bvrit hyderabad college of engineering for women...
TRANSCRIPT
BVRIT HYDERABAD
COLLEGE OF ENGINEERING FOR WOMEN
Department of IT
Consolidated Course Outcomes –R13
Course codes/Subject Codes
SL No Subject NBA Code JNTU Code
I Year
1 English C101 A10001
2 Mathematics-1 C102 A10002
3 Mathematical Methods C103 A10003
4 Engineering Physics C104 A10004
5 Engineering chemistry C105 A10005
6 Computer Programming C106 A10501
7 Engineering Drawing C107 A10301
8 Computer Programming Lab C108 A10581
9 Engineering Physics/Engineering chemistry
lab.
C109 A10081
10 English Language Communication Skills
Lab
C10A A10083
11 IT Workshop/Engineering Workshop C10B A10082
II Year I Semester
12 Probability & Statistics C211 A30008
13 Mathematical Foundations of Computer
Science C212 A30504
14 Data Structures C213 A30502
15 Digital Logic Design& Computer
Organization C214 A30402
16 Electronic Devices and Circuits C215 A30404
17 Basic Electrical Engineering C216 A30202
18 Electrical and Electronics Lab C217 A30282
19 Data Structures Lab C218 A30582
II Year – II Semester
20 Principles of Programming Languages C221 A40511
21 Database Management Systems C222 A40507
22 Java Programming C223 A40503
23 Environmental Studies C224 A40009
24 Data Communication C225 A40409
25 Design and Analysis of Algorithms C226 A40508
26 Java Programming Lab C227 A40585
27 Database Management Systems Lab C228 A40584
III Year – I Semester
28 Automata and Compiler Design C311 A50513
29 Linux Programming C312 A50517
30 Software Engineering C313 A50518
31 Operating Systems C314 A50510
32 Computer Networks C315 A50515
33 Managerial Economics and Financial
Analysis
C316 A50010
34 Operating Systems Lab C317 A50589
35 Computer Networks Lab(Through Linux) C318 A50588
III Year – II Semester
36 Web Technologies C321 A60512
37 Open Elective-Human values & Professional
Ethics
C322 A60018
Open Elective-Intellectual Property Rights C323 A60017
Open Elective-Disaster Management C324 A60117
Open Elective-Introduction to Analytics
( Associate Analytics – 1)
C325 A116FA
Open Elective-Information Security
Management ( Security Analyst-1 )
C326
38 Object Oriented Analysis and Design C327 A60524
39 Data Warehousing and Data Mining C328 A60520
40 Software Testing Methodologies C329 A60525
41 Cloud Computing C32A A60519
42 Data Mining &Web Technologies Lab C32B A60592
43 Advanced Communication Skills Lab C32C A60086
IV Year – I Semester
44 Information Security C411 A70522
45 Design Patterns C412 A70530
46 Mobile Application and Development C413 A70535
47 Information Retrieval Systems C414 A70533
48
ELECTIVE-I Wireless Networks and
Mobile Computing
C415 A70541
ELECTIVE-I : Image Processing and
Pattern Recognition
C416 A70532
ELECTIVE-I : Soft Computing C417 A70539
ELECTIVE-I : Semantic Web and Social
Networks
C418 A70538
ELECTIVE-I : Operations Research C419 A70352
ELECTIVE-I: Big data analytics
(Associate Analytics – 2)
C41A 117JU
ELECTIVE-I: Information Security
Assessments & Audits
( Security Analyst-2 )
C41B
49 ELECTIVE-II : Software Project
Management
C41C A70540
ELECTIVE-II : Computer Graphics C41D A70529
ELECTIVE-II : Human Computer
Interaction
C41E A70531
ELECTIVE-II : Scripting Languages C41F A70537
ELECTIVE-II : Computer Forensics C41G A70528
50 Case Tools & Software Testing Lab C41H A70593
51 Mobile Application Development Lab C41I A70597
IV year II Semester
52 Management Science C421 A80014
53 ELECTIVE-III Web Services C422 A80551
ELECTIVE-III E-Commerce C423 A80544
ELECTIVE-III Middleware Technologies C424 A80546
ELECTIVE-III Ad hoc and Sensor
Networks
C425 A80542
ELECTIVE-III Predictive Analytics C42E 118GM
ELECTIVE-III Security Analyst-3 C42F
54
ELECTIVE-IV Multimedia & Rich Internet
Applications
C426 A80547
ELECTIVE-IV Artificial Intelligence C427 A80526
ELECTIVE-IV Storage Area Networks C428 A80550
ELECTIVE-IV Machine Learning C429 A80534
55 Industry Oriented Mini Project C42A A80087
56 Seminar C42B A80089
57 Project Work C42C A80088
58 Comprehensive Viva C42D A80090
II Year – I Sem
Course
Code
Course Name CO No. Course Outcomes
C211 Probability&
Statistics
C211.1 Analyze and interpret statistical data using appropriate probability distributions
C211.2 Illustrate and relate the concepts of random variables with their MGF and PDF.
C211.3 Formulate multiple random variables and evaluate correlation and regression.
C211.4 Conceptualize the need of testing of hypothesis and estimations.
C211.5 Apprehend Queuing models and apply appropriate queuing model, mainly M/M/1 model.
C211.6 Perform a stochastic process and classification of Markov chain and Markov process.
C212 Mathematical
foundation of
Computer Science
C212.1 Apply mathematical logic to prove, reason and infer the statements
C212.2 Model the mathematical problems using sets, functions and relations.
C212.3 Apply combinations and permutations to various problems
C212.4 Demonstrate the usage of groups and subgroups
C212.5 Solve the recursive functions by converting into recurrence relations
C212.6 Construct the graphs for the real-world problems to solve them.
C213 Data Structures C213.1 Analyze performance of various algorithms
C213.2 Make use of the functionality of linear data structures
C213.3 Model the solutions using non-linear data structures
C213.4 Choose appropriate searching and sorting technique for a given problem
C213.5 Inspect the behavior of various search trees
C213.6 Solve real time applications using appropriate pattern matching algorithms
C214 Digital Logic
Design &
Computer
C214.1 Perform operations using various number systems and their conversions.
C214.2 Construct canonical and standard forms using Boolean algebraic theorems.
C214.3 Minimize the circuits using K-Maps
Organization C214.4 Design various combinational circuits.
C214.5 Develop synchronous and asynchronous sequential circuits.
C214.6 Choose appropriate memory for the given application.
C215 Electronic Devices
and Circuits
C215.1 Analyze the construction, principle of operation and characteristics of PN junction diode
C215.2 Differentiate various types of diodes and their applications.
C215.3 Design biasing circuits to maintain a stable operating point based on given specifications.
C215.4 Choose appropriate BJT configuration for a given application.
C215.5 Evaluate the characteristics of BJT and FET devices.
C215.6 Analyze the amplifier configurations of BJT and FET devices using h parameters.
C216
Basic Electrical
Engineering
C216.1 Analyze DC electric circuits with basic electrical components.
C216.2 Examine various periodic wave forms for single phase AC circuits.
C216.3 Categorize the DC machines based on their excitation
C216.4 Compute losses and efficiency by testing DC machines using various methods
C216.5 Expound the working and performance of a Single Phase Transformer and three phase
induction motor
C216.6 Classify measuring instruments and list their essential features
C217 Electrical &
Electronics Lab
C217.1 Illustrate and verify various electrical circuit theorems.
C217.2 Plot the performance characteristics of DC & AC Machines.
C217.3 Sketch the characteristics of various diodes and transistors.
C217.4 Evaluate diode rectifiers with and without filters.
C218 Data Structures
Lab
C218.1 Implement operations on linear data structures
C218.2 Choose appropriate sorting technique for the given list
C218.3 Perform operations on graphs and trees
C218.4 Select relevant algorithm for pattern matching
II Year- II Sem
Course
Code
Course Name CO No. Course Outcomes
C221
Principles of
Programming
Languages
C221.1 Identify the building blocks of various Programming languages
C221.2 Implement various methods to describe syntax and semantics of programming languages
C221.3 Make use of Data types and Control Structures for programming and scripting
C221.4 Develop subprograms for functional programming languages
C221.5 Apply object oriented concepts in programming
C221.6 Handle exceptions and concurrency
C222 Database
Management
Systems
C222.1 Identify and classify the components of Database system
C222.2 Model the data using ER model and convert into Relational Model
C222.3 Access and manipulate the data in the databases
C222.4 Refine the database schema to improve data consistency
C222.5 Ensure the properties of transactions on databases
C222.6 Examine different file organizations and indexing methods.
C223 Java Programming C223.1 Illustrate Object Oriented concepts and basics of java programming
C223.2 Make use of the concepts of packages and Interfaces
C223.3 Implement the concepts of multithreading and /or handle run time errors for Java
applications
C223.4 Utilize collection framework and /or file management in Java applications
C223.5 Design real time applications using event handling concepts.
C223.6 Develop real time GUI applications using applet, AWT, JDBC and swings
C224
Environmental
Studies
C224.1 Discover knowledge regarding environment and its components.
C224.2 Understand the classification, importance and conservation of natural resources.
C224.3 Perceive the knowledge regarding different Bio -Geo classification of India.
C224.4 Examine impacts of pollution on the environment and their control measures.
C224.5 Analyze Environmental laws and Environmental Impact Assessments.
C224.6 Determine sustainable development that aims to meet raising human needs.
C225 Data
Communication
C225.1 Illustrate the concepts of data communication, network architecture and protocols
C225.2 Demonstrate the knowledge of wired and wireless media for data transmission
C225.3 Illustrate the basic telephone call procedure with the help of hardware components
C225.4 Detect and correct errors in peer-to-peer communication system.
C225.5 Differentiate asynchronous and synchronous voice based modem in terms of delay and
speed.
C225.6 Discuss the basic building blocks and significance of MODEM in communication
systems
C226 Design and
Analysis of
Algorithms
C226.1 Analyze the performance of algorithms and represent using relevant notations.
C226.2 Model various engineering problems using graphs and trees.
C226.3 Apply suitable paradigm to design efficient algorithms for wide-range of problems.
C226.4 Reduce the search space of a problem using bounding functions.
C226.5 Choose an appropriate data structures for the design
C226.6 Identify P, NP, NP-Hard and NP-Complete problems to suitable techniques
C227 Java Programming
Lab
C227.1 Make use of JDK platform for developing java programs
C227.2 Solve real world problems using object oriented approach
C227.3 Build programs using abstract classes and multithreading concepts
C227.4 Develop programs using GUI components
C228 Database C228.1 Design conceptual model (E-R model) for the given database
Management
Systems Lab
C228.2 Formulate the queries using DML,DDL,DCL commands.
C228.3 Enforce integrity constraints on databases.
C228.4 Implement triggers, stored procedures and cursors.
III Year-I Sem
Course Code Course Name CO No. Course Outcomes
C311
Automata and
Compiler
Design
C311.1 Design lexical analyzer for compiler using automata
C311.2 Design a parser of compiler for syntax analysis
C311.3 Construct Syntax directed definitions for operations of compiler
C311.4 Examine storage allocation mechanisms to allocate the memory during runtime
C311.5 Apply optimization techniques on intermediate and target code.
C311.6 Design the code generator for a compiler
C312
Linux
Programming
C312.1 Illustrate the importance of Linux utilities
C312.2 Develop Shell scripts using bash
C312.3 Illustrate the file concepts and implement various system calls
C312.4 Handle process and signals used in system programming
C312.5 Implement different IPC mechanisms
C312.6 Implement the concepts of shared memory and socket programming
C313
Software
Engineering
C313.1 Illustrate software process framework and models for the development of software
application.
C313.2 Analyze and validate the requirements engineering strategy for developing software
requirements document
C313.3 Choose appropriate model to create an architectural design
C313.4 Apply various testing strategies to verify the software quality
C313.5 Illustrate the importance of framework for product metrics
C313.6 Identify the risk strategies and QA techniques for developing quality software
C314 Operating
Systems
C314.1 Analyze the functionalities and process management of a generic Operating System
C314.2 Select relevant process scheduling, concurrency and synchronization mechanisms
C314.3 Examine various Memory management techniques
C314.4 Explore file system interface and its implementation as well as mass storage structure
C314.5 Explore deadlock detection and prevention mechanisms
C314.6 Examine and identify the appropriate protection and security mechanisms for OS.
C315
Computer
Networks
C315.1 Compare OSI, TCP/IP Reference Model and explore transmission media in physical
layer
C315.2 Explore various design issues and protocols of Data link layer
C315.3 Analyze various access control mechanisms and different internetworking device and
protocols
C315.4 Explore the design issues of network layer and Identify the suitable routing algorithm
for the underlying network
C315.5 Analyze different network layer addressing schemes and operations of support
protocols along with the services provided by the transport layer.
C315.6 Explore operations of various transport layer protocols as well as user interface
protocols
C316 Managerial
Economics &
Financial
Accountancy
C316.1 Apply economic concepts and theories in decision – making Process.
C316.2 Discuss Cost Analysis and determine price-output strategies.
C316.3 Interpret Input-Output relationship with returns to scale.
C316.4 Analyze true economic environment to estimate exact capital budgeting.
C316.5 Compute Ratio Analysis.
C316.6 Analyze the accounting decisions that affect financial reports
C317 Operating
Systems Lab
C317.1 Evaluate CPU Scheduling Algorithms
C317.2 Assess different file allocation and organization techniques.
C317.3 Construct deadlock detection and avoidance algorithms.
C317.4 Evaluate different memory management techniques.
C318 Computer
Networks Lab
C318.1 Implement various data link layer framing methods and error detection mechanisms
C318.2 Design the shortest route between source and destination in the network.
C318.3 Design a broadcast tree for the given subnet and cipher text using DES algorithm and
also decipher it.
C318.4 Create public key encryption to encode the given text using cryptography
III Year-II Sem
Course Code Course Name CO No. Course Outcomes
C321 Web Technologies C321.1 Design dynamic web based applications using PHP
C321.2 Analyze XML tags and parsing of XML data in Java
C321.3 Develop server side programming using servlet and connect to the database
using JDBC.
C321.4 Develop server side programming using JSP and connect to the database using
JDBC.
C321.5 Validate the web application at the client side using JavaScript.
C321.6 Build dynamic web based applications using AJAX, PHP and JSP.
C322
Human Values and
Professional Ethics
C322.1 Take part in inculcation of human values with technical education such that
sustained solutions to the root cause of problems emerge.
C322.2 Perceive that, verification based on natural acceptance and experiential
validation is the key to happiness.
C322.3 Appraise different activities of, the Body, ‘I’ (self) and their corresponding
needs.
C322.4 Compile activities related to proper upkeep of the body and ensure right
utilization of body and mind.
C322.5 Narrate various social issues and come up with solutions through right
evaluation and exhibit willful adherence to values in difficult situations.
C322.6 Analyze the root cause of ethical dilemma at various situations and utilize
knowledge to mutually enrich in professional life.
C323 Intellectual Property
rights
C323.1 Explore different types of intellectual properties (IPs) and their roles in
contributing to organizational competitiveness
C323.2 Demonstrate Crucial role of IP in organizations of different Industrial sectors
for the purposes development
C323.3 Contrast the Crucial role of IP for the purposes Publishing, Copy Right etc.
C323.4 Illustration of IP in organizations of different Industrial sectors for Trade
Secret, and Implementing
C323.5 Evaluation of IP in Industrial sectors for obtaining and maintaining Trade Mark
law and International Trade Mark Law
C323.6 Interpretation of different levels of Infringement
C324 Disaster Management C324.1 Elaborate the concept of Disaster Management and its importance
C324.2 Identify various types of disasters
C324.3 Analyze the effects of endogenous hazards
C324.4 Analyze the effects of exogenous hazards
C324.5 Analyze the effects of chemical and biological hazards
C324.6 Categorize the Emerging approaches in Disaster Management
C325 Introduction to
Analytics, Associate
Analytics – 1
C325.1 Develop the R programs and applications for business analysis with due
importance to quality & standards adherence.
C325.2 Implement probability distribution functions in R for various datasets.
C325.3 Choose the required strategies for time management, work management and
work prioritization.
C325.4 Develop programs to work with NoSQL & SQL databases using appropriate
packages in R.
C325.5 Compute the Regression analysis, correlation, ANOVA model and
heteroscedasticity using R .
C325.6 Relate engineering process with Business Intelligence Process and choose
appropriate smart tools for requirements gathering.
C326 Information Security
Management Security
Analyst-1
C326.1 Analyze threats, attacks, Security Issues and Measures for an organization.
C326.2 Distinguish the characteristics of critical KEY Elements and Logical Elements
of Network.
C326.3 Survey the Data Leakage statistics and KPI of database security.
C326.4 Explore security Policies, procedures and audits of an organization.
C326.5 Examine roles and responsibilities of an information security analyst.
C326.6 Audit the security risk and mitigation mechanisms.
C327 Object Oriented
Analysis and Design
C327.1 Summarize the basics of modeling and artifacts in software development life
cycle.
C327.2 Apply appropriate static modeling to capture the structural aspects of the
software system using class and object diagrams.
C327.3 Choose appropriate dynamic modeling to capture the behavioral aspects of the
software system using use case, activity and interaction diagrams.
C327.4 Evaluate the importance of real-time systems, and model the events and
processes using state chart, component and deployment diagrams.
C327.5 Build models for any given case study by using appropriate framework and
design patterns.
C327.6 Apply forward and reverse engineering using Star UML case tools to ease
software development life cycle.
C328 Data Warehousing
and Data Mining
C328.1 Identify the necessity of data warehouse and data mining functionalities.
C328.2 Design a data warehouse schema and perform various OLAP operations on it.
C328.3 Apply data pre-processing techniques to make datasets to be ready for mining.
C328.4 Identify the frequent patterns and write association rules from the transactional
datasets.
C328.5 Classify the data using various classifiers and evaluate the accuracy.
C328.6 Apply clustering and outlier detection techniques on the given datasets.
C329 Software Testing
Methodologies
C329.1 Identify the need of testing and different types of bugs.
C329.2 Analyze concepts of path testing and their applications
C329.3 Implement transaction flow testing, dataflow testing and domain testing
strategies
C329.4 Explore path products and path expressions and detect the anomaly
C329.5 Analyze state graphs ,graph matrix and their applications
C329.6 Explore different software testing tools
C32A
Cloud Computing C32A .1 Explore distributed system models, clustering and virtualization concepts.
C32A.2 Interpret fundamental concepts of Cloud systems and Cloud Technologies.
C32A .3 Identify Cloud environment using Infrastructure as a Service (IaaS) and PaaS.
C32A .4 Demonstrate various kinds of problems to be monitored and managed using
SLA, HPC and AWS cloud architecture.
C32A .5 Discover best practices in architecting cloud applications
C32A .6 Analyze Cloud era by various case studies and understanding the governance
by learning legal issues in Cloud computing
C32B Data Mining & Web
Technologies Lab
C32B.1 Identifying the appropriate attributes and their types on a given data set for data
mining.
C32B.2 Construct a classifier using WEKA on a given data set and evaluate its
accuracy.
C32B.3 Build various real life applications using Apache Tomcat server and MySQL
database, Eclipse.
C32B.4 Design web pages using XML, JavaScript, AJAX, PHP, JDBC, Servlet and
JSP.
C32C
Advanced
Communication Skills
Lab
C32C.1
Build sound vocabulary and its proper use contextually
C32C.2 Make use of functional English effectively in formal and informal contexts
C32C.3 Develop effective speaking skills and Maximize job prospects
C32C.4 Plan and make different forms of presentation using various techniques
IV Year - I Sem
Course
Code
Course Name CO
No.
Course Outcomes
C411 Information
Security
C411.1 Illustrate the concepts and principles of security Attacks, Services and Mechanisms.
C411.2 Evaluate applications of Cryptographic algorithms in real time scenarios.
C411.3 Demonstrate the techniques like Message authentication, Hash function and Public key
encryption.
C411.4 Solve the network security issues using available security solutions.
C411.5 Assess different key management techniques and solutions for web security.
C411.6 Analyze various case studies to identify the security vulnerabilities and prevention
techniques
C412 Design Patterns C412.1 Analyze the organization of design patterns and how they are applied to
solve common problems in software applications.
C412.2 Apply appropriate creational design patterns such as Abstract Factory, Builder, Factory
Method, Prototype, Singleton patterns.
C412.3 Identify appropriate structural design patterns such as Adaptor, Bridge, Composite,
Decorator, Facade, Flyweight, Proxy.
C412.4 Select appropriate behavioral design patterns such as Chain of Responsibility, Command,
Mediator etc
C412.5 Distinguish between various design patterns and their impact in solving design issues.
C412.6 Formulate design patterns as solutions to pattern community.
C413 Mobile
Application
Development
C413.1
Explore the small computing technologies and various editions of java.
C413.2 Choose the J2ME Best Practices and Patterns
C413.3 Develop user interface applications on a popular mobile platform
C413.4 Create JDBC Programs for accessing data from a Database with J2me application
C413.5 Select APIs for the development of a particular mobile application using Generic
Connection
C413.6 Create appropriate solutions to the mobile computing platform
C414 Information
Retrieval Systems
C414.1 Compute the similarity measure between collections of documents using different
approaches
C414.2 Apply various retrieval techniques to improve the efficiency
C414.3 Compute the similarity coefficient for retrieval of relevant documents of cross language in
nature
C414.4 Apply optimization techniques to improve the efficiency of information retrieval
C414.5 Perform information retrieval from various distributed sources in different forms
C414.6 Build the working model of information retrieval system
C415 Wireless
networks and
mobile computing
C415.1 Explore various network technologies and cellular communications
C415.2 Identify various wireless MAC protocols
C415.3 Explore MobileIP network and transport layer
C415.4 Analyze Database issues , its dissemination and synchronization in mobile networks
C415.5 Classify routing algorithms in MANETs
C415.6 Identify protocols and various platforms for mobile computing
C416 Image
Processing&
Pattern
Recognition
C416.1 Apply fundamental concepts of image processing to improve the image quality
C416.2 Implement various morphological operations, segmentation algorithms to obtain the
information about image contents
C416.3 Analyze appropriate compression algorithms based on various requirements.
C416.4 Evaluate various image representations and descriptors, such as Boundary, Regional,
Relational descriptors etc.
C416.5 Apply fundamental concepts of pattern recognition for implementing expert systems.
C416.6 Implement pattern recognition algorithms such as statistical, stochastic algorithms for
clustering.
C417 Soft computing C417.1 Summarize AI problems, Search techniques and Knowledge Representations
C417.2 Explore different Artificial Neural networks and Associative memory networks
C417.3 Compare the various Unsupervised Learning networks.
C417.4 Explore Fuzzy sets, Fuzzy relations and membership functions
C417.5 Analyze Fuzzy Arithmetic, decision making and genetic algorithms
C417.1 Device fuzzy logic control systems for real time applications
C418 Semantic Web
and Social
Networks
C418.1 Analyze intelligent web applications ,world wide web and its limitations
C418.2 Analyze the role of ontology and inference engines in semantic web
C418.3 Explore Ontology languages and tools for semantic web
C418.4 Explore semantic web applications, services and technology
C418.5 Explore social network analysis and its electronic sources
C418.6 Build semantic web applications with social network features
C419 Operations
Research
C419.1 Formulate and solve linear programming problem
C419.2 Apply the concepts of simplex method and its extensions to dual simplex algorithms
C419.3 Obtain optimal solutions of Transportation and Assignment model
C419.4 Formulate and find the solutions to Sequencing and Replacement models
C419.5 Obtain solutions to practical situations using Non-linear programming problem
C419.6 Apply theory of games in making scientific decisions to real world problems
C41A BigData
Analytics,
Associate
Analytics - 2)
C41A.1 Make use of various sources of data for analysis by understanding architecture.
C41A.2 Interpret big data tools and identify gaps in data.
C41A.3 Apply descriptive analytics using big data tools for business intelligence.
C41A.4 Determine analytical methodologies using hypothesis testing.
C41A.5 Explore various machine learning algorithms.
C41A.6 Find insights out of data visualization by preparing data using Tableau.
C41B Information
Security
Assessment and
Audits , Security
Analyst-2
C41B.1 Identify different Issues and Metrics of Information Security.
C41B.2 Explore the Security Audit Tasks, Reports, and Post Auditing Actions.
C41B.3 Identify and manage various Information Security Vulnerabilities
C41B.4 Determine the characteristics of Information Security vulnerability assessment.
C41B.5 Asses the security risk and generate the reports
C41B.6 Identify the Configuration Management and Control Policies
C41C Software project
management
C41C.1 Analyze roles within software organization based on process management
C41C.2 Explore software economics and various principles of software engineering
C41C.3 Elaborate different stages in software life cycle phases based on software architectures
C41C.4 Apply the software process work flows for planning and organizing for building
automation.
C41C.5 Identify the metrics for tracking and control
C41C.6 Explore and analyze future software project management for a particular organization using
case study.
C41D Computer
Graphics
C41D.1 Analyze the functionality of various Input ,output devices
C41D.2 Design algorithms for primitive components and to fill 2-D shapes
C41D.3 Perform transformations and create views for 2-D co-ordinates
C41D.4 Perform transformations and create views for 3-D co-ordinates
C41D.5 Apply surface detection methods
C41D.6 Gain experience in constructing interactive computer animations
C41E
Human Computer
Interaction
C41E.1 Elaborate the design of good Interface and features of GUI
C41E.2 Compare the Human interaction speed with computers
C41E.3 Apply visually pleasing composition of elements on screen design
C41E.4 Identify Various Navigation Schemes, Screen based controls in user interface design
C41E.5 Apply the multimedia features to Components
C41E.6 choose various User Interface building tools and Interaction Devices
C41F Scripting
Language
C41F.1 Identify the structure and functionalities of PERL for scripting
C41F.2 Create internet ware applications using Advanced PERL
C41F.3 Explore the functionalities of PHP
C41F.4 Analyze the structure and functionalities of TCL
C41F.5 Analyze various visual tool kits
C41F.6 Build web applications using python
C41G Computer
Forensics
C41G.1 Explore digital evidences which are obtained from digital media.
C41G.2 Identify types of law enforcement.
C41G.3 Reorganization of the different roles computer placed in a certain crime
C41G.4 Develop Standard procedures for Network Forensics.
C41G.5 Elaborate the Role of E-Mail in Investigation.
C41G.6 Examine NTFS Disks and Microsoft startup tasks
C41H Case Tools &
Software Testing
Lab
C41H.1 Analyze the behavior of system(ATM) using different UML diagrams
C41H.2 Construct and document the system (Banking ,Library Management) using various UML
diagrams
C41H.3 Create system specifications & bug report for any system
C41H.4 Compare different testing tools (Winrunner, Selenium, Bugzilla etc.).
C41I Mobile
Application
Development Lab
C41I.1 Create and use J2ME Features & High Level UI
C41I.2 Develop Networked Applications using the Wireless Toolkit
C41I.3 Build JDBC programs to access data from a Database using J2ME application
C41I.4 Construct the user interface and authenticate with a Web Server.
IV Year- II Sem
Course
Code
Course Name CO No. Course Outcomes
C421 Management
Science
C421.1 Analyze the evolutionary development of management and its principles.
C421.2 Apply marketing concepts and tools for successful launch of a product
C421.3 Apply the inventory management tools in managing inventory.
C421.4 Analyze HR functions in the administration.
C421.5 Apply project management tools to manage projects.
C421.6 Analyze the steps involved in corporate planning
C422 Web Services C422.1 Analyze the Evolution of distributed computing, Core distributed computing technologies
C422.2 Discuss the details of web service architecture
C422.3 Build web services using SOAP
C422.4 Design the architecture for Web services using standards like Web Services Description
Language (WSDL), and Universal Description, Discovery and Integration (UDDI).
C422.5 Inspect Web Services Interoperability and Security
C422.6 Build the software applications that use architectural style of SOA services available
in a network such as the web.
C423 E-Commerce C423.1 Design applications on mercantile model from consumers & mercantile perspective E-
commerce
C423.2 Identify the usage of Digital Token in smartcards and credit cards of electronic payment
system.
C423.3 Examine how supply chain management works in EDI –intra organizational
C423.4 List the influences of Statistical analysis on marketing and advertising
C423.5 Identify the concepts of commerce catalogues and multimedia in E-commerce
C423.6 List various electronic payment types and associated security risk
C424 Middleware
Technologies
C424.1 Discuss client – server computing pros and cons
C414.2 Explore the java RMI, CORBA, JDBC and .NET technologies
C424.3 Build the applications using C# .NET
C424.4 Apply CORBA for building static/dynamic client server applications
C424.5 Build applications using Java Beans and CORBA Beans
C424.6 Apply object Transaction Monitor (OTM) using EJB for client server development
processes
C425 Adhoc and Sensor
networks
C425.1 Apply the basic characteristics and routing in Mobile Ad-hoc Networks(MANETS)
C425.2 Analyze the data transmission in MANETs and the usage of TCP over MANETs
C425.3 Apply basics and design issues of Wireless Sensor Networks (WSN) for data retrieval.
C425.4 Identify the various security mechanisms for successful transmission in WSN.
C425.5 Choose appropriate tools for WSN simulation
C425.6 Inspect different Operating Systems for WSN
C42E Associate Analytics-
3(Predictive
Analytics)
C42E.1 Experiment with various techniques of predictive analytics and work on missing Data.
C42E.2 Identify suitable data models for Logistic Regression.
C42E.3 Compare regression and segmentation using Sigmoidal function.
C42E.4 Build decision trees for classification and prune for accuracy.
C42E.5 Analyze integrated processes for univariate stationary and non- stationary data.
C42E.6 Identify the purpose, scope and format of project documentation.
C42F Security Analyst-3 C427.1 Configure various network devices and ensuring security.
C42F.2 Explore various trouble shooting methodologies of network devices.
C42F.3 Develop data backup strategy and handle information security incidents.
C42F.4 Draw correlation among logs and handle challenges cross the network environment.
C42F.5 Handle Network security incidents thus ensuring protection of sensitive information.
C42F.6 Handle malicious code incidents.
C426 Multimedia and
Rich Internet
C426.1 Explore the concepts of Text ,Image , video and digital audio data
C426.2 Compare various multimedia data compression techniques with a case study
Applications C426.3 Apply Web 2.0 features in internet applications, web services and social networks
C426.4 Make use of Adobe flash for developing a Flash Movie in Rich internet applications
C426.5 Develop Flash Movie with advanced visual effects using Flex 3
C426.6 Design traditional web applications using Ajax
C427 Artificial
Intelligence
C427.1 Inference the ability to formulate an efficient problem space for a problem expressed.
C427.2 Experiment with the ability to select a search algorithm for a problem and characterize its
time and space complexities.
C427.3 Assess the skill for representing knowledge using the appropriate technique.
C427.4 Prioritize the ability to apply AI techniques to solve problems of game playing.
C427.5 Formulate the AI techniques for implementing machine learning paradigm.
C427.6 Composition of knowledge representation technique to solve using different types of
techniques.
C428 Storage Area
Networks
C428.1 Explore the solutions available for data storage. Identify the software and hardware
components of host environment
C428.2 Compare different RAID levels and their suitability for different application environment
C428.3 Determine the single points of failure in a storage infrastructure and come up with solutions
to mitigate these failures.
C428.4 Discuss different backup and recovery topologies
C428.5 Identify the Key metrics to monitor different components in a storage Infrastructure.
C428.6 Analyze virtualization technologies using various case studies
C429 Machine Learning C429.1 Formulate machine learning problems corresponding to different applications
C429.2 Analyze Decision Tree Algorithm and Back propagation algorithms
C429.3 Evaluate the various error estimation and weight tuning rules.
C429.4 Examine Expectation Minimization and Hidden Markov Models
C429.5 Survey the instance based learning mechanisms.
C429.6 Apply genetic Learning algorithmic approach for search and optimization problem.
C42A Industry Oriented
Mini Project
C42A.1 Utilize acquired knowledge within the chosen area of technology for project development
C42A.2 Justify the technical aspects of the chosen project with a comprehensive and systematic
approach
C42A.3 Develop engineering projects using technical aspects
C42A.4 Construct the report of project related activities effectively to peers and mentors
C42B Seminar C42B.1 Identify emerging topic specific to the programme.
C42B.2 Extract the information relevant to the chosen topic.
C42B.3 Deliver the knowledge using multimedia.
C42B.4 Answer the queries with appropriate explanation and elaboration.
C42B.5 Compile an effective technical report, providing conclusions and proposing an appropriate
future scope.
C42C Project Work C42C.1 Identify the problem, conduct relevant literature survey and formalize it.
C42C.2 Analyze & design efficient, cost-effective and eco-friendly solutions using relevant tools (if
necessary) and processes.
C42C.3 Implement the design and demonstrate the functionality of developed model
C42C.4 Evaluate the results to derive the conclusion and provide scope for future enhancement.
C42C.5 Exhibit good interpersonal and leadership skills in meeting project deadlines with
individual contribution towards progress of the project.
C42D Comprehensive
Viva
C42D.1 Elaborate the subject knowledge through illustrations and explanations
C42D.2 Apply the concepts gained, to various real time applications including societal and
environmental issues.
C42D.3 Analyze different case-studies using quantitative and qualitative data
C42D.4 Justify the usage of emerging technologies in disseminating knowledge
C42D.5 Solve problems to new situations by applying acquired knowledge, facts, techniques and
rules in a different way.