View
1
Download
0
Category
Preview:
Citation preview
Entrepreneurship Development
Rationale:
Globalization, liberalization & privatization along with revolution in Information
Technology, have thrown up new opportunities that are transforming lives of the masses. Talented
and enterprising personalities are exploring such opportunities & translating opportunities into
business ventures such as- BPO, Contract Manufacturing, Trading, Service sectors etc. The
student community also needs to explore the emerging opportunities. It is therefore necessary to
inculcate the entrepreneurial values during their educational tenure. This will help the younger
generation in changing their attitude and take the challenging growth oriented tasks instead of
waiting for white- collar jobs. The educational institutions should also demonstrate their
uniqueness in the creation of enterprising personalities in their colleges. This subject will help in
developing the awareness and interest in entrepreneurship and create employment for others.
Objectives: The student will be able to:
1) Identify entrepreneurship opportunity.
2) Acquire entrepreneurial values and attitude.
3) Use the information to prepare project report for business venture.
4) Develop awareness about enterprise management.
Programme Code : CO
Course Code : MG11509 Course Title : Entrepreneurship Development
Compulsory/Optional : Optional
Credits Duration of Written
Examination Examination Scheme
TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL
4 - 4 4 3 hrs 2 Tests of 1
Hour each 80 20 - - - 100
( * ) indicates assessment by Internal and External examiners
Topic
No
Contents Hours Marks
SECTION-I 32 40
01 Entrepreneurship, Creativity & Opportunities
1.1) Concept, Classification & Characteristics of Entrepreneur
1.2) Creativity and Risk taking.
1.2.1) Concept of Creativity & Qualities of Creative person.
1.2.2) Risk Situation, Types of risk & risk takers.
1.3) Business Reforms.
1.3.1) Process of Liberalization.
1.3.2) Reform Policies.
1.3.3) Impact of Liberalization.
1.3.4) Emerging high growth areas.
1.4) Business Idea Methods and techniques to generate business
idea.
1.5) Transforming Ideas in to opportunities transformation
involves Assessment of idea &Feasibility of opportunity
SWOT Analysis
14 16
02 Information And Support Systems
2.1) Information Needed and Their Sources.
Information related to project, Information related to support
system,
Information related to procedures and formalities
2.2) SUPPORT SYSTEMS
1) Small Scale Business Planning, Requirements.
2) Govt. & Institutional Agencies, Formalities
3) Statutory Requirements and Agencies.
10 14
03 Market Assessment
3.1) Marketing -Concept and Importance
3.2) Market Identification, Survey Key components
3.3) Market Assessment
08 10
Topic
No
Contents Hours Marks
SECTION-II 32 40
04
Business Finance & Accounts
Business Finance
4.1) Cost of Project
1) Sources of Finance
2) Assessment of working capital
3) Product costing
4) Profitability
5) Break Even Analysis
6) Financial Ratios and Significance
Business Account
4.2) Accounting Principles, Methodology
1) Book Keeping
2) Financial Statements
3) Concept of Audit
12 16
05 Business Plan & Project Report 5.1)Business plan steps involved from concept to
commissioning: Activity Recourses, Time, Cost
5.2) Project Report
1) Meaning and Importance
2) Components of project report/profile (Give list)
5.3) Project Appraisal
1) Meaning and definition
2) Technical, Economic feasibility
3) Cost benefit Analysis
10 12
06 Enterprise Management And Modern Trends
6.1 Enterprise Management:
a. Essential roles of Entrepreneur in managing enterprise
b. Product Cycle: Concept and importance
c. Probable Causes Of Sickness
d. Quality Assurance
Importance of Quality, Importance of testing
6.2) E-Commerce
Concept and process
6.3) Global Entrepreneur
10 12
Sr. No Assignments
1 Assess yourself-are you are entrepreneur?
2 Prepare project report and study its feasibility
Learning Resources:
1) Reference Books:
Sr. No. Title Author Publisher
01 Entrepreneurship
Theory and Practice
J.S. Saini
B.S.Rathore
Wheeler Publisher
New Delhi
03 Entrepreneurship
Development
E. Gorden
K.Natrajan
Himalaya Publishing.
Mumbai
04 Entrepreneurship
Development
Preferred by
Colombo plan staff
college for
Technical education.
Tata Mc Graw Hill Publishing
co. ltd. New Delhi.
05 A Manual on How to
Prepare a Project Report
J.B.Patel
D.G.Allampally EDI STUDY MATERIAL
Ahmadabad (Near Village Bhat ,
Via Ahmadabad Airport & Indira
Bridge), P.O. Bhat 382428 ,
Gujrat,India
P.H. (079) 3969163, 3969153
E-mail :
ediindia@sancharnet.in/olpe@edi
india.org
Website :
http://www.ediindia.org
07
National Derectory of
Entrepreneur Motivator
& Resource Persons.
S.B.Sareen
H. Anil Kumar
08
New Initiatives in
Entrepreneurship
Education & Training
Gautam Jain
Debmuni Gupta
09 A Handbook of New
Enterpreneurs P.C.Jain
10
Evaluation of
Enterpreneurship
Development
Programmes
D.N.Awasthi , Jose
Sebeastian
Academic Coordinator Head of Department Principal
(Computer Engineering) Govt. polytechnic Mumbai
Software Project Management
Rationale:-
The At the end of the course, the student should get familiarize with the characteristics of a project,
project management principles, risk in environment and the management challenges for effective project
management. The student will be able to understand and use the project management principles across all
phases of a project. They will be able to demonstrate competency in the management of a project plan,
especially in monitor and controlling a project schedule and budget, tracking project progress. They will
understand how to work as team member and as individual
without affecting the quality of project. The student should be able to coordinate the close out of a project
contract. They will share best practices and tools related to project management
Objectives: - Students will be able to-
1. Define and highlight importance of software project management.
2. Describe the software project management activities
3. Write a Software Requirements Specification document (SRS)
3. To discuss project planning and the planning process
4.To show how graphical schedule representations are used by project management
5. To discuss the notion of risks and the risk management process
6. Become a member of a development of software project Management Group.
Programme Code : CO
Course Code : MG11509 Course Title : Software Project Management
Compulsory/Optional : Optional
Teaching Scheme and Credits Duration of Written
Examination Examination Scheme
TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL
4 - - 4 3 hrs 2 Tests of 1
Hour each 80 20 - - - 100
( * ) indicates assessment by Internal and External examiners
Topic No Contents Hours Marks
SECTION-I 32 40
1.0 Introduction
1. What is project?
2. What is project Management
3. The role of project Manager
4. The project Management Profession
5. Project life cycle
10 14
2.0
Software Project Management 1. A system view of project management
2. Understanding organizations
3. Stakeholder management
4. Project phases and the project life cycle
5. The context of software projects
10 14
3.0 Software Project Management Tools
1. project planning tools
2. General purpose project planning tools
3. Process modeling tools
4. Estimating Tools.
5. project risk analysis tools
6. project reporting tools
7. process support tools
12 12
4.0 Software Project Management Plan
1..Developing the project schedule- Sequencing and Scheduling
Activities
2. Network Planning Models – Forward Pass – Backward Pass –
Activity Float
3. Developing the project budget
4. Finalizing the project schedule and budget
5. Monitoring and controlling the project
6. The project communications plan
Topic No Contents Hours Marks
SECTION-II 32 40
5.0 The importance of project risk management
1 Risk management planning
2. Common sources of risk on information technology projects
3. Risk identification
4. Qualitative risk analysis
5. Quantitative risk analysis
6. Risk response planning
7. Risk monitoring and control
8. Using software to assist in project risk management
6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A
Background –
2.Selecting The Right Person For The Job – Instruction In The Best
Methods – Motivation
3.The Oldman – Hackman Job Characteristics Model – Working In
Groups – Becoming
4.A Team –Decision Making – Leadership – Organizational 5.Structures
– Stress –Health And Safety – Case Studies.
7.0 Leadership & Ethics in Projects
1. Project leadership
2. Ethics in projects
3. Multicultural projects.
14 18
8.0 Project implementation & Closure
1. Project implementation
2. Administrative closure
3. Project evaluation
Reference Books:
Sr.
No.
Book Title Author Publication
1 Software Project Management Bob Hughes, Mikecotterell Tata McGraw Hill, 2004.
2
Information Technology Project
mgt providing measurable
organizational value
Jack Marchewka Wiley India.
3 Applied software project
management
Stellman & Greene SPD
4 Software Engineering Project
Management
Richard Thayer, Edward
Yourdon
WILEY INDIA
5 Software Project Management Jalote Pearson Education, 2002
Websites:
1. http://books.google.co.in/books/about/Information_technology_project_managemen.html
Academic Co-ordinator Head of Department Principal
(Computer Engineering) Government polytechnic Mumbai
Software Testing
Rationale:
This subject will introduce you to basics of software testing, teaching you not just the
fundamental technical skills but also the supporting skills necessary to become a successful
software tester. You will learn how to immediately find problems in any computer program, how
to plan an effective test approach, how to clearly report your finding and how to tell when your
software is ready for release.
Objectives: The student will be able to:
1. Understand the impact of software bugs and importance of software testing
2. Develop the skills necessary to find bugs in any types of software.
3. Learn how to effectively plan your tests, communicate the bugs you find, and measure your
success as a software tester.
4. Use your new testing skills to test not just the software, but also the product specification the
raw code, and even the user’s manual
5. Learn how to test software for compatibility, usability and cultural issues.
6. Discover how to improve your testing efficiency by automating your tests.
Programme Code : CO
Course Code : CO 11 312 Course Title : Software Testing
Compulsory/Optional : Compulsory
Credits Duration of Written
Examination Examination Scheme
TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL
3 - 2 5 3
hrs
2 Tests of 1
Hour each 80 20 - 50* - 150
( * ) indicates assessment by Internal and External examiners
Topic
No
Contents Hours Marks
SECTION-I 24 40
01 Purpose of Testing
1.1 Software Testing concept
1.2 Software Bug
1.2,1 A Formal Definition
1.2.2 Why does Bug occur?
1.2.3 cost of bugs
1.3 software tester responsibilities
1.4 The Realities of Software Testing
1.5.1 Software Testing terms and definition
Precision and accuracy,
verification and validation
Quality Assurance and quality control
04 08
02 Testing Fundamentals
2.1 Black-Box and white-box Testing
2.2 Static and Dynamic Testing
2.3 Static Black Box Testing
2.3.1 Performing a Review of the Specification
Pretend to be a customer
Research Existing Standards and guidelines
Review and test similar software
2.4 Dynamic Black-Box Testing
2.4 1 Testing the software While Blindfolded
2.4.2 Test-to-pass and Test-to-fail
2.4.3 Equivalences Partitioning
2.5 Data Testing
2.5.1 Boundary Condition, Sub-Boundary Conditions, default,
empty, blank, Null, Zero and None, Invalid, Wrong,
Incorrect and garbage data.
2.6 State Testing
2.6.1 Testing Software ‘s Logic Flow
2.6.2 Testing States to Fail.
08 12
03 Examining the Code
3.1 Static White Box Testing
3.2 Examining the design and code
3.2.1 Formal Review
Peer Review, Walkthroughs, Inspections.
3.2.2 Generic Code Review Checklist
Data Reference Errors, Data Declaration Errors,
Computation Errors, Comparison Error, Control Flow
Errors, Subroutine Parameter Errors, Input/output Errors,
and Other checks.
3.3 Dynamic White Box Testing
3.4 Dynamic white box testing versus debugging,
3.5 Unit and Integration Testing
3.6 Data Coverage
3.6.1 Data Flow, Sub-Boundaries, Formula and Equations, Error
Forcing.
3.7 Code Coverage
3.7.1 Program Statements and Line Coverage, Branch Coverage,
08 12
Condition Coverage.
04 Applying Your Testing Skills
Configuration Testing
4.1 An Overview of Configuration Testing
4.1.1 Isolating Configuration Bugs, Sizing up the job.
Compatibility Testing
4.3 Compatibility Testing Overview
4.3.1 Platform and Application Versions
4.3.2 Backward and forward compatibility
4.3.3 Impact of testing multiple versions.
04 08
Topic
No
Contents Hours Marks
SECTION-II 24 40
05 Usability Testing
5.1 What makes a Good UI?
5.1.1 Follows standards or Guidelines, Intuitive, Consistent,
Flexible, Comfortable, Correct, Useful.
5.2Accessibility Testing
5.3 Web Page Fundamentals
5.4 Black-Box Testing
5.4.1 Text, Hyperlinks, graphics, forms, object
5.5 Gray Box Testing, White Box Testing, Configuration and
Compatibility testing, Usability Testing, Introducing Automation
06 10
06 Supplementing Your Testing
6.1 The benefits of automation and tools
6.2 Test tools
6.2.1 Viewers and Monitors, Drivers, Stubs, Stress and load tools,
Interference injectors and noise generators, analysis tools.
6.3 Software Test Automation
6.3.1 Macro Recording and playback, programmed macros, Fully
Programmable Automated Testing Tools
6.4 alpha and beta testing
08 14
07 Working With Test documentation
7.1 Goal of the test planning
7.2 Test planning topics
7.2.1 what will and won’t be tested , test phases , test strategy ,
resource requirements , tester assignments , test schedule , test
cases , bug reporting , Metrics and statistics , Risk and Issues.
7.3 The goal of test case Planning
7.3.1Test case planning overview
7.2 Test design, test cases, test procedures, test case organization &
tracking.
7.3 Getting bugs fixed, isolating & reproducing bugs
7.4 Bug’s life cycle
10 16
List of Practical’s:-
Sr.No. Title of Practical
1 Introduction To Software Testing Concepts.
2 Case Study: - Study any system specification and report bugs.
3 Write Test Cases For any Application (e.g. Railway Reservation Form).
4 Display “Hello World” using AutoIT.
5 Create any GUI Application e.g. Calculator.
6 Automate Notepad Application using AutoIT.
7 Automate any installation procedure (e.g. WinZip).
8
Automate Microsoft Word Application.
1) Open Microsoft Word
2) Type text (automatically)
3) Generate random file name.
4) Save files and closes Microsoft Word.
9 Testing Web Site using QTP.
10 Software Testing overview
All above Practical may be performed on Windows or Linux Platform, using the tools
mention below:
Sr.No Testing Tools Type of Tool
1 AutoIT Free Ware
2 Ruby Free Ware
3 Water Free Ware
4 Sahi Free Ware
5 Bugzilla Licensed Software
6 Test Track Licensed Software
Reference Books:
Web Site References:
1. www.autoitv3.com
2. www.selenium.com
Academic Coordinator Head of Department Principal
(Computer Engineering) Govt. polytechnic Mumbai
Sr. No. Title Author Publication
1 Software Testing Ron Patton
SAMS Techmedia
2 Software Testing : Principals
and Practical Srinivasan Desikan
Gopalaswamy Ramesh
Pearson Education
MySQL
Rationale:
A relational database management system (RDBMS) is an essential tool in many
environments, from traditional uses in business, research, and educational contexts, to
applications such as powering search engines on the Internet. MySQL is portable and runs on
commercial operating systems (such as Mac OS X, HP-UX, and Windows) and on hardware all
the way up to enterprise servers. Furthermore, its performance rivals any database system you
care to put up against it, and it can handle large databases with billions of rows. In the business
world, MySQL’s presence continues to increase as companies discover it to be capable of
handling their database needs at a fraction of what they are used to paying for commercial
licensing and support.
Objectives: The student will be able to:
1) Develop the skills to design database system.
2) Establish entity/relationship.
3) Understand the concept of Database system and Client Server Architecture
4) Understand and develop the concepts of Data Modeling, Security and Integrity.
5) Understand and execute different SQL queries using MySQL.
6) Understand the concept of query optimization in MySQL.
Programme Code : CO
Course Code : CO11416 Course Title : MySQL
Compulsory/Optional : Optional
Credits Duration of Written
Examination Examination Scheme
TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL
3 - 4 7 - - - - 50* - 50* 100
( * ) indicates assessment by Internal and External examiners
Topic
No
Contents Hours Marks
SECTION-I 24 NA
01 Introduction to MySQL
1.1 Basic Database Terminology
1.1.1 Structural Terminology
1.1.2 Query Language Terminology
1.1.3 MySQL Architectural Terminology
1.2 Establishing and Terminating Connections to the MySQL
Server
1.3.MySQL Data Types
1.3 Working with MySQL database
1.3.1 Executing SQL Statements
1.3.2 Creating a Database
1.3.3 Creating Tables
1.3.4 Adding New Rows
1.3.5 Resetting the sampdb Database to a Known State.
1.3.6 Retrieving Information
1.3.7 Deleting or Updating Existing Rows
1.4 Tips for Interacting with mysql
1.4.1 Simplifying the Connection Process
1.4.2 Issuing Statements with Less Typing
06
02 Use of MySQL to manage data
2.1 The Server SQL Mode
2.2 MySQL Identifier Syntax and Naming Rules
2.3 Case Sensitivity in SQL Statements
2.4 Character Set Support
2.5 Selecting, Creating, Dropping, and Altering Databases
2.6 Creating, Dropping, Indexing, and Altering Tables
2.7 Obtaining Database Metadata
2.7.1 Obtaining Metadata with SHOW
2.7.2 Obtaining Metadata with INFORMATION_SCHEMA
2.7.3 Obtaining Metadata from the Command Line
2.8 Performing Multiple-Table Retrievals with Joins
2.8.1 The Inner Join
2.8.2 Qualifying References to Columns from Joined Tables
2.8.3 Left and Right (Outer) Joins
2.9 Performing Multiple-Table Retrievals with Subqueries
2.10 Performing Multiple-Table Retrievals with UNION
2.11 Using Views
2.12 Multiple-Table Deletes and Updates
2.13 Performing Transactions
2.13.1 Using Transactions to Ensure Safe Statement
Execution
2.13.2 Using Transaction Savepoints
2.13.3 Transaction Isolation
2.13.4 Non-Transactional Approaches to Transactional
Problems
2.14 Foreign Keys and Referential Integrity
2.14.1 Creating and Using Foreign Keys
2.14.2 Living Without Foreign Keys
10
03 Stored Programs
3.1 Compound Statements and Statement Delimiters
3.2 Stored Functions and Procedures
3.2.1 Privileges for Stored Functions and Procedures
3.2.2 Stored Procedure Parameter Types
3.3 Triggers
3.4 Events
3.5 Security for Stored Programs and Views
06
04 Query Optimization
4.1 The MySQL Query Optimizer
4.2.1 How the Optimizer Works
4.2.2 Using EXPLAIN to Check Optimizer Operation
4.2 Choosing Data Types for Efficient Queries
4.3 Loading Data Efficiently
4.4 Scheduling and Locking Issues
4.4.1 Changing Statement Scheduling Priorities
4.4.2 Using Delayed Inserts
4.4.3 Using Concurrent Inserts
4.4.4 Locking Levels and Concurrency
04
Topic
No
Contents Hours Marks
SECTION-II 24 NA
05 Introduction to MySQL Administration
5.1 MySQL Components
5.2 General MySQL Administration
5.3 Access Control and Security
5.4 Database Maintenance, Backups, and Replication
4
06 MySQL data directory
6.1 Location of the Data Directory
6.2 Structure of the Data Directory
6.2.1 How the MySQL Server Provides Access to Data
6.2.2 Representation of Databases in the Filesystem
6.2.3 Representation of Tables in the Filesystem
6.2.4 Representation of Views and Triggers in the Filesystem
6.2.5 How SQL Statements Map onto Table File Operations
6.2.6 Operating System Constraints on Database Object Names
6.2.7 Factors That Affect Maximum Table Size
6.2.8 Implications of Data Directory Structure for System
Performance
6.2.9 MySQL Status and Log Files
6.3 Relocating Data Directory Contents
6.3.1 Relocation Methods
6.3.2 Relocation Precautions
6.3.3 Assessing the Effect of Relocation
6.3.4 Relocating the Entire Data Directory
6.3.5 Relocating Individual Databases
6.3.6 Relocating Individual Tables
6.3.7 Relocating the InnoDB Shared Tablespace
6.3.8 Relocating Status and Log Files
8
07 Access control and Security
7.1 Internal Security: Preventing Unauthorized Filesystem Access
7.1.1 How to Steal Data
7.1.2 Securing Your MySQL Installation
7.2 External Security: Preventing Unauthorized Network Access
7.2.1 Structure and Contents of the MySQL Grant Tables
7.2.2 How the Server Controls Client Access
7.2.3 A Privilege Puzzle
7.2.4 Grant Table Risks to Avoid
7.3 Setting Up Secure Connections
4
08 Database Maintenance ,Backups
8.1 Principals of preventive maintenance
8.2 Performing Database Maintenance with the Server Running
8.2.1 Locking Individual Tables for Read-Only or Read/Write
Access
8.2.2 Locking All Databases for Read-Only Access
8.3 General Preventative Maintenance
8.3.1 Using the Server’s Auto-Recovery Capabilities
8.3.2 Scheduling Preventive Maintenance
8.4 Making Database Backups
8.4.1 Making Text Backups with mysqldump
8
List of Practical’s:- Using MySQL:
Sr.No. Title of Experiment
1 Implementing all DDL statements
2 Implementing all DML statements.
3 Implementation of all string & Date related functions.
4 Implementation of aggregate functions such as sum, avg, min, max, count.
5 Applying constraints such as primary key, not null, foreign key, check, default.
6 Execute the queries containing Where, Group by & Having and Order by Clauses.
7 Selecting the records using set operators such as union, union all, Intersect, minus.
8 Selection records with nested query.
9 Implementation of All Types of Joins.
10 Creating views.
11 Implementation of commit, savepoint, rollback
12 Create Cursors.
13 Create, execute & modify stored procedure.
14 Create Triggers.
15 Implementation of All Indexes.
16 Implement the backup procedure for database.
8.4.2 Making Binary Database Backups
8.4.3 Backing Up InnoDB or Falcon Tables
8.6 Checking and Repairing Database Tables
8.6.1 Using the Server to Check and Repair Tables
8.6.2 Using mysqlcheck to Check and Repair Tables
8.6.3 Using myisamchk to Check and Repair Tables
8.7 Using Backups for Data Recovery
8.7.1 Recovering Entire Databases
8.7.2 Recovering Individual Tables
Reference Book:
Web Site Reference:
3. www.mysql.com
4. www.mysqltutorial.org
5. www.w3schools.com
Academic Coordinator Head of Department Principal
(Computer Engineering) Govt. polytechnic Mumbai
Sr.No. Title Author Publication
1 MySQL (4th Edition). Paul DuBois Developer’s Library
Management information system
Rationale:-
The modern business environment is characterized by intense competition, short product life
cycles and technological development. Hence representing the information in systematic manner
becomes an integral part of the business. The need for the systematic Management Information System is
essential for creating competition firms, managing the global scenario of cut throat competition and no
rover adding value.
Management Information System facilitates the decision makers to extend their planning horizons
and introduce even greater levels of uncertainty in business plans and budgeted allocations. Management
Information System facilities higher degree of accountability in business process.
Objectives: - Students will be able to-
1. Describe important role of Management Information System in modern organization.
2. Describe the function of Business Process Outsourcing, processes in Customer Relationship
Management and types of E-commerce.
3. Use data warehouse, data mining for decision support system.
Programme Code : CO
Course Code : MG11508 Course Title : Management Information System
Compulsory/Optional : Optional
Teaching Scheme and Credits Duration of Written
Examination Examination Scheme
TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL
4 - - 4 3 hrs 2 Tests of 1
Hour each 80 20 - - - 100
( * ) indicates assessment by Internal and External examiners
Topic No Contents Hours Marks
SECTION-I 32 40
1.0 Foundation of Information System in Business
1.1 Information System
What is an IS?
The roles of IS in Business
Trends in IS
The Role of E-business in Business
System
Feedback and Control
1.2 Types of IS
Operational Support System
Management Support System
Other classification of IS
1.3 Managerial Challenges of IS
Success and Failure with IT
Developing IS solution
Challenges and Ethics of IT
Challenges of IT Carriers
1.4 Components of IS
12 16
2.0
Management Information System
2.1 MIS Concept
2.2 MIS definition
2.3 Role of MIS
2.4 Impact of MIS
2.5 MIS and User
2.6 Management as a control system
2.7 Organization as System
2.8 MIS for Digital Firm
10 14
3.0 Software Assets Management
3.1 Application software: End user Application
Introduction and Definition of Software
Types of Software
Software suits and Integrated Packages
Web browsers and more
E-mails, Instant messaging and weblogs
Word Processing and Desktop publishing
Electronic spreadsheets , presentation graphics and Groupware
10 10
Topic No Contents Hours Marks
SECTION-II 32 40
4.0 Data Resource Management 4.1 Database Management
4.2 Fundamental Database Concept –Character,Field,Record,File
4.3 Database Development
4.4 Data Resource Management
4.5 Types of Database
Operational Database
Distributed Database
4.6 Data Warehouse and Data Mining
4.7 Database Management Approach
Database Management System
Database Interrogation
Database Maintenance
Application Developer
08 10
5.0 Electronic Commerce System 5.1 Introduction to E-com
5.2 The scope of E-com
5.3 E-com Technologies
5.4 Categories of E-com
Business to Consumer E-com
Consumer to Business E-com
Business to Business E-com
Consumer to Consumer E-com
5.5 Electronic Payment Processes
Web payment Processes
Electronic Funds Transfer
Secure Electronic Payments
5.6 E-com Trends
10 12
6.0 Enterprise Business System 6.1 Customer Relationship Management –The business focus
Introduction and Concept of CRM
The 3 phases of CRM
Benefits and Challenges of CRM
CRM Failure
Trend in CRM
6.2 Supply Chain Management-Business Network
Introduction and Concept of SCM
The role of SCM
Benefits and Challenges of SCM
Trend in SCM
6.3 Major Types of System
Transaction Processing System
Office System
KWs System
MIS
Decision Support System
14 18
Reference Books:
Sr.
No.
Book Title Author Publication
1 Management Information systems K.C. Laudon, J.P. Laudo Pearson edition
2 Management Information systems J.A. O’Brien Tata McGraw Hill
3 Management Information systems W S Jawadekar Tata McGraw Hill
Websites:
www.mu.ac.in/mis
www.csus.edu/indiv/e/eatonr/mis
Academic Co-ordinator Head of Department Principal
(Computer Engineering) Government polytechnic Mumbai
Rationale:-
The goal of Information Security is to familiarize students with the security issues and
technologies involved in modern information systems. Students will gain an understanding of the various
ways in which information systems can be attacked and tradeoffs in protecting networks. Students will
gain an appreciation of the need to develop an understanding of underlying system applications and
potential security issues early in the design process.
New communication systems and digital technology have made dramatic changes in the way we live and
the means to transact our daily business. Businessmen are increasingly using computers to create,
transmit and store information in electronic form instead of traditional paper documents. It is cheaper,
easier to store and retrieve and speedier to communicate.
This will enable them to develop a sound knowledge and analytical ability facilitating their intellectual
and professional development and future employment.
Objectives:-
Student will be able to-
Understand basics of information security
Know about legal, ethical, and professional issues in information security
Will gain knowledge about cyber crime and cyber security
Will know about data recovery and email recovery
Know about information quality and
Programme Code : CO
Course Code : CO 11 413 Course Title : Information Security
Compulsory/Optional : Optional
Credits Duration of Written
Examination Examination Scheme
TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL
4 - - 4 3 hrs 2 Tests of 1
Hour each 80 20 - - - 100
( * ) indicates assessment by Internal and External examiners
Topic
No
Contents Hours Marks
SECTION-I 32 40
1 Introduction:
1.1 Information, Need and Importance of Information,
information classification, criteria for information
classification.
1.2 Security, need of security, Basics principles of
information security
1.3 Three pillars of information security, data obfuscation,
event classification
8 10
2 Information security architecture and model
2.1 Information security and Risk Management, Security
policies, guidelines, standards.
2.2 Trusted computing base, Rings of Trust, Protection
Mechanisms in a trusted Computing Base.
2.3 System security assurance concepts, Trusted computer
security Evaluation Criteria
2. 4 Information Technology security Evaluation Criteria,
Confidentiality and Integrity Models.
.
12 15
3 Cryptography
3.1 Introduction, Application of cryptography, Classical
encryption Techniques, Symmetric cipher.
3.2 Substitution cipher
Ceasor cipher
Playfair cipher
Hill cipher
3.3 Transposition cipher
Row transposition cipher
One Time Pad
3.4 Stenography, Digital Signatures, Authentication
Protocols, Digital Signature Standards
12 15
Topic
No
Contents Hours Marks
SECTION-II 32 40
4 Data Recovery
4.1 Introduction to Deleted File Recovery Formatted Partition
Recovery, Data Recovery Tools, Data Recovery Procedures
and Ethics.
8 10
5 Cyber Crime & Security
5.1 Introduction to Cyber Crimes – Hacking, Cracking,
Viruses, Virus Attacks, Pornography, Software Piracy,
Intellectual property, Legal System of Information
Technology, Mail Bombs, Bug Exploits, Cyber Crime
Investigation
5.2 Introduction Cyber Laws- Introduction to IT act 2000 and
IT act 2008, Introduction to the cyber laws
12 15
6 Access, physical control and compliance standards
6.1 Identification, Authorization , Authentication, Biometrics,
Single Sign –on, Kerberos, Remote user access and
Authentication,
6.2 Physical access control, Physical access threats, providing
physical security
6.3 Compliance standards : Implementing and Information
Security Management System , ISO 27001, ISO 20000, BS
25999, PCI DSS, ITIL framework, COBIT framework
12 15
Reference Books:
Sr. No. Author Title Publisher
Sr. No. Author Title Publisher
1 Godbole Nina Information System Security John Wiley
2 Mark Merkov & Jim
Breithaupt
Information Security
Principles and Practices Pearson
3 V.K.Pachghare Cryptography and Information
Security Prentice Hall India
4 Saurabh Sharma Information Security and
Cyber laws
Vikas Publishing
House
Web Reference:
CrypTool 1.4.21 (www.cryptool.org)
http://www.emailtrackerpro.com
http://www.kmint21.com (Keylogger)
http://www.jjtc.com/Steganography/tools.html
http://steghide.sourceforge.net/ (stegnography)
http://www.powerdatarecovery.com/ (data recovery)
Academic Co-ordinator Head of Department Principal
(Computer Engineering) Govt. polytechnic Mumbai
Cyber Laws
Rationale:
There is a wave in the world to develop and enforce cyber crime laws and underdeveloped
countries are especially under pressure from IT enabled businesses from advanced societies for
enacting cyber crime laws. Analyzing this issue from the technical and policy perspective, one
feels quite apprehensive about cyber crime laws. It is not a simple issue of preventing the crime;
the major concern is the impact of cyber crime laws on the growth of information technology
usage and adoption in developing societies.
Objectives: The student will be able to:
1) To make students familiar with the fundamental concepts of computer ethics.
2) To know the linkage between computer, professional, philosophical ethics and decision
making.
3) To develop the concepts in computer forensics.
4) To give emphasis on how cyber security operations are carried out.
5) To introduce the linkage between technology, law and ethics.
Programme Code : CO
Course Code : CO 11 414 Course Title : Cyber Laws
Compulsory/Optional : Optional
Credits Duration of Written
Examination Examination Scheme
TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL
4 - - 4 3 hrs 2 Tests of 1
Hour each 80 20 - - - 100
( * ) indicates assessment by Internal and External examiners
Topic
No
Contents Hours Marks
SECTION-I 32 40
01 Computer ethics and philosophical ethics
1.1 Vacuum of policies and conceptual muddles
1.2 social context, moral and legal issues
1.3 uniqueness of ethical issues,
1.4 role of analogy, descriptive and normative claims,
1.5 ethical relativism, utilitarianism, other theories
08 10
02 Professional Ethics And Privacy
2.1Characteristics, the system of professions,
2.2computing as a profession, professional
2.3relationships, responsibilities,
2.4code of ethics and professional conduct
Privacy:
2.5Computers and privacy issue,
2.6reframing this issue,
2.7 legislative background,
2.8 better privacy protection
10 14
03 Intellectual property issues in cyberspace
3.1Introduction to intellectual property Protections via Copyright,
3.2Trade Secrets, Trademarks,
3.3Patents, Contracting to protect intellectual property,
3.4Protection options – Encryption, copyright on web-content,
copyright on software
Ethical Decision Making
3.5Types of ethical choices, Making defensible decisions, Ethical
dilemmas, law and ethics,
3.6Guidelines for dilemma (Informal and Formal), Four-step
analysis process of solving dilemma
3.7Case studies: i) A stolen password ii) Recovery of data leads to
Discovery of confidential files iii)
Do copyright ethics change overseas?
14 16
Topic
No
Contents Hours Marks
SECTION-II 32 40
04 Crime incident Handling Basics
4.1 Hacking, cyber activism,
4.2 Tracking hackers, clues to cyber crime,
4.3 Privacy act, search warrants,
common terms, organizational roles,
4.4 procedure for responding to incidents, reporting
procedures, legal considerations
Information Technology Act 2000
4.5 Scope, jurisdiction,
4.6 Offense and contraventions, powers of police, adjudication.
10 14
05 Cyber Forensics
5.1 Cyber forensics,
5.2 Cyber crime examples,
5.3 Forensics casework,
5.4 Investigative incident-response actions,
5.5 Computer forensics tools,
5.6 Threats in cyberspaces, Blended attacks
5.7 Sample Policy Documents: i) Antivirus Guidelines Policy ii)
Internal Lab Security Policy iii)Server Security Policy iv) Wireless
Communications Policy
12 10
06 Information Security Certifications,
6.1 CISSP and SSCP,
6.2 CISA and CISM, SCP,
6.3 GIAC, certification weaknesses,
6.4 Role of these certified professionals,
6.5 Windows Server 2003 Security Fundamentals
10 08
Reference Books:
Web References:
1. lawebooks.blogspot.com/.../download-indian-law-ebooks-law-
2. ebookbrowse.com/cyber-law-notes-pdf-d283956840
3. books.google.co.in/books/.../information_security_and_cyber...
Academic Coordinator Head of Department Principal
(Computer Engineering) Govt. polytechnic Mumbai
Sr.No. Title Author Publisher
1 Computer Ethics Deborah G Johnson Pearson Education
2 Ethical Decision making and IT: An
Introduction with Cases Earnest A. Kallman, J.P Grillo
McGraw Hill
3 Cyber security Operations Handbook Michael E. Whitman, Herbert J.
Mattord CengageLearning
Rationale
Computer security is one of the most important and relevant art of computing today. The
requirement to address security in computer system design is an important design consideration in
many of today’s systems. It is essential to understand various threats to secure computing and the
basic security design principles and techniques developed to address these threats.
This course will introduce basic cryptography, fundamentals of computer/network security,
risks faced by computers and networks, security mechanisms, operating system security, secure
systems design principles, and network security principles. It will develop knowledge for security of
information and information systems within organizations. It focuses on concepts and methods
associated with planning, managing, and auditing security at all levels including networks.
Objective
The student will be able to-
1. Understand the risks faced by computer systems and the nature of common Information
hazards.
2. Identify the potential threats to confidentiality, integrity and availability of Computer
Systems.
3. Understand the working of standing security mechanisms.
4. Use cryptography Algorithms and protocols to achieve computer Security.
5. Apply security principles to secure Operating Systems and applications.
Programme Code : CO
Course Code : CO11412 Course Title : Computer Security
C / O : Optional
Credits Duration of Written
Examination Examination Scheme
TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL
4 - - 4 3
hrs
2 Tests of 1
Hour each 80 20 - - - 100
( * ) indicates assessment by Internal and External examiners
Topic
No
Contents Hours Marks
SECTION-I 32 40
01 Introduction to Security and its trends:
1.1 Threats to Security
Viruses and Worms
Intruders, Insiders
Criminal organizations, Terrorists & Information
warfare
1.2 Types of attack
Denial of service, backdoors
Trapdoors, Sniffing, Spoofing
Man in the middle, Replay
TCP/IP Hacking, Encryption attacks.
Malware: Viruses, Logic bombs
1.3 Security Basics
Confidentiality, Integrity, Availability
Operational model of Computer Security
Layers of security
1.4 Access control
Discretionary, Mandatory, Role based Authentication
10 14
02 Organizational/Operational Security
2.1 Role of people in security:
Password selection, Piggybacking
Shoulder surfing, Dumpster diving
Installing unauthorized software/hardware
Access by non employees
Security awareness
Individual user responsibilities
2.2 Physical security: Access controls
Biometrics
Finger prints, Hand prints, Retina
Voice patterns, Digital Signature
Keystrokes
10 12
03 5) Cryptography and Public Key Infrastructure
3.1 Encryption algorithm/Cipher
Substitution s techniques
Caesar Cipher
Mono-Alphabetic Cipher
3.2 Transposition techniques
Rail fence cipher
Columnar transposition-Simple, Double
3.3 Stegnography
3.4 Symmetric Cryptography,DES (Data encryption Standard),
Asymmetric Cryptography,
3.5 Public key infrastructures:
Basics of PKI, Digital certificates, Certificate
12 14
authorities
Registration authorities
Steps for obtaining a digital certificate
Steps for verifying authenticity and integrity of
certificate
3.6Trust models
Hierarchical
peer to peer
hybrid
Topic
No
Contents Hours Marks
SECTION-II 32 40
04 Network security:
4.1 firewalls
working, design principles, trusted systems, Kerberos
4.2 Security topologies
security zones, DMZ, Internet, Intranet
VLAN, security implication, tunneling
4.3 IP Security
Overview, architecture, IPSec
IPSec configurations, IPSec Security
4.4 Email security
security of email transmission
malicious code, spam
Mail encryption.
12 14
05 System security
5.1 Intruders
Intrusion detection system (IDS)
Host Based IDS
Network Based IDS
5.2 Password Management
Vulnerability of password
Password selection strategies
Components of good password.
5.3 Operating system security
Operating system hardening,
General steps for securing windows operating
System
Hardening Unix/Linux based operating System
Updates
Hot fix
Patch
Service Pack
10 14
Reference Books:
Websites:
http://www.pgpi.org/doc/pgpintro/
Academic Co-ordinator Head of Department Principal
(Computer Engineering) Government polytechnic Mumbai
06 Application and web security
6.1 Application hardening
Application patches, Web servers, Active directory
6.2 Web security threats
Web traffic security approaches
Secure Socket Layer and Transport Layer Security
6.3 Introduction to cyber laws
Cyber Crimes and its Examples
Need of Cyber Laws
10 12
Sr.No. Author Title
Publication
01 Wm. Arthur Conkin
Dwayne Williams
Gregory B. White
Roger L. Davis Chuck
Cothren
Principles of computer
Security + and
Beyond
Mc GrawHill Technology
Education International
Edition 2005
02
Dieter Gollman Computer Security Wiley India Education,
Second Edition
03 William Stallings
Cryptography and Network
Security
Principles and Practices
Pearson Education, Third
Edition
04 Atul Kahate
Cryptography and Network
Security
Tata-McGraw-Hill
Sixth reprint 2006
Advance Web Technology CO11417
Programme Code : CO
Course Code : CO 11 417 Course Title : Advance Web Technology
Compulsory/Optional : Optional
Teaching Scheme and Credits Duration of Written
Examination Examination Scheme
TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL
3 - 4 7 - - - - 50* - 50 100
( * ) indicates assessment by Internal and External examiners
Rationale:
PHP is a powerful tool for making dynamic and interactive Web pages.
PHP is the widely-used, free, and efficient alternative to competitors such as
Microsoft's ASP.
"PHP is an HTML-embedded scripting language. Much of its syntax is borrowed
from C, Java and Perl with a couple of unique PHP-specific features thrown in. The
goal of the language is to allow web developers to write dynamically generated pages
quickly."
Objectives:
Students will be able to:
1. PHP scripts are execute on the server 2.HP files can contain text, HTML tags and scripts
3.PHP files are returned to the browser as plain HTML
4. PHP is an open source software
5. PHP is a server-side scripting language, like ASP
Topic
No
Contents Hours
SECTION-I 24
01 Introduction to PHP
1.1The origin of PHP
PHP vs HTML
Work with Web Server
PHP Prons and Cons
Strength of PHP
06
02 Basic PHP Developments 2.1 Working PHP Scripts 2.2Basic PHP syntax
2.3 PHP variables
2.4 PHP data types
2.5Displaying type information
2.6Operators and Strings in PHP
08
03 Controls Structures
3.1 IF statements
3.2 Using Multiple statements
3.3Swich statements
3.4Using the ? operator 3.5 Looping
While
Do-while
For
10
List of Practical’s:-
Sr.no Title of Experiment
1 Implement a code to make use of HTML.
2 Implement a code to for printing on screen in PHP.
3 Implement a code to make use of PHP variable e.g. Get and Post
4 Implement a code to make use of Strings in PHP.
5 Implement a code to make use of IF statement.
6 Implement a code to make use of Multiple IF Statements.
7 Implement a code to make use of FOR loop.
8 Implement a code to make use of Switch Case.
9 Implement a code to make use of Arrays.
10 Implement a code to make use of While Control structures.
11 Implement a code to make use of do-while Control structures.
Topic
No
Contents Hours
SECTION-II 24
04
Arrays and Functions
Arrays:- 1.2 Concept of Array
1.3 Types of Arrays
Functions
4.3 PHP Library Function
Arrays
String
Date and Time
4.4 User Defined Function
06
05 Forms 5.1 Introduction to Forms
5.2 Design Concept of Forms
5.3Super Global variable
5.4 Combine HTML and PHP code
08
06 Classes and Objects
5.2 OOP
5.3 Define Class
5.4 Object Properties
5.5 Object Methods
5.6 Object Constructor and Destructor
10
12 Implement a code to make use of Date and Time.
13 Implement a code to make use of FORMS.
14 Implement a code to make use of combination of HTML and PHP code.
15 Implement a code to make use of Classes and Objects.
16 Implement a code to make use of Constructor and Destructor.
Reference Books:
Academic Coordinator Head of Department Principal
(Computer Engineering) Govt. polytechnic Mumbai
Sr.No. Title Author Publisher
1 Murach's PHP and MySQL Joel Murach and
Ray Harries Murach: Training &
Reference
2 Head First Labs O’Reilly O’Reilly Media
3 PHP/MySQL Programming for the Absolute
Beginner
Andy Harries Premier Press
Advance Database Management System
Rationale:
Oracle 10g or latest version has many enhancements to support the largest customers in
terms of database size limits and continues to remove complexity from the database to make it
easier to manage and reduce the total cost of ownership (TCO), The idea of Oracle 10g is that the
database will be able to dynamically requisite the resources from the grid to meet levels of peak
demand. Other enhancements for Oracle 10g or latest are aimed at reducing costs and improving
the quality of service by making the database easier to deploy and manage including enhancements
to backup and recovery and data warehousing
Objectives: The student will be able to:
1) To learn SQL, PL/SQL, and Oracle Database 10g or latest version available.
2) To learn how to create, retrieve, and manipulate objects in Oracle Database 10g Structured
Query Language (SQL).
3) Implement Oracle10g features and tools.
4) Learn the fundamentals of the PL/SQL
5) Write Stored Procedures, Functions, Packages, and Triggers.
6) Take Backup of data and able to provide recovery to the damaged or lost data.
7) Create and manage users and their privileges.
Programme Code : CO
Course Code : CO 11 415 Course Title : Advance Database Management System
Compulsory/Optional : Optional
Credits Duration of Written
Examination Examination Scheme
TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL
3 - 4 7 - - - - 50* - 50 100
( * ) indicates assessment by Internal and External examiners
Topic
No
Contents Hours Marks
SECTION-I 24 N.A
01 Database Fundamentals
1.1 Oracle database 10g or latest available Architecture
1.1.1 The Control Files, Online Redo 10g or latest available
1.1.2 System table space, SYSAUX Table space
1.1.3 Default temporary table space, Undo table space
1.1.4 The System parameter file, background process
1.2 Basic oracle 10g or latest available data type
1.3 Handling the stored objects
1.3.1 Views, triggers, Procedures, Functions, Packages
1.4 Important items in the oracle 10g or latest available
1.4.1 Indexes, Users, table space Quotas, synonyms, Roles
1.4.2 Default User Environment
1.5 Object & System Privileges
1.5.1 Select, Insert, Update, Delete
10
02 Overview of SQL through oracle 10g or latest available
Database
2.1 SQL statement Component
2.1.1 DDL, DML
2.2 Functions
2.2.1 String, Numeric, Aggregate, Date
2.3 Joins
2.3.1 Inner & Outer
2.4 Clauses
2.4.1 Where, GroupBy, Having, OrderBy
2.5 Sub queries
2.5.1 Simple, Correlated Sub queries With Join
2.6 Use of Set Operators
2.6.1 Union, Union all, Intersect, Minus
2.7 Creating Views & using Triggers & Cursors
2.8 Managing Tables
2.8.1 Guidelines
2.8.2 Creating, Altering, Loading, Dropping
2.8.3 Redefining table online
2.8.4 Managing External tables
06
03 PL/SQL
3.1 Introduction
3.2 Basic PL/SQL Program Structure
3.3 PL/SQL Data type & Character Set
3.4 Execution of PL/SQL Program in sql*Plus
3.5 Handling Error Conditions in PL/SQL
3.6 Using Conditions & loops in PL/SQL
3.7 Creating Stored Procedures & Functions
3.8 Calling Of PL/SQL program
08
Topic
No
Contents Hours Marks
SECTION-II 24 N.A
04
Backup & Recovery
4.1 Oracle 10g or latest available Backup & Recovery
Fundamentals
4.1.1 Backup Architecture, Oracle Binaries
4.1.2 Parameter Files, Control Files, Redo 10g or latest
available
4.1.3 Undo Statement, Checkpoints, Archive 10g or latest
available
4.1.4 Data files, Table spaces, Segments, Extents & Blocks
4.2 Oracle User managed backup & Recovery
4.2.1 Types of User Managed Backup
4.2.2 Cold Backups, Hot Backups.
4.2.3 Seven Steps to Recovery
4.2.4 Recovery Using Backup Control Files
4.3 Write a Database Backup
4.4 Backup achieved redo 10g or latest available
4.5 Introduction to recovery manager & its key features
12
05 Starting Up & shutting down
5.1 Starting Up database
5.1.1 Options for starting up database
5.1.2 Understanding initialization Parameter Files
5.1.3 Preparing to Start up an instance
5.1.4 Starting up an instance
5.2 Altering Database Availability
5.2.1 Mounting a database to an instance
5.2.2 Opening a closed database
5.2.3 Opening a database in read only mode
5.2.4 Restricting access to an open database
5.3 Shutting down a Database
5.4 Introduction to Quiescing Statement of Database
5.5 Suspending & Resuming a database
07
06 Managing Users & Securing the database
6.1 Importance
6.2 Managing Users & Resources
6.3 Managing User Privileges & Roles
6.4 Auditing Database Use
05
List of Practical’s:- Using Oracle 10g or latest available:
Sr.No. Title of Experiment
1 Implementing all DDL statements
2 Implementing all DML statements.
3 Implementation of all string & Date related functions.
4 Implementation of aggregate functions such as sum, avg, min, max, count.
5 Applying constraints such as primary key, not null, foreign key, check, default.
6 Execute the queries containing Where, Group by & Having and Order by Clauses.
7 Selecting the records using set operators such as union, union all, Intersect, minus.
8 Implementation of All Types of Joins.
9 Creating views.
10 Create Triggers.
11 Create Cursors.
12 Create, execute & modify stored procedure.
13 Creating PL/SQL Program Using condition statements.
14 Creating a PL/SQL Program using For loop.
15 Creating a PL/SQL Program using Do while loop
16 Creating Functions.
17 a) Creating Different Users.
b) Assigning & managing Users privileges & Roles.
18 Implement the backup procedure for database.
19 A case study: study the complete database design of project
Reference Books:
Web Site References:
6.www.oracle.com
7. www.w3schools.com
Academic Coordinator Head of Department Principal
(Computer Engineering) Govt. polytechnic Mumbai
Sr.No. Title Author Publication
1 Oracle Database 10g
A Beginners Guide
Ian Abramson,
Michael Abbey,
Michael Corey
Oracle Press
2 Oracle Database Administrators
Guide 10g, Release2(10.2)
Steve Fogel
Paul Lane Oracle
Recommended