Co Po
Co Po
GADCHIROLI
NATIONAL EDUCATION
POLICY(NEP) 2020
• Dr. K. D. Kalaskar
• Dr. S. B. Kishor
• Dr. R. N. Jugele
• Dr. P. B. Dhumane
• Mr. V. K. Tembhurne
• Dr. M. L. Jiwtode
• Dr. M. N. Quadri
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 2
General Guidelines
1. The duration of M.SC. (COMPUTER SCIENCE) the course shall be of two academic years
consisting of Four semesters with University examinations at the end of each semester namely:
a. M.SC. (COMPUTER SCIENCE) Part I: Semester I & Semester II Examination
b. M.SC. (COMPUTER SCIENCE) Part II: Semester III & Semester IV Examination
2. The examination specified in the preceding paragraph shall be held semester vise at such places and such dates
as may be appointed by the university.
3. Subject to their compliance with the provisions of this Direction and of other directions/ordinances in force
from time to time, the candidate who has prosecuted a regular course of study for not less than one academic year
before the examination shall be eligible for admission to the examination.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 3
Syllabus
of
M.Sc. – I
(Computer Science)
(Sem – I)
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 4
Scheme
M.Sc. – I Computer Science – Semester-I
Teaching
Credits Assigned % of Assessment
Scheme
Course/ Paper
Subject Paper Name
Code Min.
Theory Prac. Tut. Theory Prac. Tut. Passing
Total IA UE Total
Marks
Scripting
Languages and
01MSCCS01 Information 4 - - 3 - - 3 20 80 100 40
Retrieval
Core
01MSCCS02 Python 4 - - 3 - - 3 20 80 100 40
Programming
Cloud
01MSCCS04.1 Computing
01MSCCS04.2 Discrete
Mathematics
Elective
PGMSCC04 Theory of
(Student Shall Computation & 4 - - 3 - - 3 20 80 100 40
select any one 01MSCCS04.3 System
from the elective Programming
group)
Network
01MSCCS04.4
Security
Computer
01MSCCS04.5
Graphics
Research
RM 01MSCCS05 Methodology &
4 - - 3 - 3 20 80 100 40
Publication
Ethics
Based on
LAB - I 01MSCCS06 01MSCCS01 & - 4 - - 2 - 2 25 75 100 50
01MSCCS02
Based on
LAB - II 01MSCCS07 01MSCCS03 & - 4 - - 2 - 2 25 75 100 50
01MSCCS04
Ability
Enhancement 01MSCCS08 Seminar - 1 - - 1 - 1 50 - 50 20
Total 20 9 - 15 5 - 20 200 550 750 320
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 5
o Core: Major theory papers in the concerned subject.
▪ From Elective Courses, students need to select only one paper.
o IA (Internal Assessment): It will be evaluated by Internal Examiner appointed by the college in
consultation with the University. (Refer to Appendix A)
o UE (University Examination): It will be evaluated by External Examiner appointed by the
university. (Refer to Appendix B)
o For Paper Patterns refer to Appendix C
o In Course/Paper Code
▪ 01: Represent it as a Semester One.
▪ MSC: Represent is MASTER OF SCIENCE
▪ CS: Represent the subject COMPUTER SCIENCE
▪ Last two numbers: Represent Paper No. for Ex. 01 Represent Paper no. 1
o Lab*:
1) Not more than two students should be allowed to do practicals on a single PC.
2) Wherever possible Practicals should be performed using Open-Source Software.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 6
M.Sc. (Computer Science) - I (SEMESTER – I)
Paper Code: 01MSCCS01
PAPER – I: Scripting Languages and Information Retrieval
Credit: 3 Max. Marks: 80
-------------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. Structure text and image content for the web using HTML5 and Learn semantic markup new to the
HTML standard
2. Style a web page using Cascading Style Sheets (CSS) and validate a web page.
3. Describe the Document Object Model (DOM) using JavaScript and Summarize managing web page
styles using JavaScript and CSS also will understand how to script forms.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 8
M.Sc. (Computer Science) - I (SEMESTER – I)
Paper Code: 01MSCCS03
PAPER – III: ADVANCED JAVA
Credit: 3 Max. Marks: 80
------------------------------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. Learn the Internet Programming, using Java Applets.
2. Create a full set of UI widgets and other components, including windows, menus, and buttons,
checkboxes, and text fields, scrollbars and scrolling lists, using Abstract Windowing Toolkit (AWT)
& Swings.
3. Apply event handling on AWT and Swing components.
4. Create dynamic web pages, using Servlets and JSP.
Unit I: Introduction to Java, Objects, and Classes
History of Java, Features of Java, Java Development Cycle: Source Code, Byte Code, Java Development Kit
(JDK), The Java Virtual Machine, JRE, Linker, Loader. Programming Concepts of Basic Java: Identifiers and
Keywords, Operators, Variables, Types of Variables, Data Types, Control structures, decision-making
statements, Arrays, Array Methods, Strings, and their methods. Oops Concepts of Java: Declaring Objects,
Methods, Scope Rules, Modifiers of Class, Constructor, Overloading Constructor, Uses of Static and Final
Keywords, Dynamic Method Dispatch, Abstract Classes.
Unit II: Inheritance, Packages, Exception Handling, Multithreading, and Collection Classes
Inheritance and Interfaces, Implementing and extending Interface, Packages: Importing Packages and Classes,
User define packages. Types of Exceptions Try-Catch Block, Multiple Catch, Nested Try, Throw, Throws, and
Finally, Built-in and User-Defined Exceptions. Multithreading: Multithreading Concept, Thread Life Cycle,
Thread Class and Runnable Interface, Type Priorities, Synchronization. Collections: Introduction to the
Collection Framework, Interfaces: Implementation.
Books:
1) Dr. S. B. Kishor, Dr. Rajani Singh “Programming in JAVA”, Das Ganu Publication, ISBN-978-93-84336-
49-3
2) E. Balaguruswamy, “Programming with Java - A Primer”, Tata McGraw-Hill, New Delhi, Third Edition,
ISBN0-07-061713-9
3) Marty Hall, Larry Brown “Core Servlets and JavaServer Pages: Volume 1: Core Technologies”, 2nd Edition,
August 2003, Pearson Publication, ISBN: 0130092290
References:
1) Steven Holzner, “Java 2 Programming Black Books”, ISBN-13: 978-1588800978
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 9
M.Sc. (Computer Science) - I (SEMESTER – I)
Paper Code: 01MSCCS04.1
PAPER – IV- Elective – I
CLOUD COMPUTING
Credit: 3 Max. Marks: 80
-------------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. To understand the concept of cloud computing.
2. To appreciate the evolution of cloud from the existing technologies.
3. To have knowledge on the various issues in cloud computing.
4. To be familiar with the lead players in cloud.
5. To appreciate the emergence of cloud as the next generation computing paradigm.
Books:
1. Bloor R., Kanfman M., Halper F. Judith Hurwitz “Cloud Computing for Dummies” (Wiley India Edition)
2010, ISBN 978-0-470-48470-8.
2. John W. Rittinghouse & James F. Ransome, “Cloud Computing: Implementation, Management and
Security”, CRC Press, 1st Edition, 2009, ISBN 978-1439806807.
3. Antony T Velte, Toby J. Velte, Robert Elsenpeter, Cloud Computing: “A Practical Approach”, McGraw Hill,
2009. ISBN 978-0-07-068351-8
4. Michael Miller, Cloud Computing: “Web-Based Applications That Change the Way You Work and
Collaborate Online”, Que Publishing, August 2008. ISBN 978-0-7897-3803-5
5. James E Smith, Ravi Nair, “Virtual Machines”, Morgan Kaufmann Publishers, 2006. ISBN 9788131203293
References:
1. George Reese, “Cloud Application Architecture”, O’Reilly and Associates.
2. Haley Beard, “Cloud Computing Best Practices for Managing and Measuring Processes for On-demand
Computing”, Applications and Data Centers in the Cloud with SLAs, Emereo Pty Limited, July 2008.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 10
M.Sc. (Computer Science) - I (SEMESTER – I)
Paper Code: 01MSCCS04.2
PAPER – IV - Elective – II
DISCRETE MATHEMATICS
Credit: 3 Max. Marks: 80
------------------------------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. Introduce concepts of mathematical logic for analyzing propositions and proving theorems.
2. Use sets for solving applied problems, and use the properties of set operations algebraically and Work
with relations and investigate their properties.
3. Investigate functions as relations and their properties and will understand the basic concepts of graphs,
digraphs, and trees.
Unit I: Fundamental of Sets and Mathematical Logic Fundamental
Sets and Subsets, Operations on Sets, Sequence, Matrices.
Logic-Proposition and Logical Operation Conditional Statements, Methods of Proof, Mathematical Induction
Mathematical Logic- Statements and Notation, Equivalence of Formulas, Duality, Connectives, Normal
Forms, Principle Disjunctive Normal Form, Principle Conjunctive Normal Form, Theory of Inference for the
Statement Calculus, Inference Theory of the Predicate Calculus.
Books:
1) Dr. S. B. Kishor, “Discrete Mathematics”, Das Ganu Prakashan, ISBN-978-93-81660-21-8
2) Bernard Kolman, Robert C. Busby, Sharon C. Ross, “Discrete Mathematical Structures”, Prentice-Hall
Publication, ISBN No.–0132297515.
3) Discrete Mathematical Structures with Application to computer science, Publication Tata McGraw –Hill,
ISBN-0-07-065142-6,
References:
1) Goodacre, “Discrete Mathematics with Graph Theory”, PHI Publication, ISBN -0136020798.
2) J.K. Sharma, “Discrete Mathematics”, McMillan Publication, ISBN -9780230322301.
3) Rajendra Akerkar, “Discrete Mathematics”, Publication Pearson
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 11
M.Sc. (Computer Science) - I (SEMESTER – I)
Paper Code: 01MSCCS04.3
PAPER – IV - Elective - III
THEORY OF COMPUTATION & SYSTEM PROGRAMMING
Credit: 3 Max. Marks: 80
------------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. Defines machine models formally.
2. Synthesizes finite automata with specific properties.
3. To introduce students to the fundamental model of the processing of high-level language programs for
execution on computer systems.
4. To understand and implement Assembler, Loader, Linkers, Macros & Compilers.
Unit I: Finite Automation and Regular Expression
Finite Automation and Regular Expression: Finite State Systems, Basic Definitions, Non - Deterministic
Finite Automata, Finite Automata with Moves, Regular Expressions, Two Way Finite Automata, Finite
Automata with Output, Application on Finite Automata.
Properties of Regular Sets: The Pumping Lemma for Regular Sets, Close Properties of Regular Sets, Decision
Algorithms for Regular Sets.
Context-Free Grammars: Motivation and Introduction, Context-Free Grammar, Derivation Tree,
Simplification of Context-Free Grammars, Chomsky Normal form, Greibach Normal form, The Existence of
Inherently Ambiguous Context-Free Languages.
Unit II: Push Down Automata and Turing Machine
Push Down Automata: Informal Description, Definitions, Push Down Automata, and Context-Free Languages.
Turing Machine: Introduction, The Turing Machine Model, Computable Languages and Functions,
Techniques Turing Machine Construction, Modification of Turing Machines, Church‟s Hypothesis, Turing
Machine As Enumerators, Restricted Turing Machine Equivalent to The Basic Model. Chomsky: Regular
Grammar, Unrestricted Grammar, Context-Sensitive Languages, Relation between Classes of Languages.
Unit III: Introduction to Device Drivers
Introduction to Device Drivers: Role of Device Drivers, Splitting The Kernel, Classes of Devices and Modules,
Security Issues, Version Numbering, Building and Running Modules Kernel Modules Vs. Applications,
Compiling, and Loading, Kernel Symbol Table, Preliminaries, Interaction and Shutdown, Module Parameters,
Doing It in User Space.
Unit IV: Assembly and Machine Languages
Assembly and Machine Languages: CPU Architecture of 8086 Family, Function, Procedure and General
Purpose Registers, Memory Segmentation and Address Computation, Addressing Modes, Instructions Set and
formats. Different Types of Instruction, Processing of Binary, ASCII, and BCD Data, Stacks, Calls, Returns,
Near and Far Procedures. Interrupts and Their Routines, Definitions and Recursive Macros, Assemblers,
Overview of Compilation Process. Loaders and Linkers: Loading Schemes, Linking, Relocation, and
Program Relocation.
Books:
1. Donovan J.J, “Systems Programming”, New York, TMH, ISBN-0-07-460482-1
2. Dhamdhere D.M., “System Programming”, TMH, ISBN-0-7-133311-8
3. John E. Hoperott and Jeffery D.Ullman, “Introduction to Automata Theory, Languages,and Computation”.
References:
1. Adam Hoover, “System Programming with C and UNIX”, Pearson, ISBN-0136076602.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 12
M.Sc. (Computer Science) - I (SEMESTER – I)
Paper Code: 01MSCCS04.4
PAPER – IV - Elective - IV
NETWORK SECURITY
Credit: 3 Max. Marks: 80
-------------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. understanding of Network Security Concepts
2. Identification of Security Threats and Attacks
3. Implementation of Network Security Measures
4. Knowledge of Cryptographic Techniques
5. Network Vulnerability Assessment and Penetration Testing
Unit 1: Introduction to Network Security
Understanding Network Security: Definitions, goals, and importance of network security. Security Threats
and Attacks: Types of threats (e.g., malware, hacking, social engineering) and common attack vectors.
Security Principles: CIA Triad (Confidentiality, Integrity, Availability) and other security principles.
Books:
1. Network Security Essentials: Applications and Standards" by William Stallings, Pearson Publication,
ISBN-13: 978-0136108054
2. "Network Security: Private Communication in a Public World" by Charlie Kaufman, Radia Perlman,
and Mike Speciner, Prentice Hall Publication, ISBN-13: 978-0130460196
3. "Firewalls and Internet Security: Repelling the Wily Hacker" by William R. Cheswick, Steven M.
Bellovin, and Aviel D. Rubin, Addison-Wesley Professional Publication, ISBN-13: 978-0201634662
References:
1. "The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws" by Dafydd Stuttard
and Marcus Pinto, Wiley Publication, ISBN-13: 978-1118026472
2. "CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide" by Mike
Chapple, James Michael Stewart, and Darril Gibson, Sybex Publication, ISBN-13: 978-1119475934
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 13
M.Sc. (Computer Science) - I (SEMESTER – I)
Paper Code: 01MSCCS04.5
PAPER – IV - Elective - V
COMPUTER GRAPHICS
Credit: 3 Max. Marks: 80
-------------------------------------------------------------------------------------------------------------------
Books:
1. Donald Hearn, M. Pauline Baker, “Computer Graphics”, Prentice Hall Publication, Year- 1994, “2nd
Edition”.
2. Steven Harrington, “Computer Graphics A Programming Approach”, McGraw-Hill International Edition,
Year- 1987, ISBN 0-07-026753-7
References:
1. Apurva A. Desai, “Computer Graphics”, Prentice Hall Publication, Year-2006, ISBN No. 978-81-203-3524-0
2. V. K. Pachghare, “Comprehensive Computer Graphics: Including C++”, Laxmi Publications
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 14
M.Sc. (Computer Science) - I (SEMESTER – I)
Paper Code: 01MSCCS05
PAPER-V
RESEARCH METHODOLOGY & PUBLICATION ETHICS
Credit: 3 Max. Marks: 80
-------------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. Demonstrate the ability to choose methods appropriate to research aims and objectives
2. Understand the limitations of particular research methods
3. Develop skills in qualitative and quantitative data analysis and presentation
4. Develop advanced critical thinking skills
5. Demonstrate enhanced writing skills
Unit I: Introduction
Definition of Research, Meaning, Types, Objectives of Research, Research Process, Significance and Scope of Research,
Criteria of Good Research
RESEARCH PROBLEM HYPOTHESIS - Identification of Research Problem, Research Question, Formulation of
Research Proposal, Hypothesis – Null and Alternative Hypothesis, Testing of Hypothesis
Unit II: Research Design Plan
Meaning of Research Design, Concept of Research Design, Characteristics of good research design, Use of advanced
technology in Research Design
Sampling Data Collection & Analysis - Meaning and definition of Sampling, Sampling Design, and Probability; Non-
probability Sampling. Collection of Primary; Secondary Data, Methods of Data collection - Observation, Questionnaire,
Survey, interviews, brainstorming, scales Tests, etc., Validity and Reliability, Analysis of quantitative data based on
various tools and its presentation with tables and graphs, Statistical Tools and techniques of data analysis.
Publication Ethics: Publication ethics: definition, introduction, and importance. Best practices/standards-setting
initiatives and guidelines: COPE, WAME, etc., Conflicts of interest, Predatory publishers and journals
Books:
1) Dr. S. Sachdeva, “Research Methodology”, Himalaya Publication
2) The Student's Guide To Research Ethics, Paul Oliver, McGrew Hill
3) Dr. S. B. Kishor, Dr. Ajay S. Kushwaha, Dr. Gitanjali J, “Research and Publication Ethics”, published by
DAS Ganu, Prakashan, ISBN 978-93-84336-71-4
References:
1) C. R. Kothari, Research Methodology Methods and Techniques, New Age Publication
2) Dr. S. B. Kishor, “Research Methodology”, published by DAS Ganu, Prakashan
3) Ethical Choice in Research, Harries Cooper, Aditya Books, ISBN 9781433821684
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 15
M.Sc. (Computer Science) - I (SEMESTER – I)
Paper Code: 01MSCCS06
Lab – I
(based on 01MSCCS01 & 01MSCCS02)
Credit: 2 Max. Marks: 100
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 17
M.Sc. (Computer Science) - I (SEMESTER – I)
Paper Code: 01MSCCS07
Lab- II
(based on 01MSCCS03 & Selected Elective)
Credit: 2 Max. Marks: 100
Practical List for ADVANCED JAVA (01MSCCS03)
1. Write a program to accept two numbers and display the result using the command line argument.
2. Write a program for sorting a list of a number using Array.
3. Write a java program to print the following output.
A
A B
A B C
A B C D
A B C D E
4. Write a java program to no. of evens and no. odd numbers in an array of size 10. Also,
calculate the sum of evens and the sum of odds.
5. Write a java program to find the sum of prime numbers ranging from 1 to 100.
6. Write a program to calculate multiplication and division using the static method.
7. Write a program of Constructor Overloading to calculate the area of the Room.
i. Default constructor
ii. Constructor with one argument.
iii. Constructor with three arguments.
8. Write a program to demonstrate Single Inheritance.
9. Write a program to calculate the area of a rectangle and circle using Interface.
10. Write a java program to demonstrate the try…catch mechanism.
11. Write a java program to show the use of throw, throws, and finally keywords.
12. Write a program that throws IO Exception. (Accept student Name and age from keyboard and
display.
13. Write a program to demonstrate user-defined exception (use division of two no's & throw user
define exception if the result is smaller than0.01)
14. Write a java program to demonstrate Threads using Thread class and also with Runnable
interface.
15. Write a program to demonstrate the Linked List class.
16. Write a program to demonstrate the List class.
17. Write a program to demonstrate ListIterator Interface.
18. Write an AWT program to accept the user's details.
19. Write an Applet program to create a Login page with having Username and Password.
20. Design a user interface using an applet to accept two values and calculate the sum of these numbers.
21. Write a program to create a frame using the JFrame class
22. Write a program to demonstrate Generic Servlet Program.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 18
Practical: CLOUD COMPUTING (01MSCCS04.1)
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 19
Practical: DISCRETE MATHEMATICS (01MSCCS04.2)
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 20
Practical: TOC & SP (01MSCCS04.3)
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 21
Practical: NETWORK SECURITY (01MSCCS04.4)
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 22
Practical: COMPUTER GRAPHICS (01MSCCS04.5)
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 23
M.Sc. (Computer Science) - I (SEMESTER – I)
Paper Code: 01MSCCS08
SEMINAR
Credit: 1 Max. Marks: 50
-------------------------------------------------------------------------------------------------------------------
The seminar must be based on some current trends related to IT/Computer Science/Computer Application.
A student must present the PowerPoint presentation along with Seminar Report. Students are requested to
follow the following guidelines while choosing & preparing their seminars.
Guidelines to Seminar
1. The name of the seminar topic must be the latest on the current trends and should not be repeated. A
student must submit the topic at the beginning of the semester.
2. The Seminar topic is to be approved by the departmental allocated guide.
3. Students are allowed to use graphics/animation/audio-video aids for their presentations.
4. Seminar work will be evaluated by an internal examiner. Refer Appendix B
5. Students are requested to submit their seminar reports on or before the deadline with the concern of
their respective guides otherwise students will be responsible for any appropriate action.
6. The seminar report should be submitted to the department in the following format, printed in double
line space using A4 size bond paper, with a left margin of 1.5” and a right margin of 1.0” with
proper spiral binding to be done. Only one copy needs to be submitted.
7. Students are requested to obtain the necessary certificates and declarations to be duly enclosed in the
report.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 24
Syllabus
of
M.Sc. – I
(Computer Science)
(Sem II)
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 25
M.Sc. – I Computer Science – Semester-II
Teaching
Scheme Credits Assigned % of Assessment
Course/ Paper
Subject Paper Name
Code Min.
Theory Prac. Tut. Theory Prac. Tut. Passing
Total IA UA Total Marks
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 26
M.Sc. (Computer Science) - I (SEMESTER – II)
Paper Code: 02MSCCS01
PAPER - I: WEB DESIGNING USING ASP.NET
Credit: 3 Max Marks:80
-------------------------------------------------------------------------------------------------------------------
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 27
M.Sc. (Computer Science) - I (SEMESTER – II)
Paper Code: 02MSCCS02
PAPER - II: DATA WAREHOUSE AND SQL
Credit: 3 Max Marks:80
-----------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. To develop research-oriented applications of data mining and data warehousing.
2. To understand the necessity and importance of data pre-processing, data integration, data
discretization.
3. To learn the concepts of OLAP technology, data mining methods, various classification and prediction
methods.
4. To able to apply accuracy and error measures, methods of cluster analysis, graph mining and mining
sequence patterns in biological data.
Books:
1) Lauren Darcey and Shane Conder, “Android Wireless Application Development”, Pearson Education.
2) W. Frank Ableson, Robi Sen, Chris King, “Android in Action”, 2nd Edition, Manning Publications Co,
ISBN 978-1-935182-72-6.
3) Chris Haseman, “Android Essentials”, Apress Publications, ISBN-13: 978-1-4302- 1064-1.
4) James Steele, Nelson To, “The Android Developer’s Cookbook-Building Applications with the Android
SDK”, Addison-Wesley Publications, ISBN-13: 978-0-321- 74123-3.
References:
1) Lucas Jordan, Pieter Greyling, “Practical Android Projects”, Apress Pub., ISBN- 13: 978-1-4302-3243-8.
2) Reto Meier, “Professional Android 2 Application Development”, Wiley India Pvt. Ltd.
3) Mark L Murphy, “Beginning Android”, Wiley India Pvt Ltd.
4) Zigurd Mednieks, Laird Dornin, G. Blake Meike & Masumi Nakamura, “Programming Android”, O’Reilly
Publications.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 29
M.Sc. (Computer Science) - I (SEMESTER – II)
Paper Code: 02MSCCS04.1
PAPER – IV- Elective – I
CYBER SECURITY & IPR
Credit: 3 Max. Marks: 80
------------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. Conduct digital investigations that conform to accepted professional standards and are based on the
investigative process: identification, preservation, examination, analysis, and reporting.
2. Cite and adhere to the highest professional and ethical standards of conduct, including impartiality
and the protection of personal privacy. Apply event handling on AWT and Swing components.
3. Identify and document potential security breaches of computer data that suggest violations of legal,
ethical, moral, policy, and/or societal standards.
4. Learner will understand and implement the concept of IPR.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 30
M.Sc. (Computer Science) - I (SEMESTER – II)
Paper Code: 02MSCCS04.2
PAPER – IV- Elective – II
SOFT SKILLS
Credit: 3 Max. Marks: 80
-------------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. To effectively communicate through verbal/oral communication and improve the listening skills. Write
precise briefs or reports and technical documents. Soft Skills.
2. To actively participate in group discussion / meetings / interviews and prepare & deliver presentations.
Become more effective individual through goal/target setting, self-motivation and practicing creative
thinking.
3. To function effectively in multi-disciplinary and heterogeneous teams through the knowledge of team
work, Inter-personal relationships, conflict management and leadership quality.
Books:
1) Dr. S. B. Kishor & Swapnil Bhagat, “Soft Skills”, Das Ganu Publication
2) Prashant A. Dhanwalkar (Manusmare), “Soft Skills Development”, Sai Jyoti Publication.
3) R C Sharma and Krishna Mohan, “Business Correspondence and Report Writing”,TMH
4) Pravin Bhatia, S. Chand, “Professional Communication Skills”.
Reference:
1) Pravin Bhatia and Meera Banerjee, “Developing Communication Skills”.
2) The Communicator by Board of Editors, Orient Black Swan Publication.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 31
M.Sc. (Computer Science) - I (SEMESTER – II)
Paper Code: 02MSCCS04.3
PAPER – IV- Elective – III
DIGITAL AND CYBER FORENSICS
Credit: 3 Max. Marks: 80
-------------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. Digital evidence collection and preservation: Demonstrate proficiency in collecting and preserving
digital evidence from various sources, including computers, mobile devices, networks, and cloud
storage, while adhering to legal and ethical standards.
2. Cybercrime investigation and analysis: Apply investigative techniques and tools to analyze digital
evidence, identify cyber threats, and investigate cybercrimes such as hacking, data breaches, fraud, and
digital identity theft.
Books:
1) Debra Littlejohn Shiner, “Scene of the Cybercrime”.
2) Vakul Sharma, “Handbook of Cyber Laws”, McMillan
References:
1) Michael Cross, “Scene of the Cybercrime” Second Edition.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 32
M.Sc. (Computer Science) - I (SEMESTER – II)
Paper Code: 02MSCCS04.4
PAPER – IV- Elective – IV
OPERATION RESEARCH
Credit: 3 Max. Marks: 80
-------------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. Mathematical modeling: Formulate real-world problems as mathematical models using optimization
techniques such as linear programming and integer programming.
2. Problem-solving: Analyze and solve optimization problems using algorithms and solution methods,
including dynamic programming and simulation.
3. Decision-making: Evaluate decision-making processes considering uncertainty, risk, and sensitivity
analysis, and propose improvements for better outcomes.
Unit 1: Introduction to OR
Overview of OR, Characteristics of OR problems, Formulation of OR problems, Linear programming, and
simplex method, Duality in linear programming, Sensitivity analysis, Transportation problem, Assignment
problem
Unit 2: Network Analysis
Introduction to network analysis, Shortest path problem, Minimal spanning tree problem, Maximum flow
problem, Critical path method (CPM), Program Evaluation and Review Technique (PERT), Resource-
constrained project scheduling
Unit 3: Decision Analysis
Decision-making under uncertainty, Expected value of perfect information, Decision trees, Bayesian analysis,
Value of information, Utility theory
Unit 4: Heuristics and Metaheuristics
Overview of heuristics and metaheuristics, Hill climbing, Simulated annealing, Genetic algorithms, Ant colony
optimization, Tabu search, Particle swarm optimization, Applications of heuristics and metaheuristics in
computer science
Books:
1. Introduction to Operations Research, Frederick Hillier and Gerald Lieberman, ISBN: 978-1259917020W.
2. Operations Research: An Introduction, Taha Hamdy, ISBN: 978-0134444017.
3. Network Flows: Theory, Algorithms, and Applications, Ahuja, Magnanti, and Orlin, ISBN: 978-
0136175490.
References:
1. Decision Analysis for Management Judgment, Decision Analysis for Management Judgment, ISBN: 978-
1119561534.
2. Metaheuristics: From Design to Implementation, El-Ghazali Talbi, ISBN: 978-0470482916
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 33
M.Sc. (Computer Science) - I (SEMESTER – II)
Paper Code: 02MSCCS04.5
PAPER – IV- Elective – V
DATA VISUALIZATION
Credit: 3 Max. Marks: 80
--------------------------------------------------------------------------------------------------------------------------------------
Program Learning Outcome:
1. Create visually appealing and effective data visualizations by understanding various design principles
like perception, Gestalt principles, color theory, etc.
2. Data visualization through data collection and analysis, enabling them to effectively gather and assess
data and apply statistical techniques for data analysis.
Books:
1. Kieran Healy, "Data Visualization - A Practical Introduction", Princeton University Press, ISBN:
9780691181622
2. Claus O. Wilke, “Fundamentals of Data Visualization: A Primer on Making Informative and
Compelling Figures”, First Edition, O'Reilly Publication, ISBN: 9789352138111
References:
1. Edward R. Tufte, “The Visual Display of Quantitative Information”, Graphics Pr., ISBN:
9781930824133
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 34
M.Sc. (Computer Science) - I (SEMESTER – II)
Paper Code: 02MSCCS05
ON JOB TRAINING(OJT)
Credit: 3 Max. Marks: 100
-------------------------------------------------------------------------------------------------------------------
1. When to Carry out?
On-the-Job Training (OJT) programs are carried out after the completion of Semester I or during a break
between academic terms i.e. The break between Semester I and Semester II provides an ideal timeframe for a
dedicated OJT program. Students can focus solely on their OJT without the demands of regular coursework.
It is essential for a college or educational institution should provide a formal letter to students in the mid
of semester I so that he/she can apply by specifying the requirement to carry out On-the-Job Training (OJT) in the
name of a company. This letter serves as an official communication and outlines important details related to the
OJT program. A student may contact the company for OJT.
The evaluation of OJT will be held at the end of semester II, though it is a continuous process till
semester IV where students will implement what they have learned in the final project i.e. Preparing the basic
background about the computer project during Semester 2 for execution in Semester 4 can greatly contribute to a
successful and well-structured On-the-Job Training (OJT) experience.
2. Where to Carry-out?
A list of potential places where On-the-Job Training (OJT) can be carried out by the students:
• Software Development Companies
• Tech Startups
• IT Consulting Firms
On-the-Job Training (OJT) can be carried out in a company, having a GST registration, or falls under the
Micro, Small, and Medium Enterprises (MSME) category.
3. A Basic guideline to help students and educators effectively plan and lay the groundwork for OJT is given below:
• Understanding the Project Scope:
▪ In Semester 2, students should receive an overview of the OJT program and understand the scope
of the project they will undertake in Semester 4. Clearly define the problem statement and
objectives of the project.
• Selecting Project Topics:
▪ Allow students to propose project topics aligned with their interests and career aspirations. This
can help increase their motivation and engagement in the OJT program. A Max. of two students
can work on the same topic.
• Preparing Literature Review:
▪ Encourage students to conduct a literature review during Semester 2. This involves researching
existing solutions and technologies related to the project topic. It will help them understand the
state-of-the-art and identify potential areas of innovation for their project.
• Identifying Tools and Technologies:
▪ In Semester 2, students should explore and become familiar with the tools, programming
languages, and technologies relevant to their chosen project. This will give them a head start
when they begin the implementation phase in Semester 4.
• Project Proposal:
▪ By the end of Semester 2, students should prepare a detailed project proposal. It should include
the problem description, research objectives, proposed solution, methodology, and a timeline for
implementation in Semester 4.
• Mentor Assignment:
▪ During Semester 2, assign mentors or supervisors to each student based on their project topic and
area of expertise. The mentors can provide guidance and support throughout the OJT journey.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 35
• Setting Milestones:
▪ Define key milestones and deliverables for the project to be achieved in Semester 4. This helps in
tracking progress and ensuring that the project stays on schedule.
• Ethical Considerations:
▪ Discuss ethical considerations, such as data privacy, intellectual property, and code plagiarism,
with students to ensure responsible and ethical conduct throughout the project.
• Resource Availability:
▪ In Semester 2, assess the resources required for the project's successful implementation in
Semester 4. This includes hardware, software, datasets, and access to any external resources or
APIs.
• Preparing a Work Plan:
▪ A student should create a detailed work plan for Semester 4. This plan should outline the tasks,
activities, and deadlines for each phase of the project.
• Communication and Documentation:
▪ Emphasize the importance of clear communication and thorough documentation throughout the
OJT program. Encourage students to maintain regular progress reports and update their mentors
on their work. Finally, a final report of OJT should be submitted by the students before the
commencement of the semester II examination.
• Certificate:
▪ Students who undergo On-the-Job Training (OJT) should submit the certificate of completion to
their College/Department. The certificate serves as proof that the students have completed the
OJT program in the company and fulfilled the requirements set by the college or University.
4. Evaluation
During the evaluation, the examiner must check the following points and assign the marks,
• Clear and measurable learning objectives for the evaluation.
• Utilize a combination of quantitative and qualitative assessment methods.
• Assess project outcomes, deliverables, and the application of learned skills.
• Evaluate technical proficiency, problem-solving abilities, and creativity.
• Consider students' communication, collaboration, and teamwork skills.
An evaluator may Provide constructive feedback to students for improvement and growth. An external
examiner will follow the following table while allocating the Marks out of 75. The internal examiner will
allocate the 25 marks in proportion.
Sr No Points Marks Remarks
1 Project 25 Evaluate students' technical skills and proficiency in applying their
Outcomes and theoretical knowledge to real-world tasks during the OJT.
Deliverables
2 Problem- 10 Measure their ability to solve complex problems, think critically, and
Solving and demonstrate creativity in finding innovative solutions.
Creativity
3 Communication 10 Evaluate students' communication skills, how well they interact within a
and group, and their ability to work collaboratively.
Collaboration
4 Project 15 Assess the completeness and quality of project documentation, such as
Documentation design documents, technical specifications, and user guides.
5 Presentation 15 Consider the effective use of visual aids, such as slides, charts, and
multimedia, to enhance the presentation.
Total 75
Note: A project must be guided by regular faculty having Ph.D. If the department does not have any faculty with Ph.D.
degrees, then a synopsis of such students must be approved by the college/department from the subject faculty of adjacent
colleges having Ph.D. Degree faculty and same should work as an internal practical examiners organized by University.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 36
M.Sc. (Computer Science) - I (SEMESTER – II)
Paper Code: 02MSCCS06
Lab - I
Based on 02MSCCS01 & 02MSCCS02)
Credit: 2 Max. Marks: 100
-------------------------------------------------------------------------------------------------------------------
Practical on Web Designing Using ASP.NET (02MSCCS01)
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 37
Practical in DATA WAREHOUSE AND SQL (02MSCCS02)
A. Create a table DONAR with the following fields (Dno, Dname, City, Age, Sex, BG, Quantity, date).
B. Insert the following records into the table DONAR.
Dno Dname City Age Se x BG Quantity Date
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 38
17) Due to certain reasons, all the donors who donated their blood on the date “26-AUG-11” are rejected.
Hence delete their information.
18) Find the donors' names whose first name starts with the letter “A” and ends with “D‟ irrespective of
the case letter.
19) Find the donor names whose last name starts between alphabets “D” to “S” (Ex. DESHPANDE,
SHARMA)
20) Find the total number of donors having the O+Ve group.
21) Find the total quantity of blood of group A+Ve.
22) The average age of female donors of the O+Ve group by rounding the age to the next digit.
23) Display all donors whose name pronounces “AAMIR”.
24) Find the donors who donated their blood in the month of AUG.
25) Find the donors who donated the blood on 15th Aug. of the year.
Functions
Perform the following queries on table donar (Functions)
1. Find the donar names whose first name starts with the letter ‘A’ and ends with ‘D’ irrespective of the
case letter.
(Ex. ANAND) Hint: Use SUBSTR and INSTR functions to extract the first name.
2. Find the donar names whose last name starts between alphabet ‘D’ to ‘S’
(Ex. DESHPANDE, SHARMA)
Hint: Use SUBSTR and INSTR functions to extract the first name.
3. Find the total number of donars having an O+ve group.
4. Find the total quantity of blood of group A+ve.
5. The average age of female donar of the O+ve group by rounding the age to the next digit.
Hint: use Ceil function to round the age to the next digit.
6. Display all donars whose name pronounces like ‘AAMIR’;
7. Find the donars who donated blood in the month of AUG.
8. Find the donars who donated the blood on 15th Aug. of year.
9. Display all donar names in lowercase.
10. Find donars whose first name is five characters long.
11. Find every 3rddonar in the list. Donar numbers are assigned as consecutive no.
➢ Create a table DONAR where the following fields (Donar no., donar name, city, age, Sex,
Blood group, quantity of blood given, date of donation)
2) Write a PL/SQL block to accept the employee number and display his/her job, joining date, and salary of an
employee. Define the variable using % rowtype.
3) Write a PL/SQL block to accept three paper marks and display the result if a student scores more than 35
marks on each paper and also specify the class.
4) Write a PL/SQL block to find the square, cube, and square root of nos. between 1 & 25 using a loop.
5) Write a program to divide a number by a character number. If any error occurs it should be handled
properly, and store the error number and its description in a table called errorh.
6) Write a PL/SQL block to accept and insert valid data into the table patient. Write appropriate user-defined
exceptions.
7) Write a PL/SQL block, to display only the title and quality of all albums stored in the table music album.
8) Write a PL/SQL to delete the records from the table music album where the quantity is less than 4 using a
cursor.
9) Write a PL/SQL block to display the employee all having salary>some value. The value some value can be
passed during execution or through bind variables.
10) Write a PL/SQL block to accept the title and display other information; it must handle the exception
properly.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 40
M.Sc. (Computer Science) - I (SEMESTER – II)
Paper Code: 02MSCCS07
Lab - II
Based on 02MSCCS03 & Selected Elective)
Credit: 2 Max. Marks: 100
-------------------------------------------------------------------------------------------------------------------
Practical on Android Application Development (02MSCCS03)
1. Develop an application that uses GUI components, Font, and Colors
2. Develop an application that uses Layout Managers and event listeners.
3. Develop a native calculator application.
4. Write an application that draws basic graphical primitives on the screen.
5. Develop an application that makes use of the database.
6. Develop an application that makes use of an RSS Feed.
7. Testing your Android development environment perform the following operations.
a. Add the sample application to a project in your Android Studio workspace.
b. Create an Android Virtual Device (AVD) for your sample project.
c. Create a launch configuration for your sample project.
d. Run your sample application in Android Emulator.
8. Write a program to build your first Android Application “Hello World” with common activity.
9. Write a program that will implement the Sub-menu in the Android application.
10. Write a program that will implement the Context menu (Floating List of Menu Items) in the Android
application.
11. Write a program to display the use of Relative Layout Views with different attributes.
12. Write a program to display the use of Linear Layout Views with different attributes.
13. Write a program to implement a menu that uses checkable items in Menu.
14. Write a program to implement a Custom Button and handle the displayed message on the button
press.
15. Write a program to implement the Table layout in View Group that displays child View elements
in rows and columns.
16. Write a program to implement the List View in your Android application.
17. Write a program to implement tween animation and rotate the text in your Android application.
18. Write a sample program to create a progress bar for your Android applications.
19. Write a program to show how to use the Date picker control of ADK in your Android applications.
20. Write a program that enables you to draw an image using a bitmap class object.
21. Implement an application that implements Multi-threading
22. Implement an application that writes data to the SD card.
23. Implement an application that creates an alert upon receiving a message.
24. Write a mobile application that creates an alarm clock
25. Write a program that shows you how to handle any type of interruption in your Android
application.
26. Write a program that allows you to set an image as wallpaper.
27. Write a program that allows you to get images from t h e web and displayed them using the
Image View.
28. Write a program that shows you how to create a scroll view when text is not visible on one
page.
29. Write a program that will show you how to run any video file.
30. Develop a native application that uses GPS location information.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 41
Practical: Cyber Security & IPR (02MSCCS04.1)
1. Introduction to Cyber Security:
• Familiarize students with the basic concepts of cyber security, including threats, vulnerabilities,
and attacks.
• Discuss the importance of cyber security in protecting sensitive information and preventing
unauthorized access.
2. Password Security:
• Teach students about the significance of strong passwords and password management.
• Conduct a hands-on exercise on creating strong passwords and using password managers.
3. Network Security:
• Demonstrate different types of network attacks, such as DoS (Denial of Service) and DDoS
(Distributed Denial of Service) attacks.
• Guide students on implementing basic network security measures, such as firewalls and intrusion
detection systems.
4. Malware Analysis:
• Introduce students to various types of malware, such as viruses, worms, and Trojans.
• Provide practical examples of malware analysis techniques, including static and dynamic
analysis.
5. Social Engineering:
• Explain the concept of social engineering and its impact on cyber security.
• Conduct a simulated phishing exercise to raise awareness about social engineering attacks and
teach students how to identify and avoid them.
6. Web Application Security:
• Discuss common web application vulnerabilities, such as SQL injection and cross-site scripting
(XSS).
• Guide students on performing security assessments and vulnerability scanning on web
applications.
7. Intellectual Property Rights (IPR) Protection:
• Educate students about the importance of IPR and its role in protecting creative works.
• Conduct a case study on copyright infringement and discuss the legal implications.
8. Digital Forensics:
• Introduce students to the field of digital forensics and its role in investigating cybercrimes.
• Provide hands-on experience with digital forensics tools and techniques, such as data recovery
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 42
and analysis.
9. Incident Response:
• Teach students about the incident response process and the steps involved in handling a cyber
security incident.
• Conduct a simulated incident response exercise to help students understand the importance of
timely and effective responses.
10. Ethical Hacking:
• Introduce students to ethical hacking and its role in identifying vulnerabilities and improving
security.
• Guide students on performing ethical hacking exercises, such as penetration testing and
vulnerability assessment.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 43
Practical: SOFT SKILLS (02MSCCS04.2)
Case Study 1: Effective Communication Scenario: Sarah is a project manager leading a team of developers.
She needs to communicate project updates to the stakeholders, including the client and the senior management.
Challenge: Sarah struggles with effectively conveying complex technical information concisely and
understandably.
Case Study 2: Teamwork and Collaboration Scenario: John works in a marketing agency where teamwork and
collaboration are crucial for successful campaign execution. He is assigned to a cross-functional team
responsible for launching a new product.
Challenge: John finds it difficult to collaborate effectively with team members from different departments due
to conflicting opinions and lack of coordination.
Case Study 3: Adaptability and Problem-Solving Scenario: Lisa works as a customer service representative in
a fast-paced retail store. She often encounters challenging situations, such as handling difficult customers or
resolving unexpected issues.
Challenge: Lisa struggles to adapt to rapidly changing circumstances and lacks problem-solving skills to
address customer complaints effectively.
Case Study 4: Leadership and Emotional Intelligence Scenario: Mark is a team leader in a software
development company. He is responsible for managing a team of developers and ensuring timely project
delivery.
Challenge: Mark struggles with motivating and inspiring his team members, resulting in low morale and
decreased productivity.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 44
Practical: DIGITAL AND CYBER FORENSICS (02MSCCS04.3)
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 45
Practical: OPERATION RESEARCH (02MSCCS04.4)
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 46
Practical: DATA VISUALIZATION (02MSCCS04.5)
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 47
M.Sc. (Computer Science) - I (SEMESTER – II)
Paper Code: 02MSCCS08
SEMINAR
Credit: 1 Max. Marks: 50
-------------------------------------------------------------------------------------------------------------------
The seminar must be based on some current trends related to IT/Computer Science/Computer Application.
A student must present the PowerPoint presentation along with Seminar Report. Students are requested to
follow the following guidelines while choosing & preparing their seminars.
Guidelines to Seminar
1) The name of the seminar topic must be the latest on the current trends and should not be repeated. A
student must submit the topic at the beginning of the semester.
2) The Seminar topic is to be approved by the departmental allocated guide.
3) Students are allowed to use graphics/animation/audio-video aids for their presentations.
4) Seminar work will be evaluated by an internal examiner. (Refer to Appendix B)
5) Students are requested to submit their seminar reports on or before the deadline with the concern of their
respective guides otherwise students will be responsible for any appropriate action.
6) The seminar report should be submitted to the department in the following format, printed in double line
space using A4 size bond paper, with a left margin of 1.5” and a right margin of 1.0” with proper spiral
binding to be done. Only one copy needs to be submitted.
7) Students are requested to obtain the necessary certificates and declarations to be duly enclosed in the
report.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 48
Appendix A
Internal Assessment
1. The internal assessment marks shall be awarded by the concerned approved teacher by the university.
2. The internal assessment marks shall be sent to the University after the Assessment in the prescribed
format and direction by University.
3. General guidelines for Internal Assessment are:
a) The internal assessment marks assigned to each theory paper on the basics of the performance in any
two assignments (each of 10 marks) as described below and selected by the concerned teacher.
1. Class Test / Sessional Examination
2. Certification from IIT Spoken Tutorial / Swayam / NPTEL / PARAKH etc.
3. Application-Oriented Case Study/ Project
4. Online Test
5. Theory Assignments
6. Programming Assignments
7. Study tour
8. Industrial visits
9. Visit educational institutions and research organizations, do fieldwork, Conference, etc
10. Group discussions
11. Conference/ Webinar
12. Seminar Presentation
13. Publishing Research Paper
14. Review of Research Papers
15. Open Book Test
16. Participation in Departmental Activities
b) There shall be no separate/extra allotment of workload to the concerned teacher related to the above
assignments. He/ She shall conduct the internal assessment activity during the regular teaching
days/periods as a part of the regular teaching activity.
c) The concerned teacher/department/college shall have to keep a record of all the above activities until
six months after the declaration of the results of that semester.
d) At the beginning of each semester, every teacher/department/college shall inform his / her students
unambiguously of the method he/she proposes to adopt and the scheme of marking for internal
assessment. (Prescribed in the syllabus of respective Subjects)
e) A teacher shall announce the schedule of activity for internal assessment in advance in consultation
with HOD.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 49
Appendix B
Seminar and Practical Marks Distribution
• Seminar
In the Seminar, the student will have to deliver a seminar on any topic relevant to the
syllabus/subject encompassing the recent trends and development in that field/subject. The topic of the
seminar will be decided at the beginning of each semester in consultation with the supervising teachers.
The student has to deliver the seminar which will be followed by a discussion.
The students should submit the seminar report typed and properly bound in one copy to the head of
the department along with a soft copy on CD. The said shall be evaluated by the concerned
supervisor/head of the department. The concerned teacher/department/college shall have to keep a
record of Seminar Reports until six months after the declaration of the results of that semester.
Marks Distribution: A seminar mark will be allocated by Internal Examiner as per the following format
• Practical Assessment:
Time: Minimum 2 Hours 30 Min. for conducting the practical examination subject to the condition of
the availability of computers and printers at the center.
Marks Distribution: Internal (Approved by the University) & External Examiner will allocate the
practical marks in the ratio of (25:75) to students as per the following format. Both examiners together
will fill (upload) the marks on the date of the practical examination.
Sr. No. Particulars Marks in % Time
Writing, Execution, and Printout of
a. 40% 1 Hour
Program-I
b. Writing Program/Case Studies-II 20% 30 Min
c. Practical Record 20%
d. Viva Voce 20%
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 50
Appendix C
The Pattern of the Question Paper
General Rules and Regulations regarding a pattern of question papers for the semester-end
examinations as given below:
1. There will be four units in each paper.
2. The maximum mark for each theory paper will be 80.
3. The question paper will consist of five questions, each with 16 marks.
4. Four questions will be based on four units with internal choice.
5. The fifth question will be compulsory with questions from each of the four units having
equal weightage and there will be no internal choice.
M.Sc. (Computer Science)
Year : [I/II] Semester : [I/II/III/IV]
Paper Code: Paper: Name of Paper
Time: 3 Hours] [Max. Marks: 80
Note 1) All questions are compulsory and carry equal marks.
2) Draw a Neat and Labeled diagram and use supporting data wherever necessary.
3) Avoid vague answers and write specific points/answers to related questions.
M.Sc. (Computer Science) Sem - I & II (NEP 2020), Gondwana University, Gadchiroli 51