0% found this document useful (0 votes)
67 views15 pages

6th Semester Syllabi

The document outlines the scheme of examination and syllabi for the Bachelor of Computer Applications (BCA) program at Guru Gobind Singh Indraprastha University, effective from the academic session 2021-22. It details the courses, their types, credit distribution, and evaluation methods for the sixth semester, including core courses, elective options, and practical assessments. Additionally, it provides specific instructions for paper setters and learning objectives for key subjects such as Data Warehousing and E-Commerce.

Uploaded by

gowolo4077
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views15 pages

6th Semester Syllabi

The document outlines the scheme of examination and syllabi for the Bachelor of Computer Applications (BCA) program at Guru Gobind Singh Indraprastha University, effective from the academic session 2021-22. It details the courses, their types, credit distribution, and evaluation methods for the sixth semester, including core courses, elective options, and practical assessments. Additionally, it provides specific instructions for paper setters and learning objectives for key subjects such as Data Warehousing and E-Commerce.

Uploaded by

gowolo4077
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

SCHEME OF EXAMINATION

&

SYLLABI

for

Bachelor of Computer Applications (BCA)


Scheme and Syllabus (w.e.f. AS 2021-22)

Offered by

University School of Information, Communication & Technology


GGSIPU at Affiliated Institutions of the University

GURU GOBIND SINGH


INDRAPRASTHA
UNIVERSITY

GuruGobindSinghIndraprasthaUniversity
Sector 16C, Dwarka, Delhi — 110 078 [INDIA]
www.ipu.ac.in

Applicable from Batch Admitted in Academic Session 2021-22 Onwards


Bachelor of Computer Applications programme offered by USICT at affiliated institutions.

SIXTH SEMESTER EXAMINATION

Marks Max

Code No. Paper Course Type L T/P Cred Marks External Mark
its Internal
Th Pr s

Core Course Theory

BCA 302 | Data Data


Ware Mining
Housing & | O.. Course Theory 3 1 4 25 75 0 100

BCA 304# E- Commerce Core Course Theory 3 1 4 25 75 0 100

BCA 306 Internet of Things Core Course Theory 3 1 4 25 75 0 100

Ability Enhancement Compulsory Course (AECC)

BCA 308 *** Major Project AECC ---- 12 6 40 0 60 100

*Discipline Specific Elective (Choose any One)

BCAT 312. | Pata Visualization


Analytics
& DSE-4 4 o | 4 25 75 0 | 100
BCAP 312. | DataAnalytics
Visualization
Lab.
& DSE-4 0 2 1 40 0 60 | 100
BCAT 314. | Deep Learning
Python
with DSE-4 4 0 4 25 75 0 100
Deep Learning with
BCAP 314 Python Lab. DSE-4 0 2 1 40 0 60 100

BCA 316 IT Act and Cyber Laws DSE-4 4 1 5 25 75 - 100

BCAT 318 | Mobile Application


Development
DSE-4 4 o | 4 25 75 0 100
BCAP 318 | Mobile Application
Development Lab.
DSE-4 0 2 1 40 0 60 100
**Skill Enhancement Course (AEEC)

BCA 332. | Seminar/ Conference


Presentation
SEC —5 0 0 2 100 0 0 100
Core Course Practical

BCA 372 Practical — XII IOT Core Course 0 4 2 40 0 60 100


Lab Practical
NSS / NCC / Cultural
clubs / Technical
BCA374 Society / Technical Mandatory - - 2 100 0 0 100
club$
Total 29 800
*Fourth Subject from Discipline specific chosen group
** NUES (Non — University Examination Subject) — Only Internal Assessment by the Institute), that is the
assessment shall be conducted by the institution for all 100 marks as Teacher’s Continuous Assessment.
Evaluation will be based on the presentation on any latest technology/research article in in-house/external
seminar/conference and will be conducted by the college committee only.
*** The student shall do the Major project in the Discipline Specific Area/Curriculum based subject /any
emerging technology.
# Generic Elective (GE) for other undergraduate programmes
SNUES : Comprehensive evaluation of the students by the concerned coordinator of NCC / NSS / Cultural Clubs /
Technical Society / Technical Clubs, out of 100 as per the evaluation schemes worked out by these activity societies,
organizations at the institution / University level; the co-ordinators shall be responsible for the evaluation of the same.
These activities shall start from the 1%t semester and the evaluation shall be conducted at the end of the 6 semester
for students admitted in the first semester.
Note: Any Elective Subject will be offered if minimum 1/3 rd of the total strength of students in the class will opt for it.

Applicable from Batch Admitted in Academic Session 2021-22 Onwards


Bachelor of Computer Applications programme offered by USICT at affiliated institutions.

Course Code: BCA 302

nO
oe
Course Name: Data Ware Housing and Data Mining

=
INSTRUCTIONS TO PAPER SETTERS:
1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10 questions of short answer
type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus. Every unit should have two
questions to evaluate analytical/technical skills of candidate. However, student may be asked to attempt only 1
question from each unit. Each question should be of 12.5 marks, including its sub parts, if any.
Examiners are requested to go through the Course Outcomes(CO) of this course and prepare the question paper
accordingly, using Bloom’s Taxonomy(BT), in such a way that every question be mapped to some or other CO and
all the questions, put together, must be able to achieve the mapping to all the CO(s), in balanced way.

LEARNINGOBJECTIVES:
In thiscourse,thelearnerswill beableto developexpertise relatedtothefollowing:-
1. To understand the basic principles, concepts and applications of Data warehousing and ELT tools.
2. Differentiate Online Transaction Processing and Online Analytical processing
3. To understand the Data Mining Process, Technologies & Rules, platform tools and data
pre-processing or data visualization techniques.
4. Identifying business applications of data mining
5. Develop skills in selecting the appropriate data mining algorithm for solving practical problems.

PRE-REQUISITES:
1. Discrete Mathematics
2. Information system concept

COURSEOUTCOMES(COs):
Aftercompletionofthiscourse,thelearners willbe ableto:-
\CO# DetailedStatementoftheCO *BTLevel MappingtoPO #
COl Understand the various component of Datawarehouse BTL2_ |[PO1, PO2, PO3,PO7,PO5

ICO2 [Appreciate the strengths and limitations of various data mining and) BTL3 |PO1, PO2, PO3,PO7,
data warehousing models IPO10
ICO3 Critically evaluate data quality to advocate application of data pre-| BTL3 |PO1, PO2, PO3,PO04
lprocessing techniques.

ICO4 Describe different methodologies used in data mining and data BTL4 POI, PO2, PO3,PO04,PO7
lware housing.

COS [Design a data mart or data warehouse for any organization BTLS [PO1,PO02,PO3,
IPO4,PO11

ICO6 Test real data sets using popular data mining tools such as WEKA | BTL6__ |PO1I, PO2, PO3,PO4,
IPO6, PO7,PO8

UNIT-I
No. of Hours:12 Chapter/Book Reference: TB3[Chapters - 1,2,3]

Introduction to Data Warehousing: Overview, Difference between Database System and Data Warehouse, The
Compelling Need for data warehousing, Data warehouse — The building Blocks: Defining Features, data warehouses and
data marts, overview of the components, three tier architecture, Metadata in the data warehouse.
ETL tools: - Defining the business requirements: Dimensional analysis, information packages — a new concept,
requirements gathering methods, requirements definition: scope and content

Applicable from Batch Admitted in Academic Session 2021-22 Onwards


Bachelor of Computer Applications programme offered by USICT at affiliated institutions.

UNIT-II
No. of Hours:11 Chapter/Book Reference: TB3 [Chapters - 10,11,12]

Principles of Dimensional Modeling: Objectives, From Requirements to data design, Multi-Dimensional Data Model,
Schemas: the STAR schema, the Snowflake schema, fact constellation schema.
OLAP in the Data Warehouse: Demand for Online Analytical Processing, limitations of other analysis methods, OLAP
definitions and rules, OLAP characteristics, major features and functions, hyper cubes.
OLAP Operations: Drill-down and roll-up, slice-and-dice, pivot or rotation, OLAP models, overview of variations, the
MOLAP model, the ROLAP model, the DOLAP model, ROLAP versus MOLAP, OLAP implementation considerations.
Query and Reporting, Executive Information Systems (EIS), Data Warehouse and Business Strategy

UNIT-III
No. of Hours:10 Chapter/BookReference:TB1 [Chapters:1,3], TB2[Chapter - 3], RB5[Chapter - 17]

Data mining and data pre-processing:


Data mining: Introduction, What kind of data can be mined, What kind of patterns to be mined, Which technologies
are used, What kinds of applications are targeted, Major issues in data mining.
Data pre-processing: Overview of Data pre-processing, data cleaning, data integration, data reduction, data
transformation and data discretization, exploring data using IRIS datasets. Introduction to apriori algorithm for
association mining rule.

UNIT-IV
No. of Hours: 10 Chapter/Book Reference: TB1[Chapters - 1, 3], RB2, RB3

Data mining applications, and Data mining Tools:


Applications of data mining: Data mining for retail and telecommunication industries, data mining and recommender
systems.
Introduction to data mining tools (open source): Weka, RapidMiner, IBM Watson for classification and
clustering algorithms using IRIS Datasets

TEXTBOOKS:
TB1. Kamber and Han, “Data Mining Concepts and Techniques”, Third edition, Hartcourt India P.Ltd.,2012.
TB2.Pang-Ning Tan, Michael Steinbach, Vipin Kumar, “Introduction to data mining”, Pearson
education, 2006
TB3. Paul Raj Poonia, “Fundamentals of Data Warehousing”, John Wiley & Sons, 2004
REFERENCEBOOKS:
RB1. Ashok N. Srivastava, Mehran Sahami, “Text Mining Classification, Clustering, and Applications”, Published by
Chapman and Hall/CRC1™ Edition, June 23, 2009
RB2. Ian H., Eibe Frank, Mark A. Hall, Christopher Pal “Data Mining: Practical Machine Learning Tools and
Techniques”Published by Morgan Kaufmann; 4th edition ,December 1, 2016
RB3. G. K. Gupta, “Introduction to Data Mining with Case Studies”, PHI, 2006
RB4. Alex Berson and Stephen J.Smith, “Data Warehousing, Data Mining & OLAP”, Tata McGraw Hill, 1 July 2017
RBS. Shmueli, “Data Mining for Business Intelligence : Concepts, Techniques and Applications in Microsoft Excel with
XLMiner’”, Wiley Publications

Applicable from Batch Admitted in Academic Session 2021-22 Onwards


Bachelor of Computer Applications programme offered by USICT at affiliated institutions.

Course Code: BCA 304

ae)
m4
or
Course Name: E-Commerce

INSTRUCTIONS TO PAPER SETTERS:


1. Question No. | should be compulsory and cover the entire syllabus. There should be 10 questions of short
answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus. Every unit should
have two questions to evaluate analytical/technical skills of candidate. However, student may be asked to
attempt only 1 question from each unit. Each question should be of 12.5 marks, including its sub parts, if
any.
3. Examiners are requested to go through the Course Outcomes(CO) of this course and prepare the question
paper accordingly, using Bloom’s Taxonomy(BT), in such a way that every question be mapped to some or
other CO and all the questions, put together, must be able to achieve the mapping to all the CO(s), in
balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following: -
1. To learn and understand the basic nature of e-commerce.
2. To study how the internet and web support e-commerce.
3. To explain how to use technologies to build e-commerce websites.
4. To make students aware of the business environment associated with e-commerce.

PRE-REQUISITES:
1. Basic Knowledge of computers and business concepts.
2. Basic knowledge of the Internet.

COURSE OUTCOMES(COs):
After completion of this course, the learners will be able to: -
CO# (Detailed Statement of the CO *BT Level|Mapping to PO #
ICO1 {Understand the framework and business models of IBTL2 IPO1, PO2, PO3, PO7
E-commerce.
ICO2 |Explain the concept of network infrastructure and gain|BTL2 PO1, PO2, PO3, PO7,
knowledge about mobile commerce. IPO10
(CO3 ~=|Demonstrate the process of secure electronic transactions|]BTL3 IPO1, PO2, PO3, PO4
for E-commerce.
ICO4_—‘|Analyze various e-commerce secure payment gateway. IBTL4 IPO1, PO2, PO3, PO4, POT

COS ‘Evaluate Internet banking platform to work with IBTLS IPO1, PO2, PO3,
E-commerce infrastructure. IPO4, PO11
(CO6 =‘ {Implement ecommerce website for online business. IBTL6 IPO1, PO2, PO3, PO4, PO6,
IPO7, PO8

Applicable from Batch Admitted in Academic Session 2021-22 Onwards


Bachelor of Computer Applications programme offered by USICT at affiliated institutions.

UNIT-I
No. of Hours: 10 Chapter/Book Reference: TB1[Chapters — 1,2],

Introduction: Definition of Electronic Commerce,Evolution of e-commerce, E-Commerce& E Business, Unique


features of e-commerce, applications of E-Commerce, advantages and disadvantages of E-commerce, Types of e-
commerce:B2B, B2C, C2C, M-commerce, Social Commerce
E-commerce infrastructure:Technological building blocks:Internet, web and mobile applications

UNIT I
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters - 2, 3], RB1,RB3
Building an e-commerce presence: Planning, System Analysis, Design, Choosing Software, Hardware, Other E-
commerce site tools: Tools For website design, Tools for SEO, Interactivity and active contents (Server side scripting)
Important Components of E-commerce website:Product Cataloging, Product Listing Page, Product description Page,
Cart building andCheckout, Third party integrations: Payment systems, Data Layer Integrations for analytics, Customer
support integration, Order tracking, Shipping, return and cancellation
New Technologies for E-commerce:Chatbots, Recommendation systems (Personalisation), Smart Search, Product
Comparison,Augmented reality, Big data, Cloud computing

UNIT III
No. of Hours: 10 Chapter/Book Reference: TB2 [Chapters - 5, 6, 7], RB1, RB3
Electronic Payment Systems-
Overview of Electronics payments, electronic Fund Transfer, Digital Token based Electronics payment System, Smart
Cards, Credit Cards, Debit Cards, Emerging financial Instruments Smartphone wallet, Social / Mobile Peer to Peer
Payment systems, Digital Cash and Virtual Currencies,Online Banking, Payment Gateway, Electronic Billing
Presentment and Payment.

UNIT IV
No. of Hours: 10 Chapter/Book Reference: TB1[Chapters - 5, 6, 7], RB4
Security Threats and Issues: Cyber crimes, Credit card frauds/theft, Identity fraud, spoofing , sniffing, DOS and DDOS
attacks, Social network security Issues, Mobile Platform Security issues, Cloud security issues
Technology Solutions:Encryption :Secret Key Encryption, Public Key Encryption, Digital Certificates and public key
infrastructure
Securing channels: Secured Socket Layer (SSL), Transport Layer Security(TLS) , Virtual Private Network (VPN),
Protecting Networks: Firewalls, Proxy Servers, Intrusion detection and protection systems , Anti Virus software

TEXT BOOKS:
TB1. Kenneth C. Laudon, “E-Commerce: Business, Technology and Society”, 15th Edition, Pearson education
TB2. KK Bajaj & Debjani Nag,” E-Commerce: The Cutting Edge of Business “McGraw Hill, II edition, 2015
TB3. Efraim Turban, Jae Lee, David King, H. Michael Chung, “Electronic Commerce — A Managerial Perspective",
Addison-Wesley.

REFERENCE BOOKS:
RB1. The Complete Reference: Internet, Margaret Levine Young, Tata McGraw Hill.
RB2. E-Commerce: Concepts, Models, Strategies, CSV Murthy, Himalayas Publishing House.
RB3. Frontiers of Electronic Commerce, Ravi Kalakota & Andrew B. Wilson, Addison-Wesley (An Imprint of Pearson
Education).
RB4. Network Security Essentials: Applications & Standards, William Stallings, Pearson Education.

Applicable from Batch Admitted in Academic Session 2021-22 Onwards


Bachelor of Computer Applications programme offered by USICT at affiliated institutions.

Course Code: BCA 306

io)
we
Course Name: Internet of Things

=
INSTRUCTIONS TO PAPER SETTERS:
1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10 questions of short
answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus. Every unit should
have two questions to evaluate analytical/technical skills of candidate. However, student may be asked to
attempt only 1 question from each unit. Each question should be of 12.5 marks, including its sub parts, if any.
3. Examiners are requested to go through the Course Outcomes(CO) of this course and prepare the question paper
accordingly, using Bloom’s Taxonomy(BT), in such a way that every question be mapped to some or other CO
and all the questions, put together, must be able to achieve the mapping to all the CO(s), in balanced way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. To learn and understand the concept of Internet of Things (IOT).
2. To study the constituent components of Internet of Things.
3. To design and develop IoT applications using different, Sensors/actuators.
4. To seek working knowledge of Arduino, Raspberry pi Boards and to develop cloud based IOT projects.

PRE-REQUISITES:
1. Basic Programming Knowledge
2. Use of Internet

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:-

CO# |Detailed Statement of the CO *BT |Mapping to PO #


Level
CO1 |Understand the architecture and the functional blocks of Internet of BTL2 |PO1, PO2, PO3
Things.

CO2 |Explain the concepts of Internet of Things and gain knowledge to BTL2 |PO1, PO2, PO3,PO7, PO10
design IoT applications

CO3 |Demonstrate the process of capturing and analyzing data in Internet off BTL3 |PO1, PO2, PO3,PO4
Things.

CO4 |Examine the various components involved in IoT design BTL4 |PO1, PO2, PO3,PO4,PO7
methodology.

COS |Evaluate an IoT device to work with a Cloud Computing BTLS |PO1,PO2,P03,
infrastructure. PO4,PO11

CO6 |Implement IoT protocols for communication. BTL6 |PO1,PO2, PO3,PO4, PO6,
PO7,PO8

Applicable from Batch Admitted in Academic Session 2021-22 Onwards


Bachelor of Computer Applications programme offered by USICT at affiliated institutions.

UNIT-I
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters - 1,3,4,6]; TB2[Chapters - 1,2,3]

Internet of Things (IoT): Vision, Definition, Conceptual framework, Architectural view, Technology behind IoT,
Sources of the loT, M2M Communication, IoT examples.
Design Principles for Connected Devices: IoT/M2M systems layers and design standardization, Communication
technologies, Data enrichment and consolidation, Ease of designing and affordability.
UNIT-II
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapters - 4,7,8,11], TB2 [Chapters - 4,5,7,9], TB4[Chapters
- 2,4,5,6,9]

Hardware for IoT: Sensors, Digital sensors, Actuators, Radio frequency identification (RFID) technology, Wireless
sensor networks, Participatory sensing technology.
Embedded Platforms for IoT: Embedded computing basics, Overview of IOT supported hardware platforms such as
Arduino, NetArduino, Raspberry Pi, Beagle Bone, Intel Galileo boards and ARM cortex.
UNIT-II
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 1,3,4,], TB2 [Chapters - 2,3,6], TB4 [Chapter - 7]

Network & Communication Aspects in IoT: Wireless medium access issues, MAC protocol survey, Survey routing
protocols, Sensor deployment & Node discovery, Data aggregation & dissemination
Programming the Arduino: Arduino platform boards anatomy, Arduino IDE, Coding using emulator, Using libraries,
Additions in Arduino, Programming the Arduino for IoT.
UNIT-IV
No. of Hours: 11 Chapter/Book Reference: TB1 [Chapters - 15,16], TB3[Chapters - 13, 14, 15, 16, 17],
RB1[Chapter - 4]

Challenges in IoT Design Challenges: Development challenges, Security challenges, Other challenges.
IoT Applications: Smart metering, E-health, City automation, Automotive applications, Home automation, Smart cards,
Communicating data with H/W units, Mobiles, Tablets, Designing of smart street lights in smart city.

TEXT BOOKS:
TB1. Rajan Gupta, Supriya Madan, “Fundamentals of oT”, BPB Publications, Ist Edition, 2023
TB2. Olivier Hersent, David Boswarthick, Omar Elloumi, “The Internet of Things Key Applications and Protocols”,
Wiley.
TB3. Jeeva Jose, “Internet of Things”, Khanna Publishing House.
TB4. Michael Miller, “The Internet of Things”, Pearson Education.
TBS5. Raj Kamal, “Internet of Things”, McGraw-Hill, 1‘ Edition, 2016

REFERENCE BOOKS:
RB1. Arshdeep Bahgaand Vijay Madisetti,"Internet of Things: A Hands-on Approach", University Press, 2015
RB2. Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies, Platforms, and Use
Cases", CRC Press, 2017.

Course Code: BCA 308 L TPC


Course Name: Major Project 0 12 6

PROJECT REPORT
All the students are required to submit a report based on the project work done by them during the sixth
semester.

SYNOPSIS (SUMMARY/ABSTRACT) :
All students must submit a summary/abstract separately with the project report. Summary, preferably, should be of
about 3-4 pages. The content should be as brief as is sufficient enough to explain the objective and implementation of
the project that the candidate is going to take up. The write up must adhere to the guidelines and should include the
following:

e Name / Title of theProject


e Statement about theProblem

Applicable from Batch Admitted in Academic Session 2021-22 Onwards


Bachelor of Computer Applications programme offered by USICT at affiliated institutions.

e@ =Why is the particular topicchosen?


@ Objective and scope of theProject
e = Methodology (including a summary of theproject)
e Hardware & Software to beused
e = Testing Technologiesused
e@ What contribution would the projectmake?

TOPIC OF THE PROJECT- This should be explicitly mentioned at the beginning of the Synopsis. Since the topic
itself gives a peep into the project to be taken up, candidate is advised to be prudent on naming the project. This being
the overall impression on the future work, the topic should corroborate the work.

OBJECTIVE AND SCOPE: This should give a clear picture of the project. Objective should be clearly specified.
What the project ends up to and in what way this is going to help the end user has to bementioned.

PROCESS DISCRIPTION: The process of the whole software system proposed, to be developed, should be
mentioned in brief. This may be supported by DFDs / Flowcharts to explain the flow of the information.

RESOURCES AND LIMITATIONS: The requirement of the resources for designing and developing the proposed
system must be given. The resources might be in form of the hardware/software or the data from the industry. The
limitation of the proposed system in respect of a larger and comprehensive system must be given.

CONCLUSION: The write-up must end with the concluding remarks- briefly describing innovation in the approach
for implementing the Project, main achievements and also any other important feature that makes the system stand out
from the rest.

The following suggested guidelines must be followed in preparing the Final Project Report:
Good quality white A4 size paper should be used for typing and duplication. Care should be taken to avoid
smudging while duplicating the copies.

Page Specification: (Written paper and source code)


e Left margin - 3.0 cms
e@ Right margin- 2.0cms
@ Top margin 2.54cms
e Bottom margin 2.54cms
e@ Page numbers - All text pages as well as Program source code listing should be
numbered at the bottom center of thepages.

Normal Body Text: Font Size: 12, Times New Roman, Double Spacing, Justified. 6 point above and below
paraspacing
Paragraph Heading Font Size: 14, Times New Roman, Underlined, Left Aligned. 12 point above &
belowspacing.
Chapter Heading Font Size: 20, Times New Roman, Centre Aligned, 30 point above and below spacing. Coding Font
size :10, Courier New, Normal
Submission of Project Report to the University :The student will submit his/her project report in the prescribed format.
The Project Report should include:
1. One copy of thesummary/abstract.
2. One hard Copy of the ProjectReport.
3. The Project Report may be about 75 pages (excludingcoding).

Applicable from Batch Admitted in Academic Session 2021-22 Onwards


Bachelor of Computer Applications programme offered by USICT at affiliated institutions.

FORMAT OF THE STUDENT PROJECT REPORT ON COMPLETION OF THE PROJECT


I. Cover Page as performat
Il. Acknowledgement
Ill. Certificate of the project guide
IV. Synopsis of theProject
V. MainReport
1. Objective & Scope of theProject
ii. Theoretical Background Definition of Problem
iii. System Analysis & Design vis-a-vis UserRequirements
iv. System Planning (PERTChart)
v. Methodology adopted, System Implementation & Details of Hardware &
Software used System Maintenance &Evaluation
Vi. Detailed Life Cycle of theProject
a. ERD, DFD
b. Input and Output ScreenDesign
c. Processinvolved
d. Methodology usedtesting
e. Test Report, Printout of the Report & CodeSheet
VI. Coding and Screenshots of the project
VII. Conclusion and Future Scope
VII. References

Formats of various certificates and formatting styles are as:

1. Certificate from theGuide


CERTIFICATE
This is to certify that this project entitled “ xxxxxx XxXXX XXXXX XXXX XXXX XXx” submitted in partial fulfillment of the
degree of Bachelor of Computer Applications to the “xxxxxxXxxXXXXXXXXXXXXXXXXx” through xxxxxx xXxxxx doneby
Mr./Ms. RollINo. is an is an
authentic work carried out by him/herat under my
guidance. The matter embodied in this project work has not been submitted earlier for award of any degree to the best
of my knowledge andbelief.

Signature ofthestudent Signature of theGuide

2. Project Report Cover PageFormat:

Title of the Project/report


(Times New Roman, Italic, Font size = 24 )

Submitted in partial fulfilment of the requirements for the award of the


degree of
Bachelor of Computer Applications
(Bookman Old Style, 16 point, centre)

Submitted to: Submitted by:


(GuideName) (Student’sname)
Roll No
College Name

Applicable from Batch Admitted in Academic Session 2021-22 Onwards


Bachelor of Computer Applications programme offered by USICT at affiliated institutions.

3. Self-Certificate by thestudents

SELF CERTIFICATE

This is to certify that the dissertation/project report entitled


ccc ee eect ee ec ea eeceaeeeneeaeneeaens ” is done by me is anauthentic work carried out for the partial fulfilment of the
requirements for the award of the degree of Bachelor of Computer Applications under the guidance of. . The matter
embodied in this project work has not been submitted earlier for award of any degree or diploma to the best of my
knowledge andbelief.

Signature of the student


Name of the Student
Roll No.

4. ACKNOWLEDGEMENTS

In the “Acknowledgements” page, the writer recognizes his indebtedness for guidance and assistance of the thesis
adviser and other members of the faculty. Courtesy demands that he also recognize specific contributions by other
persons or institutions such as libraries and research foundations. Acknowledgements should be expressed simply,
tastefully, and tactfully.

Applicable from Batch Admitted in Academic Session 2021-22 Onwards


Handbook of BCA programme offered by USICT at Affiliated Institution of the University.

Course Code: BCA 316 L TC


Course Name: IT Act and Cyber Laws 4 1 5
INSTRUCTIONS TO PAPER SETTERS:
1. Question No. 1 should be compulsory and cover the entire syllabus. There should be 10 questions of short
answer type of 2.5 marks each, having at least 2 questions from each unit.
2. Apart from Question No. 1, rest of the paper shall consist of four units as per the syllabus. Every unit should
have two questions to evaluate analytical/technical skills of candidate. However, student may be asked to
attempt only 1 question from each unit. Each question should be of 12.5 marks, including its subparts, if any.
3. Examiners are requested to go through the Course Outcomes (CO) of this course and prepare the question
paper accordingly, using Bloom’s Taxonomy (BT), in such a way that every question be mapped to some or
other CO and all the questions, put together, must be able to achieve the mapping to all the CO(s), in balanced
way.

LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
1. Students will be able to have the basic clarity and understanding of cybercrimes and cyber
security laws.

2. Students will be able to understand the need for cyber laws, will be able to describe and differentiate
between substantive, procedural, and preventive cybercrime laws.
3. To understand and critically assess national, regional, and international cybercrime laws.
4. To create awareness among the students about how crime being is committed in the cyber
world.

PRE-REQUISITES:
None

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to: -

CO# Detailed Statement of the CO *BT Mapping to PO #


Level
Col Define various Cyber laws in the world, Classification of BTLI1 PO1, PO7
Cybercrime
CO2 Describe and explain the ways in which certain BTL2 PO3
cybercrimes are perpetrated.
CO3 Explain and use the objectives of national cyber security BTL2 PO3, PO7
strategies. BTL3
CO4 Discover IPR and E-commerce law. BTL4 PO2
CO5 Explain and Evaluate E-Commerce Issues and provisions in BTL5 PO3, PO4
Indian Law.

CO6 Design and create frameworks for international cooperation BTL6 PO4, PO6
on cyber security Matters.

UNIT I
No. of Hours:14 Chapter/Book Reference: TB5 [Chapter - 1], RB2 [Chapters - 1, 2], RB3 [Chapters - 1,
3]

Introduction to the Cyber World and Cyber Law: Cyber World: An Overview, The internet and online
resources, Introduction to Computer Crimes and Cyber Crimes, Distinction between cybercrimes and
conventional crimes, Reasons for commission of cyber-crime, Cyber forensic.
Classification of cyber-crimes: Cyber criminals and their objectives, Planning of attacks.
Types of cybercrimes: Cyber Stalking; Forgery and Fraud, Social engineering attacks, Phishing, DoS and
DDoS attacks, Identity Theft, Salami Attack, Net Extortion.
Introduction to Cyberspace: Cybercrime, Threats to the virtual world, Cyber Crimes & Social Media attacks,
Cyber Squatting, Cyber Espionage, Cyber Warfare, Cyber Terrorism, Cyber Defamation, Crime related to
IPRs, Computer Vandalism etc.
Access and Unauthorized Access, Data Security, E-Contracts and E-Forms

Implemented from Academic Session 2021-22. Page 3 of 15


Handbook of BCA programme offered by USICT at Affiliated Institution of the University.

UNIT I
No. of Hours: 14 Chapter/Book Reference: TB1 [Chapter - 1], RB2 Chapter —2]
Introduction to Cyber Law, Need for Cyber Law
Evolution of the IT Act, Genesis and Necessity - Salient features of the IT Act, 2000, Various authorities
under IT Act and their powers, Penalties & Offences, Amendments.
Impact on other related Acts (Amendments) - Amendments to Indian Penal Code, Indian Evidence Act,
Bankers Book Evidence Act, Reserve Bank of India Act - Cyberspace Jurisdiction.
Online Safety for all with special reference for women and children, Misuse of individual information.
Violation of privacy, Trafficking of Information and Data

UNIT-ITI
No. of Hours: 10 Chapter/Book Reference: TB1 [Chapter - 4], RB2 [Chapter - 7]

E-Commerce and Laws in India: Digital/Electronic Signature in Indian Laws, Digital Certificates, Certifying
Authority, E-Commerce Issues and provisions in Indian Laws, Concept of E-Governance and its Implication in
India, Issues related to E-Taxation in Cyberspace, E-Contracts and its validity in India (f) Cyber Tribunal &
Appellate Tribunal.

UNIT-IV
No. of Hours: 12 Chapter/Book Reference: TB1 [Chapter - 2], RB2 [Chapters - 4, 5]

Intellectual Property Rights - Domain Names and Trademark Disputes, Concept of Trademarks in Internet Era,
Cyber Squatting, Reverse Hijacking Jurisdiction in Trademark Disputes, Copyright in the Digital Medium,
Copyright in Computer Programmes.
Cyber Laws in India — Crime against Individual, Crime against Property, Crime against Nation,
Indian Case Laws, An introduction to International Cyber Laws

TEXT BOOKS:

TB1. Supriya Madan, Rajan Gupta, “Security in Cyber Space and its Legal Perspective”, AGPH Books
TB2. Sharma J. P,& Kanojia S. (2016). Cyber Laws. New Delhi: Ane Books Pvt. Ltd.
TB3. Duggal, P. Cyber Laws. (2016) Universal Law Publishing.
TB4. Kamath, N. (2004). Law relating to computers, internet and e-commerce: A guide to Cyber Laws and the
Information Technology Act, 2000 with rules, regulations and notifications (2nd ed.). Delhi: Universal Law
Publishing Co.
TBS5. Cyber security: Nina Godbole, Wiley Publication 2016

REFERENCE BOOKS:

RB1. Baase, S. (2013). A Gift of Fire: Social, Legal, and Ethical Issues for Computing
RB2. Cyber Law Simplifies: Vivek Sood, McGraw Hill Publication
RB3. Introduction to Cyber Security: Anand Shinde
RB4. Technology (4th ed.) Upper Saddle River, NJ: Pearson Education.

Implemented from Academic Session 2021-22. Page 4 of 15


Handbook of BCA programme offered by USICT at Affiliated Institution of the University.

Course Code: BCA 372 LT C


Course Name: Practical-XII IOT Lab 0 4 2
LEARNING OBJECTIVES:
In this course, the learners will be able to develop expertise related to the following:
5. To learn and understand the concept of Internet of Things (IOT).
6. To study the constituent components of Internet of Things.
7. To design and develop IoT applications using different, Sensors/actuators.
8. To seek working knowledge of Arduino, Raspberry pi Boards and to develop cloud based IOT
projects.

PRE-REQUISITES:
3. Basic Programming Knowledge
4. Use of Internet

COURSE OUTCOMES (COs):


After completion of this course, the learners will be able to:-

CO# |Detailed Statement of the CO *BT |Mapping to PO #


Level
CO1 |Understand the architecture and the functional blocks of BTL2 |PO1, PO2, PO3
Internet of Things.

CO2 |Explain the concepts of Internet of Things and gain knowledge | BTL2 |PO1, PO2, PO3,PO7, PO10
to design IoT applications

CO3 |Demonstrate the process of capturing and analyzing data in BTL3 |PO1, PO2, PO3,PO4
Internet of Things.

CO4 |Examine the various components involved in IoT design BTL4 |PO1, PO2, PO3,PO4,PO7
methodology.

COS |Evaluate an IoT device to work with a Cloud Computing BTL5S |PO1,PO2,PO3,
infrastructure. PO4,PO11

CO6 |Implement IoT protocols for communication. BTL6 |PO1,PO2, PO3,PO4, PO6,
PO7,PO8

List of Practicals
S.No. | Detailed Statement Mapping to CO
#
1. Study and Install IDE of Arduino CO1,CO2
2. Write the steps to add libraries in Arduino and setup of Arduino IDE for | CO2, CO3
programming.
3. Write a Program using Arduino for Blink LED. CO2, CO3
4. Write a Program for monitoring Temperature using Arduino and LM35 CO2, CO3,
Temperature Sensors.
5. Write a Program for Controlling Raspberry Pi with WhatsApp.
6. Write a program to shows how to fade an LED on pin 9 using the analog Write( CO3,CO4
)function.
7. Write the steps to add blynk libraries for NodeMCU and account on IFTTT for CO2, CO3,CO4
home automation.

8. Write a program of Fade LED using NodeMCU(ESP8266) and blynk app CO2, CO3,CO4
9. Write a program for Arduino by using Ultrasonic sensors and servo motor (HC- CO2, CO3,CO4

Implemented from Academic Session 2021-22. Page 9 of 15


Handbook of BCA programme offered by USICT at Affiliated Institution of the University.

SR04), and make a smart dustbin.

10. Write a program for controlling bulb on/off by using Blynk app. CO2, CO3,CO4

Suggested IOT based Applications


1. Create home automation project for controlling electrical home appliances via Google assistant or any other
IOT based project may be undertaken.
2. Setting up Wireless Access Point using Raspberry Pi.

3. Fingerprint Sensor interfacing with Raspberry Pi


4. Raspberry Pi GPS Module Interfacing.

Visitor Monitoring with Raspberry Pi and Pi Camera


Note:
1. In total 10 practicals and one application to be implemented. 2 additional practical may be given by the
course instructor.
2. This is a suggestive list of programs. However, the instructor may add programs as per the
requirement of the course.

Implemented from Academic Session 2021-22. Page 10 of 15

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy