B.C.A. (Computer Applications)
B.C.A. (Computer Applications)
DEPARTMENT OF B.C.A
(Bachelor of Computer Applications)
CURRICULUM
&
SYLLABUS 2013-14
B.C.A
(Bachelor of Computer Applications)
class. *3$ = L
Σ &L
The Class Committee will meet as often L
Semester II
Code No Course Title L T P C TCH
THEORY
EL1106 English -II 4 0 0 4 4
MA1105 Applied Mathematics -II 4 1 0 4 5
BC1201 Data Structures 3 0 0 3 3
BC1202 Microprocessors and its applications 3 0 0 3 3
BC1203 Introduction to Accounting 4 1 0 3 5
PRACTICALS
BC1221 Data Structures Laboratory 0 0 3 1 3
BC1222 Microprocessors Lab 0 0 3 1 3
BC1223 Accounting Laboratory 0 0 3 1 3
TOTAL 18 2 9 20 29
Semester IV
Code No Course Title L T P C TCH
THEORY
MA1204 Numerical Methods 3 1 0 4 4
BC1401 Operating Systems 3 0 0 3 3
BC1402 Computer Networks 3 0 2 4 5
BC1403 Database Management Systems 3 0 0 3 3
BC1404 Computer Graphics 3 0 0 3 3
PRACTICALS
BC1421 Operating Systems Lab 0 0 3 1 3
BC1422 RDBMS Laboratory 0 0 3 1 3
BC1423 Computer Graphics Laboratory 0 0 3 1 3
TOTAL 15 1 11 20 27
Semester VI
Code No Course Title L T P C TCH
THEORY
BC1601 Cryptography and Network Security 3 0 0 3 3
BC1602 Data Warehousing and Data MIning 3 0 2 4 5
----------- E3 Elective - III 3 0 0 3 3
--------- E4 Elective - IV 3 0 0 3 3
--------- E5 Elective - V 3 0 0 3 3
PRACTICALS
BC1621 Web Applications Laboratory 0 0 3 1 3
BC1622 Project Work 0 0 12 6 12
TOTAL 15 0 17 23 32
EL 1105 - ENGLISH - I
(Common to all undergraduate branches)
L T P C
4 0 0 4
UNIT I LISTENING SKILL 12
Listening to short conversations, telephone conversations and monologues - Listening to prose &
poetry reading -- Listening to sounds and silent letters in English -- Listening to movies - Listening for
the gist of the text -- Listening for general meaning and specific information -- Listening for multiple-
choice questions -- Listening for positive & negative comments -- Listening for interpretation.
UNIT II SPEAKING SKILL 12
Self-introduction -- Giving information about oneself -- Expressing personal opinion -- Simple oral
interaction - Dialogue -- Conversation - Giving and receiving feedback using Johari window - Debates
-- Brief presentations -- Differences between disagreeing and being disagreeable -- Participating in
group discussions, role plays and interviews -- Generating talks based on visual or written prompts.
UNIT III READING SKILL 12
Reading for skimming - Reading for scanning -- Reading for the gist of a text - Reading for specific
information - Reading for information transfer and interpretation (pie chart & bar chart) -- Reading and
interpreting anecdotes, short stories, poems - Reading prose passages for comments -- Reading
and explaining a Fishbone diagram for pros and cons - Reading comprehension exercises for multiple-
choice questions.
UNIT IV WRITING SKILL 12
Writing emails, messages, notices, agendas -- Leaflets and brochures -- Writing paragraphs --
comparisons & contrasts -- Letter-writing -- letter to the editor -- Letter inviting, letter accepting or
declining the invitation -- Arranging appointments -- Asking for permission -- Apologizing and offering
compensation -- Dealing with requests -- Writing presentations with a plan -- Introduction, Body and
Conclusion.
UNIT V THINKING SKILL 12
Eliciting & imparting the knowledge of English using thinking blocks - Developing thinking skills
along with critical interpretation side by side with the acquisition of English -- Decoding diagrams &
pictorial representations into English words, phrases and expressions.
Total Periods:60
REFERENCES :
1. Norman Whitby. Business Benchmark: Pre-Intermediate to Intermediate - BEC Preliminary.
New Delhi: Cambridge University Press, 2008 (Latest South Asian edition).
2. Devaki Reddy & Shreesh Chaudhary. Technical English. New Delhi: Macmillan, 2009.
3. Rutherford, Andrea J. Basic Communication Skills for Technology. 2nd edition. New Delhi:
Pearson Education, 2010.
Total Periods : 45
LIST OF ELECTIVES
BC1603 - INFORMATION SECURITY
L T P C
3 0 0 3
UNIT I INTRODUCTION 9
History, What is Information Security?, Critical Characteristics of Information, NSTISSC Security
Model, Components of an Information System, Securing the Components, Balancing Security and
Access, The SDLC, The Security SDLC
UNIT II SECURITY INVESTIGATION 9
Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues
UNIT III SECURITY ANALYSIS 9
Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk
UNIT IV LOGICAL DESIGN 9
Blueprint for Security, Information Security Policy, Standards and Practices, ISO 17799/BS 7799,NIST
Models, VISA International Security Model, Design of Security Architecture, Planning for Continuity
UNIT V PHYSICAL DESIGN 9
Security Technology, IDS, Scanning and Analysis Tools, Cryptography, Access Control Devices,
Physical Security, Security and Personnel
Total Periods: 45
REFERENCES :
1. Michael E Whitman and Herbert J Mattord, "Principles of Information Security", Vikas
Publishing House, New Delhi, 2003
2. Micki Krause, Harold F. Tipton, " Handbook of Information Security Management", Vol 1-3
CRC Press LLC, 2004.
3. Stuart Mc Clure, Joel Scrambray, George Kurtz, "Hacking Exposed", Tata McGraw-Hill, 2003
4. Matt Bishop, "Computer Security Art and Science", Pearson/PHI, 2002.