MCA 2nd Sem Detailed Syllabus
MCA 2nd Sem Detailed Syllabus
MCA (2 YR)
DETAILED SYLLABUS
SEMESTER-II
Table-I
CODE Elective-I
MCA23 510T Advanced web Technology
MCA23 511T Cloud Computing
MCA23 512T Data warehousing and Data mining
MCA23 512T Natural Language Processing
MCA23 514T Malware Analysis and Intrusion Detection
MCA23 515T Bioinformatics And Sequence Analysis
MCA23 516T Cyber Security
Signature Signature
Internal Member External Member / Expert
Girijananda Chowdhury University
Course Code Course Title Hours Per Week Course Credit
L-T-P Type
MCA23 506T Data Structure and algorithms 3-0-0 DSCC 3
Course Outcomes: After completing this course, the students would be able to
1. Students will be able to learn about the basic properties of an algorithm and what are the important points one has to
consider while designing an efficient and correct algorithm.
2. Students will be able to analyze the running time of an algorithm for all possible input.
3. Students will be able to learn and analyze a variety of algorithm design techniques such as divide and conquer
algorithms, dynamic programming, greedy methods etc.
Text Books:
1. Classic Data Strcurure : By D Samanta ,PHI
2. Data Structure Through C++ By Y Kanetkar, BPB Publication
3. Weiss, Data Structures and Algorithm Analysis in C++, Pearson Education
4. Introduction to Algorithms, T Cormen,C,Leiserson,R. Rivest,C.Stein,PHI Publication
Reference Books:
1. Data Structures: A Pseudocode Approach with C, 2nd Edition, R. F. Gilberg and B.A. Forouzan,
Cengage Learning.
2. Programming in ANSI C, 5th ed, E. Balaguruswamy, TMH
Signature Signature
Internal Member External Member / Expert
Girijananda Chowdhury University
Course Outcomes :
At the end of the course the student will be able to
CO 1: Illustrate the concept of databases, database management systems, database languages, databasestructures
and their work
CO 2: Apply ER modelling and Relational modelling for designing simple databases.
CO 3: Summarize the concepts related to relational model and SQL and Write database queries usingrelational
algebra and structured query language.
CO 4: Design and develop databases from the real world by applying the concepts of Normalization.
CO 5: Outline the issues associated with Transaction Management and Recovery,
Signature Signature
Internal Member External Member / Expert
Girijananda Chowdhury University
Course Code Course Title Hours Per Week Course Credit
L-T-P Type
MCA23 508T Object Oriented Programmimg Using Java 3-0-0 DSCC 3
This course is about the fundamentals of Object-Oriented Programming (OOP) Concept and OOP-based software development
methodology. Java as a class-based and pure OOP language is used to demonstrate and implement appropriate concepts and
techniques. The students are exposed to the concepts, fundamental syntax, and the thought processes behind object-oriented
programming. By end of the course, students will acquire the basic knowledge and skills necessary to implement object-
oriented programming techniques in software development using Java.
Course Outcomes
CO 1: Define, understand, and differentiate the Object Oriented concepts and Java Programming concepts;
CO 2: Apply object oriented concepts on real time scenarios.
CO3 : Use Exception handling and multithreading mechanisms to create efficient software applications.
CO 4: Utilize modern tools and collection framework to create Java applications to solve real world problems
CO5 : Design and develop GUI based applications using applets and swings for internet and system based applications.
Text Books/Reference:
Signature Signature
Internal Member External Member / Expert
Girijananda Chowdhury University
Course Code Course Title Hours Per Week Course Credit
L-T-P Type
MCA23 509T Data Communication and Computer 3-0-0 DSCC 3
Networks
COURSE OBJECTIVE:
1. Independently understand basic computer network technology, Data Communications System and its components.
Identify the different types of network topologies and protocols.
2. Enumerate the layers of the OSI model and TCP/IP. Explain the function(s) of each layer.
3. Identify the different types of network devices and their functions within a network
4. Understanding the different networking layers protocols.
5. Understand and transport layer and application layer protocols and its applications in real world problem.
COURSE OUTCOME:
After the completion of the course, the student will be able to:
1. CO1: Understand the architectural principles of computer networking and compare different approaches to organising
networks.
2. CO2: Analyze and apply various routing algorithms to find shortest paths for packet delivery.
3. CO3: Explain the details of Transport Layer and application layer Protocols and analyze the features and operations of
various protocols
4. CO4: To study about various types of wireless networks and understand the challenges in wireless.
Signature Signature
Internal Member External Member / Expert
ELECTIVE-I COURSES
Girijananda Chowdhury University
Course Code Course Title Hours Per Week Course Credit
L-T-P Type
MCA23 510T Advanced Web Technology 3-1-0 DSCC 4
Prerequisite: Web Technology
Course Objective :
This course enables the students:
1. Understand the fundamentals of web services architecture and design principles.
2 Learn how to implement web services using SOAP and RESTful APIs.
3. Understand the principles of microservice architecture and design patterns
4. Understand the evolution of the internet and the concept of Web 3.0.
5. Understand the fundamentals of the metaverse, including virtual reality (VR), augmented reality (AR), and mixed
reality (MR)
Course Outcomes:
After the completion of this course, students will be able to:
1. Explore the fundamentals of the metaverse, including virtual reality (VR), augmented reality (AR), and mixed
reality (MR)
2. Examine the underlying technologies driving Web 3.0 and the metaverse, such as blockchain, decentralized finance
(DeFi), and non-fungible tokens (NFTs), Smart contracts and decentralized autonomous organizations (DAOs)
3. Blockchain technology and its applications
4. Know Webservices Architecture
5. Know Microservices building blocks
Reference Book:
8. Java Web Services Architecture, McGovern, Sameer Tyagi etal.., Elsevier.
9. Web Services, G. Alonso, F. Casati and others, Springer, 2005
10. Microservices from Theory to Practice Creating Applications in IBM Bluemix Using the Microservices Approach, Shahir
Daya, Nguyen Van Duy; RedBooks.
Signature Signature
Internal Member External Member / Expert
Girijananda Chowdhury University
Course Code Course Title Hours Per Week Course Credit
L-T-P Type
MCA23 511T Cloud Computing 4-0-0 DSCC 4
Prerequisite: Web Technology
Course Objective :
1. Understand the elements of distributed computing and core aspects of cloud computing.
2. Understand the concepts and aspects of virtualization and application of virtualization technologies in cloud
computing environment.
3. Understand the architecture and concept of different cloud models: IaaS, PaaS, SaaS and gain comprehensive
knowledge of different types of clouds.
4. Be familiar with application development and deployment using services of different cloud computing technologies
provider: Google app Engine, Amazon Web Services (AWS) and Microsoft Azure.
5 Understanding the key security, compliance, and confidentiality challenges in cloud computing.
6 Understand the commonly used cloud programming platforms, tools, and simulator.
Course Outcomes :
After the completion of this course, students will be able to:
1. Recall the various aspects of cloud computing and distributed computing
2. Understand the specifics of virtualization and cloud computing architectures.
3. Develop and deploy cloud application using services of different cloud computing technologies provider: Google
app Engine, Amazon Web Services (AWS) and Microsoft Azure.
4. Evaluate the security and operational aspects in cloud system design, identify and deploy appropriate design
choices when solving real-world cloud computing problems.
5. Provide recommendations on cloud computing solutions for an enterprise.
Reference Books:
1. Borko Furht Armando Escalante, Hand book of Cloud Computing, Editors, springer Publication.
2. Judith Hurwitz, Robin Bloor, Marcia Kaufman, Fern Halper, Cloud Computing for Dummies, Wiley Publication.
3. John W. Rittinghouse, JamesF. Ran some, Cloud Computing: Implementation, management and security, CRC Press,
Taylor and Francis Publication.
Signature Signature
Internal Member External Member / Expert
Girijananda Chowdhury University
Course Objective : The objective of this course is to learn about data warehousing , how to create data warehouses and thus
retrieving information from data warehouse using different tools.
Course Outcome:
CO1: Understand essential data mining and data warehousing concepts and explore datasets effectively.
CO2: Master classification techniques and evaluate classifier performance.
CO3: Develop skills in association analysis and overcome data mining challenges.
CO4: Understand clustering techniques and web data mining fundamentals, exhibiting competence in these areas.
Signature Signature
Internal Member External Member / Expert
Girijananda Chowdhury University
Course Outcome
CO1: Understand fundamental NLP concepts, gaining insights into text data processing techniques and developing skills in
tokenization, corpora analysis, and text normalization.
CO2: Explore N-Grams, evaluate language models, comprehend lexical and vector semantics, and delve into the world of
word embeddings.
CO3: Acquire proficiency in advanced NLP topics such as sequence models, Hidden Markov Models, neural networks,
convolutional and recurrent neural networks, attention mechanisms, transformers, and transfer learning.
CO4: Apply Naive Bayes classifiers, optimize sentiment analysis, address ethical concerns in classification, and master the
evaluation of models using metrics like precision, recall, and F-measure.
Nitin Indurkhya and Fred J. Damerau, ―Handbook of Natural Language Processing, Second Edition, Chapman
1.
and Hall/CRC Press, 2010.
2. Breck Baldwin, ―Language Processing with Java and LingPipe Cookbook, Atlantic Publisher, 2015.
3. Carlo Ghezzi, Mehdi Jazayeri, Fundamentals of Software Engineering, PHI
Signature Signature
Internal Member External Member / Expert
Girijananda Chowdhury University
Course Code Course Title Hours Per Week Course Credit
L-T-P Type
MCA23 514T Malware Analysis and Intrusion Detection 4-0-0 DSCC 4
Course outcome:
CO 1: To understand the concept of malware and reverse engineering.
CO 2: Implement tools and techniques of malware analysis.
CO 3: Implement tools and techniques of malware detection .
II Basic Malware Manual Malware Infection analysis, signature based malware detection and 9
Analysis classification – pros and cons, and need for machine learning based techniques
III Advanced Static Analysis, Dynamic Analysis and Hybrid Analysis of Windows Malware, Linux 9
Techniques Malware and Android Malware
Malware
Analysis
IV Basic Intrusion Intrusion into network – Firewalls, Rule based techniques, signature based 9
Detection Techniques, Simple Machine Learning Models on Network Data
V Advanced Advanced Machine Learning Models for Intrusion Detection in IT Networks, 9
Intrusion Machine Learning in OT network especially with Cyber Physical Systems
Detection
Total 45
1. Stephen Northcutt and Judy Novak , Network Intrusion Detection”, 3rd edition by. ISBN: 0735712654.
2. Extrusion Detection: Security Monitoring for Internal Intrusions By Bejtlich, Pearson Education.
3. Guide to Intrusion Detection and Prevention Systems (IDPS) Recommendations: Recommendations of the National
Institute of Standards and Technology by Karen Scarfone and Peter Mell.
4. IETF RFC/RFP/standards related to Intrusion detection.
5. CCNP Security: Intrusion Prevention and Intrusion Detection Systems. By David Burns, OdunayoAdesina, Keith
Barker, Cisco Press.
6. Intrusion Detection and correlation: challenges and solutions: by Christopher Kruegel, Fredrik Valeur, Giovanni
Vigana, Advances in Information Security Volume 14, ISBN 0-387-23398-9 2005 Springer
Signature Signature
Internal Member External Member / Expert
Girijananda Chowdhury University
Course Code Course Title Hours Per Week Course Credit
L-T-P Type
MCA23 516T Introduction To Cyber Security 3-1-0 DSCC 4
Pre-requisite : NIL
Course Objectives:
1. Understand the field of digital security and concepts of access control mechanism.
2. To introduce keywords and jargons involved in securing browser
3. Understanding network basic and familiarize on security of network protocols
4. Awareness and understanding on cyber-attacks and data privacy
Course Outcomes:
1. Apply a solid foundation in digital security and measures taken to protect device from threats.
2. Learning access control mechanism and understand how to protect servers
3. Understand the importance of a network basics and brief introduction on security of network protocols
4. To understand cyber-attacks and learn data privacy issues and preventive measures
1 Introduction Security threats - Sources of security threats- Motives - Target Assets and 15
vulnerabilities – Consequences of threats- E-mail threats - Web-threats -
Intruders and Hackers, Insider threats, Cyber crimes. Network Threats: Active/
Passive – Interference – Interception –Impersonation – Worms –Virus – Spam’s
– Ad ware - Spy ware – Trojans and covert channels –Backdoors – Bots – IP,
Spoofing - ARP spoofing - Session Hijacking - Sabotage-Internal treats
Environmental threats - Threats to Server security.
2 Security Risk Assessment - Forensic Analysis - Security threat correlation –Threat 10
Threat awareness - Vulnerability sources and assessment- Vulnerability assessment
Management tools –Threat identification - Threat Analysis - Threat Modelling - Model for
Information Security Planning.
3 Security Authorization and Authentication - types, policies and techniques – Security 10
Elements certification - Security monitoring and Auditing - Security Requirements
Specifications – Security Policies and Procedures, Firewalls, IDS, Log Files,
Honey Pots
4 Access control Trusted Computing and multilevel security - Security models, Trusted 10
Systems,Software security issues, Physical and infrastructure security, Human
factors – Security awareness,training , Email and Internet use policies.
Signature Signature
Internal Member External Member / Expert
Girijananda Chowdhury University
Course Code Course Title Hours Per Week Course Type Credit
L-T-P
MCA23 508P Object Oriented Programming Lab using Java 0-0-4 DSCC 2
Prerequisite: NA
Course Objectives:
This course is about the implementation of Object-Oriented Programming (OOP) Concept using Java Programming Language.
Java as a class-based and pure OOP language is used to demonstrate and implement appropriate concepts and techniques. The
students are exposed to the concepts, fundamental syntax, and the thought processes behind object-oriented programming. By
end of the course, students will acquire the basic knowledge and skills necessary to implement object-oriented programming
techniques in software development using Java.
Course Outcomes (COs): At the end of the course, student will be able to
1 Understand the basic structure of Java Programming Language and the Object Oriented concepts in Java Programming
2 Use Exception handling and Multithreading concept tocreate efficient software applications.
3 Design and develop GUI based applications using swings
2 Write a Java program to find the sum of even numbers upto 100.
5 Write a Java program to read the different types of data from the user and display that data using command line
arguments.
6 Write a Java program that prompts the user for an integer and then prints out all prime numbers up to that integer
7 Write a Java Program to define a class, describe its constructor, overload the Constructors and instantiate its object
8 Write a Java Program to define a class, define instance methods and overload them and use them for dynamic
method invocation
9 Write a Java Program to implement inheritance and demonstrate use of method overloading
10 Write a Java Program to implement inheritance and demonstrate use of method overriding
11 Write a Java Program to implement multilevel inheritance by applying various access controls to its data members and
methods
12 Write a program to demonstrate use of implementing interfaces
13 Write a program to demonstrate use of extending interfaces
14 Write a Java program to implement the concept of importing classes from user defined package and creating
packages
15 Write a program to implement the concept of threading by extending Thread Class
16 Write a program to implement the concept of threading by implementing Runnable Interface
17 Write a program to implement the concept of Exception Handling using predefined exception
Signature Signature
Internal Member External Member / Expert
18 Write a program to implement the concept of Exception Handling by creating user defined Exceptions
Text Books/Reference:
Signature Signature
Internal Member External Member / Expert
Girijananda Chowdhury University
Course Code Course Title Hours Per Week Course Credit
L-T-P Type
MCA23 508P DBMS Lab 0-0-4 DSCC 2
Prerequisite: NA
Course Objectives:
1. This Course will enable students to
2. Populate and query a database using SQL DDL/DML Commands
3. Declare and enforce integrity constraints on a database
4. Writing Queries using advanced concepts of SQL
5. Programming PL/SQL including procedures, functions, cursors and triggers
Course Outcomes:
1. At the end of the course the student will be able to:
2. Utilize SQL to execute queries for creating database and performing data manipulation
operations
3. Examine integrity constraints to build efficient databases
4. Apply Queries using Advanced Concepts of SQL
5. Build PL/SQL programs including stored procedures, functions, cursors and triggers
List of Experiments:
1) Execute all DDL, DML and DCL commands on sample tables.
2) Implementation of different types of operators and built-in functions with suitable examples
3) Implementation of different types of joins with suitable examples
4) Create views, partitions, Sequence, Indexes and locks for a particular DB
5) Implement different types of constraints on relations.
6) Implementation of sub queries and nested queries.
7) Implement Queries on Group By & Having Clauses, ALIAS, Sequence By, Order By
8) Control Structure
a) Write a PL/SQL block for Addition of Two Numbers
b) Write a PL/SQL block for IF, IF and else condition
c) Write a PL/SQL block for implementation of loops
d) Write a PL/SQL block for greatest of three numbers using IF and ELSEIF
9) Exception Handling- Implement the following with respect to exception handling. Raising
Exceptions, User Defined Exceptions, Pre-Defined Exceptions
10) Write PL/SQL block for an application using exception handling Procedures
a) Write a PL/SQL Procedure using Positional Parameters
b) Write a PL/SQL Procedure using notational parameters
c) Write a PL/SQL Procedure for GCD Numbers
d) Write a PL/SQL Procedures for cursor implementation (explicit and implicit cursors)
11) Functions:
a) Write a PL/SQL block to implement factorial using functions
b) Write a PL/SQL function to search an address from the given database
12) Write a DBMS program to prepare Pl/SQL reports for an application using functions.
13) Triggers:
a) Write a Trigger to pop-up the DML operations
b) Write a Trigger to check the age valid or not Using Message Alert.
c) Create a Trigger to Raise appropriate error code and error message.
d) Create a Trigger on a table so that it will update another table while inserting values
14) Write PL/SQL block for an application using cursors and all types
oftriggers.
15) Write a PL/SQL block for transaction operations of a typical
applicationusing package
Text Books:
1) Oracle: The Complete Reference by Oracle Press
2) Nilesh Shah, "Database Systems Using Oracle”, PHI, 2007
3) Rick F Vander Lans, “Introduction to SQL”, Fourth Edition, Pearson Education, 2007
4) Quality Software Project Management, Futrell,Donald F. Shafer, Donald I. Shafer, PEA
Signature Signature
Internal Member External Member / Expert