Computer Engineering 5th Semester Polytechnic Diploma MSBTE Classes in Nagpur

Polytechnic 5th Semester Syllabus Computer Engineering Syllabus MSBTE Course and Classes in Nagpur

Atlanta Computer Institute Nagpur conducts Tuition Classes for Polytechnic 5th sem Computer Engineering Diploma in Nagpur for Computer Engineering Branch for Fifth Semester in Nagpur India . The Following syllabus is of MSBTE. Final Year Projects Training is also given to Diploma Students.

1 Software Engineering
2 Java Programming
3 Computer Security
4 Operating System

5 Elective – I (Any One) for CM Only ( Computer Technology )

Data Base Management
Multimedia and Animation Technique

Elective – I (Any One) for CO ( Computer Engineering )

Advanced Microprocessor
Windows Programming

6 Network Management and Administration
7 Professional Practices - v

w. e. f Academic Year 2009-10 ‘E’ Scheme Course Name : Computer Engineering Group Course Code : CO/CM/IF/CD Semester : Fifth for CO/CM/IF and Sixth for CD

Software Engineering

01 Overview of Software Engineering & the Software Development Process 1.1 The evolving role of Software & changing nature of software-Definition of a Software, Characteristics of a Software, Categories of Software 1.2 Software Engineering –A layered Technology approach(Definition of Software Engineering, Need of Software Engineering 1.3 The software development process-Generic Framework activities, Umbrella activities 1.3.1 The Capability Maturity Model Integration Model(CMMI)-levels and their significance, process areas considered for CMMI Level 1.4 PSP and TSP 1.4.1 Significance in Ongoing Software Process Improvement 1.4.2 Goals 1.4.3 Names of the PSP and TSP framework activities and their meaning 1.5 Prescriptive Process Models 1.5.1 The Waterfall Model -Nature, Situations in which applicable with example, Associated problems 1.5.2 The Incremental Model -Incremental Model (Nature, Situations in which applicable with example, General steps) -RAD Model (Nature, Situations in which applicable with example, General steps, Drawbacks) 1.5.3 The Evolutionary Process Model -Prototyping (Nature, Situations in which applicable with example, General steps, Drawbacks) -Spiral Model (Nature, Situations in which applicable with example, General steps, Advantages, Drawbacks) 08 20
02 Software Engineering Requirements and Development of Analysis & Design Models. 2.1 Software Engineering Practice 2.1.1 Definition 2.1.2 Importance 2.1.3 Essence 2.2 Core Principles of Software Engineering (Statement and Meaning of each Principle) 2.3 Communication Practices (Meaning of Communication, Communication Principles - Statement and Meaning of each ) 2.4 Planning Practices
(Meaning of Software Planning, Basic Activities included, Planning Principles - Statement and Meaning of each)
2.5 Modeling Practices -Meaning of Software Modeling -Analysis Modeling
(Meaning, Names of the analysis domains represented, Analysis Modeling Principles -Statement and Meaning of each)
- Design Modeling (Meaning, Names of the three Design aspects , Design Modeling Principles - Statement and Meaning of each)
2.6 Construction Practices -Meaning of Software Construction -Coding
(Meaning, Preparation Principles, Coding Principles, Validation Principles)
- Testing ( Meaning, Testing Principles - Statement and Meaning of each)
2.7 Software Deployment -Meaning of Delivery Cycle, Support Cycle and Feedback Cycle
- Deployment Principles (Statement and Meaning of each)
2.8 Requirements Engineering(RE)
2.8.1 Meaning of RE
2.8.2 Need of RE
2.8.3 RE Tasks (Meaning and Sub-tasks included)
2.9 Analysis Modeling
2.9.1 Objectives
2.9.2 Analysis Rules of Thumb
2.9.3 Domain Analysis -Meaning -Examples of Domain -Goal -Input and Output of Domain Analysis
2.9.4 Analysis Modeling Approaches -Structured Analysis (Meaning) -Object-oriented Analysis (Meaning)
2.9.5 Building the Analysis Model
-Data Modeling Concepts (Meaning of the terms – data objects, data relationships, data attributes, cardinality and modality with example)
-DFD (Use, Standard Notations, Rules followed, DFD construction using any Case study)
- Data Dictionary(DD) (Meaning, Use, Contents incorporated, Advantages)
w. e. f Academic Year 2009-10 ‘E’ Scheme
-Creating a Control Flow Model (Nature of Software Applications where required, Use, Guidelines used)
-Creating Control Specifications(CSPEC) (Use, State diagram and Program activation table – meaning and use)
-Creating Process Specification(PSPEC) (Use, Names of the contents it includes) -Creating a Behavioral Model (Use, General steps)
2.10 Design Engineering/Modeling
2.10.1 The Design Process
(Meaning of Software Design, Three Characteristics of good design)
2.10.2 Design Quality Guidelines
2.10.3 Design Concepts
- Abstraction, Architecture, Patterns, Modularity, Information hiding, Functional independence, Refinement, Refactoring, Design classes (Meaning and Importance with respect to ease of design, development, testing, and debugging)
2.10.4 The Design Model
- Data design elements, Architectural design elements, Interface design elements, Component-level design elements, Deployment-level design elements (meaning and inputs from analysis modeling that help in their creation)
Testing Strategies & Methods.
3.1 Software Testing Fundamentals
3.1.1 Definition of Software testing
3.1.2 Meaning of good test
3.1.3 Meaning of successful test
3.1.4 Meaning of testing strategy
3.1.5 Meaning of test plan, test cases, test data
3.1.6 Characteristics of Testing Strategies
3.2 Software Verification and Validation(V&V)
-Meaning, Differences, Names of the set of SQA
Activities involved in V&V
03 3.3 Testing Strategies for Conventional Softwares 3.3.1 Unit Testing 08 20
-Meaning
-Aspects of the Software Program tested
3.3.2 Integration Testing
-Meaning
-Approaches
• Top-down integration
(Meaning, Steps involved)
• Bottom-up integration
(Meaning, Steps involved)
• Regression testing
(Meaning, Purpose)
• Smoke testing (Meaning, Purpose)
3.4 Alpha and Beta Testing -Meaning -Purpose -Differences
3.5 System Testing
3.5.1 Meaning and Purpose
3.5.2 Types
- Recovery testing, security testing, Stress testing, Performance Testing (Meaning, Purpose with example)
3.6 White-box and Black-box Testing
(Meaning and Purpose) Debugging
3.6.1 Meaning
3.6.2 Outcomes
3.6.3 Characteristics of Bugs
3.6.4 Debugging Strategies
- Brute force, Backtracking, Cause elimination, Automated debugging (Meaning)
Software Project Management
4.1 What is Software Project Management and Why is it
needed?
4.2 The Management Spectrum – The four Ps - the People, the
Product , the Process, & the Project
(Meaning and Significance of each ‘P’)
4.3 Project Scheduling and Tracking
4.3.1 Meaning of project scheduling and tracking
4.3.2 Need
4.3.3 What must a project schedule indicate?
4.3.4 Reasons why project deadlines cannot be met
4.3.5 Basic Principles used for project scheduling
(Meaning of each principle)
4.3.6 Introduction to the Scheduling Techniques/Methods
04 -PERT, CPM, Timeline Charts 10 18
4.3.7 Ways in which the project schedule can be tracked
(Only a list of the ways)
4.4 Risk Management
4.4.1 Meaning of Software Risk
4.4.2 Reactive Vs Proactive risk strategies
-Meaning of Reactive risk strategy
-Meaning of Proactive risk strategy
-Names of the steps involved in formulation of the
Proactive risk strategy
4.4.3 Types of Software Risks
-Names and Meaning of the risks
4.4.4 The RMMM Strategy
-The names of the issues involved
- Possible steps to mitigate risks
List of the factors to be monitored
The RMM Plan (Meaning and what it includes)
4.5 Change Management
4.5.1 Meaning of SCM
4.5.2 Need of SCM
4.5.3 SCM Features (Names and meaning of the features)
4.6 Cleanroom Software Egineering
4.6.1 The Cleanroom approach
4.6.2 The Cleanroom Strategy (Names and meaning of the tasks involved) The Cleanroom difference
Software Quality Management& Estimation
5.1 Basic Quality Concepts.
5.2 Software Quality Assurance(SQA) -Definition of SQA -Activities carried out by the SQA Group
5.3 Introduction to Statistical SQA ( Meaning and list of the activities involved)
5.4 Six Sigma Strategy for Software -Meaning -Core Steps (The DMAIC Method)
5.5 The ISO 9000 Quality Standards-ISO’s definition of Quality-ISO 9001:2000 Software Quality Focus
5.6 Software Reliability and Software Availability 05 06 18
-Definition-Units of measurement
5.7 McCall’s Quality Factors
(Names and meaning of each factor) Estimation
5.7.1 Meaning of Software Estimation
5.7.2 List of the steps involved
5.7.3 Types of Decomposition Techniques ( Names and meaning of the techniques)
5.7.4 Software Sizing-Meaning -Approaches (names and meaning of the approaches)
5.7.5 COCOMO II Model Meaning,Use (applications)
w. e. f Academic Year 2009-10 ‘E’ Scheme
Course Name : Computer Engineering Group
Course Code : CO/CM/IF/CD
Semester : Fifth for CO/CM/IF and Sixth for CD

Java Programming

Introduction to Java 1.1 Fundamentals of Object Oriented Programming Object and Classes, Data abstraction and encapsulation, Inheritance, Polymorphism, Dynamic Binding 1.2 Java Features Compiled and Interpreted, Platform independent and portable, Object oriented Distributed, Multithreaded and interactive, High performance 1.3 Constant, Variables and Data Types Constant, Data Types, Scope of variable, Symbolic Constant, Type casting, Standard default values 1.4 Operator and Expression Arithmetic Operators, Relational Operators, Logical Operators, Assignment Operator Increment and Decrement Operator, Conditional Operator, Bit wise Operator, Special Operator 1.5 Decision making and Branching Decision making with if statement, Simple if statement, The if else statement, The else if ladder, The switch statement, The? : Operator 1.6 Decision making and Looping The While statement, The do statement, The for statement, Jumps in Loops ( Break , Continue)
2.1 Classes, Object and Methods Defining a class, Creating object, Accessing class members, Constructor, Methods Overloading, Static Member 2.2 Inheritance Extending a Class (Defining a subclass Constructor, Multilevel inheritance, Hierarchical inheritance, Overriding Methods, Final variable and Methods, Final Classes, Abstract method and Classes 2.3 Visibility Control Public access, friend access, Protected access, Private access, Private Protected access 2.4 Array, Strings and Vectors Arrays, One Dimensional array, Creating an array, Two Dimensional array, Strings ( String and StringBuffer class), Vectors, Wrapper Classes
Interfaces and Packages 3.1 Interface: Multiple Inheritance Defining interfaces, Extending interfaces, Implementing interfaces, Accessing Interface variable 3.2 Packages: Putting Classes Together System Package, Using system Package, Naming Convention, Creating Package, Accessing a package, Using a package, adding a class to a package
Multithreaded Programming and Exception handling 4.1 Multi Threading: Creating Thread, Extending a thread class, Stopping and Blocking a thread, Life cycle of thread, Using thread method, Thread exceptions, Thread priority, Synchronization, Implementing a ‘Runnable’‘ Interface 4.2 Managing Errors and Exceptions Types of errors, Exception, Multiple catch statement, using throw, throws and finally statement, Using Exception for Debugging
Java Applets and Graphics Programming 5.1 Applet Programming Applet basics, Local and remote applets, How applet differ from application, Preparing to write applets, Building applet code, Applet life cycle, Creating an Executable Applet, Designing a Web page, Applet tag, Adding Applet to HTML file, Running the Applet, Passing parameter to applet 5.2 Graphics Programming The Graphics Class, Lines and rectangle, Circle and Ellipse, Drawing Arcs, Drawing Polygons, Line Graphs, Using control loops in Applets, Drawing Bar charts
Streams and File I/O 6.1 Stream Classes 6.2 Character Stream, Byte Stream ( Reading And Writing Streams) 6.3 Serialization
w. e. f Academic Year 2009-10 ‘E’ Scheme Course Name : Diploma in Computer Engineering / Computer Technology Course Code : CO/CM/CD Semester : Fifth for CO/CM/IF and Sixth for CD

Computer Security

Introduction and Security trends 1.1 Need for security, Security basics : Confidentiality, Integrity, Availability, Authentication, Access Control 1.2 Threats to security : Viruses and Worms, Intruders, Insiders, Criminal organizations, Terrorists, Information warfare Avenues of attack, steps in attack 1.3 Types of attack: Active and Passive attacks, Denial of service, backdoors and trapdoors, sniffing, spoofing, man in the middle, replay, TCP/IP Hacking, encryption attacks. Malware : Viruses, Logic bombs
Organizational/ Operational security 2.1 Role of people in security : Password selection, Piggybacking, Shoulder surfing, Dumpster diving, Installing unauthorized software / hardware, Access by non employees, Security awareness, Individual user responsibilities 2.2 Physical security : Access controls Biometrics : finger prints, hand prints, Retina, patterns, voice patterns, signature and writing patterns, keystrokes, Physical barriers 2.3 Network security basics, model for network security
Cryptography and Public key Infrastructure 3.1 Introduction : Cryptography, Cryptanalysis, Cryptology, Substitution techniques : Caesar’s cipher, monoalphabetic and polyalphabetic, Transposition techniques – Rail fence technique, simple columnar, Steganography 3.2 Hashing - concept 3.3 Symmetric and asymmetric cryptography : Introduction Symmetric encryption : DES (Data encryption standard) algorithm, Diffie-Hellman algorithm, Problem of key distribution, Asymmetric key cryptography : Digital Signature, Key escrow 3.4 Public key infrastructures : basics, digital certificates, certificate authorities, registration authorities, steps for obtaining a digital certificate, steps for verifying authenticity and integrity of a certificate 3.5 Trust models : Hierarchical, peer to peer, hybrid
Network security 4.1 Firewalls : concept, design principles, limitations, trusted systems, Kerberos - concept 4.2 Security topologies – security zones, DMZ, Internet, Intranet, VLAN, security implication, tunneling 4.3 IP security : overview, architecture, IPSec, IPSec configurations, IPSec security 4.4 Virtual Private Network 4.5 Email security : Email security standards : Working principle of SMTP, PEM, PGP, S/MIME, spam,
System security 5.1 Intruders, Intrusion detection systems (IDS), host based IDS, network based IDS 5.2 Password Management, vulnerability of password, password selection strategies, components of a good password 5.3 Operating system security : Operating system hardening, general steps for securing windows operating system, Hardening Unix/Linux based operating system, updates : hot fix, patch, service pack
Application and web security 6.1 Application hardening, application patches, web servers, active directory 6.2 Web security threats, web traffic security approaches, secure socket layer and transport layer security, secure electronic transaction Software development : secure code techniques, buffer overflows, code injection, least privilege, good practices, requirements, testing
w. e. f Academic Year 2009-10 ‘E’ Scheme Course Name : Computer Engineering Group Course Code : CO/CM/IF/CD Semester : Fifth for CO/CM/IF and Sixth for CD

Operating System

Introduction 1.1 Operating system, Evolution, Generations –1st, 2nd, 3rd, 4th. 1.2 Mainframe Systems – Batch, Multi programmed, Multitasking, Time sharing, Desktop. 1.3 Multiprocessor Systems 1.4 Distributed Systems. 1.5 Clustered Systems. 1.6 Real Time Systems. 1.7 Recent Operating System Characteristic –XP,WIN-07
Operating System Structures 2.1 System components activities - Process management, Main memory management, File management, I/O system management, Secondary storage management. 2.2 Operating system services. 2.3 System calls – Uses, process control, file management, Device management, Information maintenance, communication. 2.4 Operating system structure. Simple structure, layered, monolithic, microkernel. 2.5 Booting
Process Management 3.1 Processes - Concept, process, state, process control block. 3.2 Process scheduling - Scheduling queues, scheduler, context switch. 3.3 Operations on processes - creation, termination. 3.4 Inter process communication. 3.5 Threads - Benefits, user and kernel threads. 3.6 Multithreading Models - Many to one, one to one, many to many.
Scheduling 4.1 Scheduling – Objectives, concept, criteria, CPU and I/O burst cycle. 4.2 Types of Scheduling-Pre-emptive, Non pre- emptive. 4.3 Scheduling Algorithms. First come first served (FCFS), Shortest job first (SJF), Round Robin (RR), Priority. 4.4 Other Scheduling. Multilevel, Multiprocessor, real-time. 4.5 Deadlock. System model, principle necessary conditions, mutual exclusion, critical region. 4.6 Deadlock handling. Prevention, avoidance algorithm-Bankar’s algorithm, Safty algorithm
File System and Memory Management 5.1 File- Concept, Attributes, Operations, Types, Structure 5.2 Access Methods – Sequential, Direct. 5.3 Swapping 5.4 Allocation Methods – Contiguous, Linked, Indexed. 5.5 Directory Structure – Single level, Two level, Tree Structure.
5.6 Protection –Types of accesses, Access control. 5.7 Basic Memory Management –Partitioning, Fixed & Variable. 5.8 Free Space management techniques –Bitmap, Linked List. 5.9 Virtual Memory – Concept, Paging, Page fault, Page Table. 5.10 Page Replacement algorithms – FIFO(First in First out), Optimal Page replacement, LRU (Least recently used), NRU (Not recently used)

w. e. f Academic Year 2009-10 ‘E’ Scheme Course Name : Diploma in Computer Technology Course Code : CM Semester : Fifth

Data Base Management ( Elective-I)

Oracle Architecture. 1.1 Components of Oracle Architecture. Structures for connecting a user to an oracle Instance, Common database administrative tools for DBA, features of the oracle universal Installer, Optimal flexible architecture, Setting of Password file authentication, main components of oracle enterprise manager and their uses. 1.2 Maintaining Control file. Use of control file, Control file, Multiplex and manage the control file, manage control file with oracle managed files. 1.3 Managing an Oracle Instance. Create and manage Initialization parameter files, configure OMF, startup & shutdown an instance, monitor the use of diagnostic files 1.4 Creating a Database. Prerequisite for database creation, creating a database using oracle database configuring assistant, Creating a database manually 1.5 Maintaining redo log files. Purpose & structure of online redo log files, Control lock switches and check points, Multiplex and maintain online redo log files, Manage online redo log files with OMF.Managing Users, Role and Database Objects. 2.1 Managing users, privileges and roles. Creating new database users alter and drop existing database users, Monitor information about existing users, Identify system and object privileges, grant and revoke privileges, identify auditing capabilities, create and modity roles, Control availability of roles, remove roles, user predefined roles, display role information from the data dictionary. 2.2 Managing table spaces. Manageing table spaces, data files, tables, undo data and indexes logical structure of table spaces within the database, create table spaces, change the size of the table space allocate table space for temporary segments, Chage the status of table spaces, change the storage setting of table spaces, implement oracle managed files, various methods of storing data, oracle data tupes, distinguish between an extended versus a restricted row id, structure of a row, creating regular and temporary tebles, manage storage structures within a table, reorganize truncate, drop a table, purpose of undo data, automatic undo management different types of indexes and their uses creating, reorganizing and dropping indexes, get index information from the data dictionary. 2.3 Storage structure and relationships Logical structure of segments, segment types and uses, keywords that control block spaces usage, get information about storage structures from the data dictionary. 2.4 Data dictionary content and usage Data dictionary components, contents and uses of data dictionary, query the data dictionary. 2.5 Managing password security, resources and data integrity, Manage passwords using profiles, administrator profiles, control use of resources using profile, implement data integrity constraints, maintain integrity constraints, obtain constraint information from the data dictionary.Oracle Backup and Recovery 3.1 •Backup and recovery overview. Basics of database backup, restore and recovery, types of failure in an oracle environment, backup and recovery strategy. •Instance and media recovery structures. Oracle processes, memory structures and files related to recovery, importance of check points, redo log files and archived log files, instance recovery. •Configuring the database archiving mode Difference between archive log and no archive log modes; configure a database for archive log mode, automatic archiving, multiple archiving processes. 3.2 •Oracle recovery manager overview and configuration. RMAN features, components, configuring RMAN. •User managed backups and RMAN backups. User managed backups and recovery operations, backup issues with read table spaces, perform closed and open database backups, backup the control file, cleanup after a failed online backup, DB verify utility to detect corruption, types of RMAN specific backups backing up with RMAN, copy command to create image copies. •User managed complete recovery and RMAN complete recovery. Recovery in non archive log mode and complete recovery in archive log mode using user managed and RMAN, restore data files to different locations, relocate and recover a table space by using archived redo log files. •User managed incomplete recovery and RMAN incomplete recovery. Necessity of incomplete recovery, Methods for incomplete recovery, incomplete recovery with user managed backups, incomplete recovery using RMAN and using enterprise manager, recovery of the control file, recovery through reset logs. •RMAN maintenance and recovery catalog creation and maintenance. Cross checking of backups, updating the repository, changing the status of backup and copies, catalog backups made with operating system commands, contents of recovery catalog, creating the recovery catalog and maintaining it by using RMAN commands, using RMAN to register, resynchronize and reset a database, querying recovery catalog to generate reports and lists, create, store and run scripts. Oracle Networking 4.1 Networking overview and basic oracle net architecture. Managing complex networks, oracle networking add-on solutions, components of oracle net layered architecture, oracle net services role, web client connections through oracle networking. 4.2 Configuring oracle networking. Establishing a session, creating and managing a listener, database registration, the listener control utility, techniques for name resolution, configuring service aliases, advanced connection options, testing oracle net connections. 4.3 Managing shares servers Limitations of dedicated server architecture, shared server architecture, configuring shared server, monitoring the shared server when to use the shared server
Oracle performance and tunning overview 5.1 Tuning application design, tuning SQL, tuning memory usage, tuning data access, tuning data manipulation, tuning physical storage, reducing network traffic, using STATSPACK and the automatic work load repository, using STATSPACK, tuning tools, alert log, background trace file, server generated alerts, user trace files.
w. e. f Academic Year 2009-10 ‘E’ Scheme Course Name : Diploma in Computer Technology / Information Technology Course Code : CM/IF Semester : Fifth

Multimedia and Animation Techniques (Elective- I)

Multimedia Elements Multimedia Application 1.1 I/P, O/P devices Limitations of Traditional Input Device, Digital v/s Analog, Input- Pen-Input, Image Scanner, Charge Coupled Devices, MIDI, Digital Camera, Output, Display System Technology, CRT display System, Display Terminology, Flat Panel Display, Print o/p technology, Dye Sublimation 1.2 Evaluation of Multimedia systems Multimedia Elements (Fasimile, Document image, photogrphics image, Geographics information system maps, Fullmotion and live video, Holographics images Fractcals). Multimedia Application(Document imaging , Image processing and Image Enchancement, OCR, Handwriting recognition, Non textual Image recognition, Full motion Digital Video application and Electronics messaging). Multimedia System Architecture, Evolving Tech. for Multimedia, Defining Objects for Multimedia Systems, Multimedia Data Interface Standard 1.3 Storage media Magnetic Media Technology, Hard disk Technology, RAID, Criteria for Selection of RAID, Use of Magnetic Storage in Multimedia, Optical Media, Magneto Optical Architecture & Issues For Distributed Multimedia System. 2.1 Multimedia System Architecture. 2.2 Distributed Multimedia. 2.3 Synchronization, Orchestration & QOS Architecture 2.4 Framework for Multimedia System.

Compression/Decompression & File Formats •Need , Types , Evaluating & Visibility Evaluating the Compression System, How much, Compression, How Good is Picture, How fast Does it Compress or Decompress, What H/W & S/W Does it take, Redundancy & Usability •Compression and Decompressiom Types of compression ,Need of Data Compression ,Color Gray Scale and Still Video Image , Color Characteristics , Color Model

•Video Compression Technique Simple Compression Technique, Interpolative, Predictive, Transfer Coding, Discrete Transfer, Statistical (Huffman, arithmetic)JPEG Compression, Requirement Addressing JPEG, Definition of JPEG Standard, Overview of JPEG Components, JPEG methodology, The discrete cosine Transfer , Quantization, Zigzag Sequence, Encoding •Introduction to Standardization of Algorithm •File Formats •History of RIF, TIFF TIFF Specification , TIFF structure , TIFF tag ,TIFF Implementation issues , TIFF classes RIFF Chunks with two sub chunks , List chunk , RIFF waveform Audio File format , RIFF MIDI file Format, RIFF DIB’s, •Introduction to RIFF, AVI RIFF AVI File format, Index Chunk and Boundary condition handling for AVI files., AVI Indeo File Format.
•JPEG-objectives, Architecture, JPEG-DCT encoding Quantization. •JPEG-stastical coding, predictive lossless coding, JPEG performance •MPEG-objectives, Architecture, BIT stream syntax performance •MPEG2 & MPEG4
Multimedia Authoring and User Interface 4.1 Multi Media Authoring System and its type 4.2 Hypermedia Application Design consideration 4.3 User Interface Design 4.4 Information Access 4.5 Object Display / Playback Issues
Distributed Multimedia Systems 5.1 Components of Distributed Multimedia Systems 5.2 Distributed Client Server Operation 5.3 Multimedia Object Server 5.4 Multi Server Network topologies 5.5. Distributed Multimedia Databases
Multimedia Tool 6.1 Introduction to Multimedia tool – Flash 6.2 Creating & Modifying elements 6.3 Line tool, fill/attributes, different shapes, text tools & pen tool 6.4 Selecting lines fill with arrow tool, selecting shapes, using lasso tool performing basic editing tools, selecting & deselecting elements, modifying created objects.
w. e. f Academic Year 2009-10 ‘E’ Scheme
Course Name : Diploma in Computer Engineering
Course Code : CO/CD
Semester : Fifth for CO and Sixth for CD

Advanced Microprocessor (Elective-I)

16-bit Microprocessor - Intel 80286. 1.1 Salient features, Internal architecture, Register organization. (General purpose register, segment register, status and control register, instruction pointer, segment descriptor cache register)
1.2 Addressing mode such as Real, Protected Virtual Addressing mode, Selector, Descriptors and its types, LDT, GDT, IDT, privilege protections. Operations of 80286 in Real and PVAM.
32-bit Microprocessor –Intel 80386. 2.1 Salient features, internal architecture, Register organization (General-purpose register, segment register, status and control register, instruction pointer. Segment descriptor cache register. System address register LDTR & GDTR, TR, Debug register, Test registers, Control register. 2.2 Addressing modes of 80386, real, PVAM, paging, virtual 8086. Address translation in real, PVAM, paging, Enabling and disabling paging (Machine Status word)
Interrupts of X86 microprocessor: 3.1 Introduction to X86 interrupts (Hardware, software and exceptions), Interrupt vector table, Interrupt processing sequence. Hardware or exception interrupts (Singles step, divide by zero/overflow, non-maskable, breakpoint, overflow) software interrupts (INT, INTO instructions) 3.2 Introduction to MS-DOS, The structure of MS-DOS (BIOS Module, DOS kernel, command processor), Loading of MS-DOS introduction to .com and .exe programs, DOS & BIOS Interface, Interrupt Services, DOS& BIOS Interrupts.
Advanced Microprocessors (Intel 486 & Pentium) 4.1 Salient features of 486. Salient features of Pentium System architecture (Super-scalar Execution, Separate code & data cache, Floating Point Exceptions, Branch prediction.
w. e. f Academic Year 2009-10 ‘E’ Scheme Course Name : Diploma in Computer Engineering/ Information Technology Course Code : CO/IF/CD Semester : Fifth for CO and Sixth for CD

Windows Programming (Elective-I)

Overview of Windows messaging. 1.1 •The Windows Environment, History of Windows, Aspects of Windows, Windows Programming Options, APIs and Memory Models, The Programming Environment, Your First Windows Program, •The MessageBox Function, A Brief History of Character Sets 20 American Standards, Wide Characters and C, The char Data Type, Windows' String Functions, Using printf in Windows, Formatting Message Box. 1.2 •Registering the Window Class, Creating the Window, Displaying the Window, the Message Loop, and the Window Procedure.
GDI and Basic Drawings 2.1 •An Introduction to GDI, The Structure of GDI, The GDI Philosophy, The GDI Function Calls, The GDI Primitives, The Device Context. 2.2 •Drawing Dots and Lines, Setting Pixels, Filling in the Gaps, Drawing Filled Area, The GDI Mapping Mode Rectangles, Regions, and Clipping.
The Keyboard 3.1 Keyboard Basics, Keystrokes and Characters, Using Keystroke Messages, Character Messages, Keyboard Messages and Character Sets, The KEYVIEW1 Program, The Foreign-Language Keyboard Problem, The Caret (Not the Cursor), The Caret Functions.
The Mouse 4.1 •Mouse Basics, Client-Area Mouse Messages, Simple Mouse Processing: An Example, Mouse double-clicks, Nonclient-Area Mouse Messages, The Hit-Test Message, A Sample Program 4.2 •Emulating the Mouse with the Keyboard, Using Child Windows for Hit-Testing, Capturing the Mouse.

Client Window Controls 5.1 •The Button Class, Creating the Child Windows, Push Buttons, Check Boxes, Radio Buttons, Group Boxes, Changing the Button Text, Visible and Enabled Buttons, Buttons and Input Focus, Controls and Colors, System Colors, The Button Colors, The WM_CTLCOLORBTN Message, 5.2 •The Scroll Bar Class 383 The COLORS1 Program Coloring the Background, Coloring the Scroll Bars and Static Text, The Listbox Class, List Box Styles, Putting Strings in the List Box, Selecting and Extracting Entries, A Simple List Box Application

w. e. f Academic Year 2009-10 ‘E’ Scheme Course Name : Computer Engineering Group Course Code : CO/CM/CD/IF Semester : Fifth for CO/CM/IF and Sixth for CD

Network Management and Administration

Exploring Directory Services and Remote Network Access. 1.1 Network Related Jobs – Network Administrator, Network Engineer, Network Architecture / Designer, Other Network Related Jobs. 1.2 Directory Services - Define Directory Services, Definition of Novelle Directory, Windows NT domains, Microsoft’s Active Directory, X500 Directory Access Protocol, Lightweight Directory Access Protocol, Forests, Trees, Roots and Leaves. 1.3 Active Directory Architecture – Object Types, Object Naming, Canonical Names, LDAP Notation, Globally unique identifiers, User Principle Names, Domain, Trees & Forests. 1.4 Remote Network Access – Need of Remote Network Access, Public Switched Telephone Network, Integrated Services Digital Network, Digital Subscriber Line, CATV. 1.5 Virtual Private Network – VPN Protocols, Types of VPNs, VPN Clients, SSL VPNs.

Network Connection and Printing Services 2.1 Dynamic Host Configuration Protocol (DHCP) – DHCP Origins, Reverse Address Resolution Protocol (RARP), The Bootstrap Protocol (BOOTP), DHCP Objectives, IP Address Assignment, DHCP Architecture. 2.2 Introduction to Domain Name System(DNS) - DNS Objectives, Domain Naming, Top Level Domains, Second Level Domains, Sub domains, DNS Functions, Resource Records, DNS Name Resolution, Resolves, DNS Requests, Root Name Servers, Resolving a Domain Name, DNS Name Registration. 2.3 Understand Network Printing Concepts - Understand Network Printing Concepts, Locally connected print devices, Setting up local print devices, Shared print devices, Sharing Locally Attached Print Devices, Describe Windows Network Printing, Add Print Wizard.

Implementation of Network 3.1 Designing Network – Accessing Network Needs, Applications, Users, Network Services, Security and Safety, Growth and Capacity Planning, Meeting Network Needs – Choosing Network Type, Choosing Network Structure, Choosing Servers. 3.2 Installing and Configuring Windows 2003 Server - Preparing for Installation, Creating windows 2003 server boot disk, Installing windows 2003 server, Configuring server/ client 3.3 Setting windows 2003 server - Creating Domain controller, Adding the DHCP and WINS roles, Adding file server and print server, Adding Web based Administration.

Administering Windows 2000 Server (The Basics) 4.1 Working With User Accounts - Adding a User, Modifying User Account, Deleting or Disabling a User Account. 4.2 Working With Windows 2000 Security Groups – Creating Group, Maintaining Group Membership. 4.3 Working with Shares – Understanding Share Security, Cresting Shares, Mapping Drives 4.4 Administering Printer Shares – Setting up Network Printer, 4.3 Working with Windows 2000 Backup – Using Windows 2000 Servers Backup Software

Troubleshooting and security of Network 5.1 Understanding the Problem – Troubleshooting, Segmenting the Problem, Isolating the Problem, Setting Priorities. 5.2 Troubleshooting Tools – Hardware Tools, Software Tools, Monitoring and Troubleshooting Tools 5.3 Internal Security – Account Security, File and Directory permissions, Practices and user education. 5.4 External Threats – Front Door threats, Back Door threats, Denial services threats, Viruses, worms and other Malicious codes.
w. e. f Academic Year 2009-10 ‘E’ Scheme Course Name : Computer Engineering Group Course Code : CO/CM/IF/CD Semester : Fifth for CO/CM/IF and Sixth for CD

Professional Practices - V

Industrial Visits Structured industrial visits be arranged and report of the same should be submitted by the individual student, to form a part of the term work. Visit any IT industry/ computer center. Study their network (Cable layout, devices used/software/costing)

First Semester Computer Engineering Polytechnic

Second Semester Computer Engineering Diploma

Third Semester Computer Engineering Diploma

Fourth Semester Computer Engineering Diploma

Fifth Semester Computer Engineering Diploma

Sixth Semester Computer Engineering Diploma

BCA Bachelor Of Computer Application, BCCA, Bachelor of Commerce & Computer Application BE IT/CS, Information technology/Computer Science MCA, Master of Computer Application MCM, Master of Computer Management Diploma , Polytechnic Others,

Basic Programming

C / C++ ,

Testing

Software Testing,

Hardware & Networking

CCNA, MCSE, Hardware, Networking

Courses at Atlanta

New Batches start Every week On Mondays and Wednesdays.

New Batch Starting Date & Timing

Copyright © 2010-2023 All Right Reserved - Atlanta Computer Institute, Nagpur.