differentiate between Bots and Botnets
13. ⁠ Explain DoS/DDoS countermeasures
14. What is spoofing? Give its types.
15. What are preventive measures on hijacking.
16. What is hijacking give its types.
17. ⁠ Explain the difference between spoofing and hijacking
18. ⁠Explain sniffing countermeasures.
19. What is web server explain types of attacks against web server
20. Explain patch management techniques.
21. Write steps for web server hardening.
22. What is vulnerability, explain web server vulnerabilities.

Page 22 of 28
Unit 3
1. What is web application ? Explain the vulnerabilities in web application.
2. What are the phases of web application hacking.
3. Define web application threats and its types
4. Define term :
a. Threats
b. Malware
c. Phishing
5. What is Google hacking
6. What are countermeasures to prevent web application vulnerabilities
7. Define term password hacking and what are web based cracking techniques
8. Define term authentication and its types
9. What is password cracking and name tools used in password cracking
10. Define SQL injection and name it’s types
11. Define vulnerabilities in SQL server
12. What is buffer overflow explain its types
13. Define stack based buffer overflow
14. Define term mutation in EH and explain mutation techniques
15. Explain WEP in detail
16. Write different ways to accomplish wireless hacking
17. Explain wired equivalent privacy in detail
18. Explain WPA Authentication Mechanism.
19. Explain in detail Wireless Sniffing and its working.
20. Define the term Rogue Access Point and explain its working.
21. Explain penetration testing methodology.
22. Write short note on pen test deliverables.
23. Explain automated tools used in penetration testing.
24. Explain steps to secure wireless networks.

Page 23 of 28
Lectures
Course Code Course Title Credits /Week

USCS6052 Cyber Laws and IPR 2 3

About the Course: The course on Cyber Laws and IPR provides a comprehensive understanding of the
legal aspects and regulations related to cyberspace and information technology. The course covers a wide
range of topics, including basic concepts, internet technology, network security, cyber law, e-commerce,
electronic signatures, cyber crimes, privacy, intellectual property rights, and more. Students will explore
the legal framework governing cyberspace and develop an understanding of the legal and ethical issues
associated with information technology.

Course Objectives:
• Understand fundamental concepts of cyber laws and their relevance in the digital age.
• Examine legal frameworks and regulations in cyber laws, including the Information Technology
Act 2000 in India.
• Explore key issues in cyber laws such as e-commerce, e-governance, and electronic records and
contracts.
• Gain knowledge of cybercrimes, enforcement mechanisms, and the role of the Cyber Appellate
Tribunal.
• Analyze emerging issues in cyber laws, including liability of ISPs, privacy concerns, and
jurisdictional aspects.
• Understand intellectual property rights and online regulations, including copyrights, patents, and
domain name disputes.

Learning Outcomes:
After successful completion of this course, students would be able to
• Demonstrate a comprehensive understanding of cyber laws and their application in the digital age.
• Evaluate legal frameworks and regulations governing cyber laws.
• Identify and assess key issues in cyber laws, such as e-commerce, e-governance, and electronic
records and contracts.
• Understand cyber crimes, enforcement mechanisms, and the role of the Cyber Appellate Tribunal.
• Analyze emerging issues in cyber laws, including liability of ISPs, privacy concerns, and
jurisdictional complexities.
• Recognize intellectual property rights and online regulations, including copyrights, patents, and
domain name disputes.

Topics No of
Unit Lectures

Page 24 of 28
Introduction to Cyber Laws and Technology: Basic Concepts, Internet and
Advantages and Disadvantages of Internet Technology, Network and
Network Security
I 15
Legal Framework and Regulations: Cyber Law & Components of Cyber
Law, Cyber Law in India: An Overview of Information Technology Act 2000,
Cryptography, Encryption Technique & Algorithm and Digital

Signature & Electronic Signature


Key Issues in Cyber Laws: E-Commerce, E-Governance, E-Record & E-
Contract, Regulator, Certifying Authority, Electronic Signature Certificates

Cyber Crimes and Enforcement: Cyber Appellate Tribunal, Cyber Crimes-


Cyber Contraventions, Cyber Offences, Power of Investigation & Search,
EEvidence and Computer Forensic
Emerging Issues and Legal Considerations: ISP & Intermediary Not to be
II Liable in Certain Cases, Consequential Amendments in Various 15
Conventional Laws in India, Grey Areas of Information Technology Act,
2000,
Jurisdiction and Privacy: Cyber Jurisdiction, E-Consumers, Privacy of
Online Data and Information

Intellectual Property Rights and Online Regulations: Free Speech Online


or Online Freedom of Speech and Expression and Liability of Intermediary
Intellectual Property Rights (IPRs), Copyrights & Patents: International
III and Indian Scenario, Copyright Issues and Digital Medium, Patent Issues in 15
Digital Medium
Disputes and Resolution: Domain Name Dispute & Resolution and
Trademark Issues in Digital Medium, Spamming and Phishing

Textbook(s):
1. Cyber Laws & Information Technology (For LL.B.) Paperback – 1 January 2020
2. Cyber Law in India, Satish Chandra, ABS Books, 2017
3. Cyber Security and Cyber Laws, Nilakshi Jain, Wiley India, October 2020 Additional
Reference(s):
1. Cyber Laws, Justice Yatindra Singh, Universal Law Publishing, Universal Publishing, 2016
2. Cyber laws, Dr. Gupta & Agrawal, PREMIER PUBLISHING COMPANY, 2022
3. Cyber Law - An Exhaustive Section Wise Commentary On The Information Technology, Pavan
Duggal, Universal Publishing (LexisNexis), 2nd Edition, 2017

Page 25 of 28
Cyber Laws & IPR

Unit 1
1. What is Virus? Explain its types.
2. Write a short note on Pegasus Spyware.
3. What is the Internet? What are its Advantages and Disadvantages?
4. Write a short note on –
a. Precautions against Malicious Computer Code
b. Worms
c. Trojans
5. Write a comprehensive note on “Evolution of the Internet”
6. Explain LAN, MAN, and WAN in detail.
7. Describe the term Network Security in detail.
8. List and Explain Network Security measures.
9. What are the various threats to network security?
10. Explain the efforts made by India to ensure cybersecurity.
11. Explain India’s National Cyber Security Policy 2013.
12. Write a short note on
a. Cyber Space.
b. Netizens.
13. What is cyber law? Explain its components.
14. Explain the component of Cyber Law in India.
15. What are the reasons for the Enactment of the Information Technology Act 2000?
16. Explain the aims and objectives of the Information Technology Act 2000.
17. Write a comprehensive note on the overview of the Information Technology Act 2000?
18. Write a short note on Digital Signature.
19. What is Cryptography? Explain Symmetric and Asymmetric Cryptography with Suitable
diagrams.
20. Differentiate between Electronic Signature and Digital signature.
21. What is E-Commerce? Explain its various models.
22. What is EDI? Explain.
23. Explain International law relating to E-Commerce.
24. What is E-Governance? Explain provisions of the Information Technology Act 2000
Related to E-Governance.
25. Explain E-Governance Projects in India.
26. What is an E-Contract? Explain the parties to be E-Contract.
27. Explain the Powers and Functions of the Controller of Certifying Authorities (CCAs).
28. Who can become the Certifying Authority under the Information Technology Act 2000?
Explain his role.
29. Explain the sections and rules of Granting of Electronic Signature Certificate.
30. Discuss the challenges to privacy in the digital age.
31. Explain the significance of the right to privacy in the context of the Internet.

Page 26 of 28
Unit 2
1. Describe the Cyber Appellate Tribunal.
2. What is Cybercrime? What are the different types of cybercrimes
3. Describe the classification of Cybercrimes.
4. What are the prevention measures for Cyber Crimes?
5. Discuss Cyber contraventions under IT ACT 2000.
6. Describe Cyber Offences under IT ACT 2000.
7. Write a note on Cyber terrorism.
8. Briefly explain the power of investigation, search and arrest mentioned under the IT ACT
2000.
9. Can an intermediary be held liable for cyber offences? Explain the law.
10. Briefly explain the Consequential amendment made in Four Acts by the IT ACT 2000.
11. Explain grey areas of the IT ACT 2000 as amended by the IT (Amendment) ACT 2008.
12. What is computer forensics? Explain different stages of Forensic investigation.
13. Write a comprehensive note on Computer forensics in India
14. Explain the Indian position regarding Cyber Jurisdiction.
15. Who is an E-Consumer? What are the functions of the Consumer Protection Act, 2019?
16. Briefly explain salient features of the Data Protection Bill, 2021 of India.
17. How do digital signatures work and what legal significance do they hold?

Unit 3

Intellectual Property Rights and Online Regulations:

1. Briefly explain international law regarding online freedom of speech and expression.
2. Can the Intermediary be held liable when a third party uploads some information on His
website and exercise his freedom of speech and expression?
Intellectual Property Rights (IPRs), Copyrights & Patents:
3. What is an Intellectual property?
4. Write a short note on WIPO, 1996.
5. Write a short note on TRIP Agreement, 1995.
6. Explain the Berne Convention, 1886.
7. Explain WCT, 1996
8. Performance and Phonogram treaty, 1996.
9. Explain GATT and WTO.
10. Write a short note on the Universal Copyright Convention, 1952.
11. Explain Copyright terms in the Digital medium.
12. Briefly explain Copyright and Digital Music.

Page 27 of 28
13. Explain Copyright and Reverse Engineering in Computer Software: An Indian
Perspective.
14. Differentiate between Patents and Copyright.
15. What is called a Patent?
16. Briefly explain Patent Law in India.
Disputes and Resolution:
17. Explain the meaning of Trademark.
18. What are Links? What are the Do’s and Don’ts for using links?
19. Explain meta-tags issues.
20. Explain framing issues and Do’s and Don’ts for it.
21. What is Spamming? What are Anti-Spamming initiatives?
22. What is Phishing? What are Anti-Phishing initiatives?
23. Describe the impact of technology on intellectual property rights.
24. What role does technology play in the modern business environment?
25. Discuss the ethical considerations in the use of information technology.

Page 28 of 28

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy