iv semester course information 2011

66
Course outline Semester: IV Session: Jan 2011 – May 2011 _____________________________________________________________________________________ Perseverance Excellence Service 1 PES Institute of Technology – Dept. of MCA GENERAL GUIDELINES 1. The course information is to be brought to the classroom daily. 2. Students should be in time for the first class and subsequent classes thereafter. 3. Students should keep the classroom and Laboratories clean and tidy. 4. Students are informed to clarify their doubts in the respective subjects with the faculty by taking prior appointments. 5. Students are advised to show due respect to all faculty regardless of the department and maintain affable personality. 6. Students are to maintain absolute discipline and decorum, so as to promote the fair name of their college in all its activities. 7. Students having less the 75% attendance in any subject (both Theory and Practical) will not be allowed to take up the university examination. 8. Students who fail to get minimum of 25 marks in Internal assessment of any subject will fall in NSSR category and / or not eligible to take up that particular subject. 9. Parents are to follow the progress of their wards by being in touch with the college authorities at regular intervals. 10. Writing on desks and walls is strictly prohibited, failing which the students will be fined a minimum of Rs. 500. If the identity of the individual is not established the entire class will be fined ranging from Rs.100 to Rs.500 11. Attendance of the students will be displayed on the department notice board as well as available in the Web site at the end of the 5 th , 10 th , and 16 th week of the semester along with list of students having shortage in attendance. 12. Students should bring the observation book as well as the laboratory record book completed in all respect to the laboratory. 13. Take the print outs of the source listing and output of the code after execution and delete your files. 14. Students are not supposed to alter the configuration / any software on the system. 15. Final examination is of 3 hours duration. 16. Students are supposed to fill details in the LOG BOOK at the time of entering and leaving the lab. 17. Students should wear IDENTITY CARD all the time. Students without the same will not be allowed to enter either the class room or the lab. 18. Those students who have less than 85% attendance should sign the undertaking given by their class teachers from time to time. 19. Students are not allowed to bring the mobile phones and Ragging is strictly prohibited in the campus.

Upload: vasunews

Post on 07-Nov-2014

30 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

1

PES Institute of Technology – Dept. of MCA

GENERAL GUIDELINES

1. The course information is to be brought to the classroom daily. 2. Students should be in time for the first class and subsequent classes thereafter. 3. Students should keep the classroom and Laboratories clean and tidy. 4. Students are informed to clarify their doubts in the respective subjects with the faculty

by taking prior appointments. 5. Students are advised to show due respect to all faculty regardless of the department and

maintain affable personality. 6. Students are to maintain absolute discipline and decorum, so as to promote the fair name

of their college in all its activities. 7. Students having less the 75% attendance in any subject (both Theory and Practical) will

not be allowed to take up the university examination. 8. Students who fail to get minimum of 25 marks in Internal assessment of any subject will

fall in NSSR category and / or not eligible to take up that particular subject. 9. Parents are to follow the progress of their wards by being in touch with the college

authorities at regular intervals. 10. Writing on desks and walls is strictly prohibited, failing which the students will be fined

a minimum of Rs. 500. If the identity of the individual is not established the entire class will be fined ranging from Rs.100 to Rs.500

11. Attendance of the students will be displayed on the department notice board as well as available in the Web site at the end of the 5th, 10th, and 16th week of the semester along with list of students having shortage in attendance.

12. Students should bring the observation book as well as the laboratory record book completed in all respect to the laboratory.

13. Take the print outs of the source listing and output of the code after execution and delete your files.

14. Students are not supposed to alter the configuration / any software on the system. 15. Final examination is of 3 hours duration. 16. Students are supposed to fill details in the LOG BOOK at the time of entering and

leaving the lab. 17. Students should wear IDENTITY CARD all the time. Students without the same will

not be allowed to enter either the class room or the lab. 18. Those students who have less than 85% attendance should sign the undertaking given

by their class teachers from time to time. 19. Students are not allowed to bring the mobile phones and Ragging is strictly prohibited

in the campus.

Page 2: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

2

V SEMESTER – PROGRAMME STRUCTURE

Time Table

Class Teacher: IV A – Mrs. Meera Rajan IV B – Mr. Tamal Dey

SL.NO Sub Code SUBJECT

MARKS Total Page # IA UE

1 07MCA41 Topics in Enterprise Architectures – I 50 100 150 3-8

2 07MCA42 Software Engineering 50 100 150 9-17

3 07MCA43 Web Programming 50 100 150 18-26

4 07MCA44 Design and Analysis of Algorithms 50 100 150 27-34

5

07MCA452 Unix System Programming

50 100 150

35-41

07MCA453 Multi media Systems (Elective) 42-48

07MCA455 Principles of User Interface Design (Elective) 49-54

07MCA456 Advanced Computer Networks (Elective)

55-60

6 07MCA46 Java & J2EE Laboratory 50 50 100 61-62

7 07MCA47 Web Programming Laboratory 50 50 100 63-64

8 07MCA48 Algorithms Laboratory 50 50 100 65-66

Total 400 650 1050

Day/Time 8:15-9:15

9:15-10:15

10.15-10.45

10:45-11:45

11.45-12.45

12.45-1.30

1.30-2.30

02.30-03.30

Monday

Te

a Br

eak

Lu

nch

Brea

k

Tuesday

Wednesday

Thursday

Friday

Page 3: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

3

TOPICS IN ENTERPRISE ARCHITECTURE – 1

Subject code: 07MCA41 Hrs / Week: 04 Faculty : Meera Rajan Total Hrs : 52 Overview: Java is first and foremost programming language used for internet. This course describes basic fundamentals of Java programming. It includes topics like exception handling, Applet, Strings, Multi Threading, Event handling, swings. It also describes to create applications using servlet, JSP, Java Bean.

Class No.

Chapter Title/Reference Literature

Topics to be covered

% of portions to be covered Reference Chapter Cumulative

1

Chapter 1: Introduction to Java T1: Page 4-127

Java and Java applications; Java Development Kit (JDK); Java is interpreted, Byte Code, JVM

12 12

2 Object-oriented programming; Simple Java programs

3 Data types and other tokens: Boolean variables, int, long, char, operators, arrays

4 White spaces, literals, assigning values; Creating and destroying objects; Access specifiers.

5 Operators and Expressions: Arithmetic Operators, Bitwise operators, Relational operators, The Assignment Operator, Operator, Operator Precedence; Logical expression

6 Type casting; Strings, Control Statements: Selection statements, iteration statements, Jump Statements.

7

Chapter 2: Classes, Inheritance, Exceptions, Applets T1:Page 130-271, 628-652

Classes: Classes in Java; Declaring a class; Class name; Super classes; Constructors

12 24

8 Creating instances of class; Inner classes

9 Inheritance: Simple, multiple, and multilevel inheritance; Overriding, overloading. Exception handling: Exception handling in Java.

10 The Applet Class: Two types of Applets; Applet basics; Applet Architecture; An Applet skeleton

11 Simple Applet display methods; Requesting repainting; Using the Status Window

12

The HTML APPLET tag; Passing parameters to Applets; get Document base () and get Codebase (); Applet Context and show Document (); The Audio Clip Interface; The Applet Stub Interface; Output to the Console.

Page 4: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

4

13

Chapter 3: Multi Threaded Programming, Event Handling T1:Page 274-311, 654-685

Multi Threaded Programming: What are threads? How to make the classes threadable; Extending threads; Implementing runnable

13 37

14 Synchronization; Changing state of the thread 15 Bounded buffer problems, read-write problem 16 Producer - consumer problems.

17 Event Handling: Two event handling mechanisms; The delegation event model; Event classes

18 Sources of events; Event listener interfaces

19 Using the delegation event model; Adapter classes; Inner classes.

20

Chapter 4: Swings T1:Page 921 - 948

Swings: The origins of Swing; Two key Swing features;

13 50

21 Components and Containers; 22 The Swing Packages; A simple Swing Application 23 Create a Swing Applet; label and ImageIcon 24 TextField; The Swing Buttons; J Tabbedpane 25 J ScrollPane; J List; J ComboBox;JTable 26 Example 27

Chapter 5: Java 2 Enterprise Edition Overview, Database Access T2:Page 123-160

Overview of J2EE and J2SE.The Concept of JDBC

12 62

28 JDBC Driver Types; JDBC Packages 29 A Brief Overview of the JDBC process

30 Database Connection; Associating the JDBC/ODBC Bridge with the Database

31 Statement objects; Result Set

32 Transaction Processing; Metadata, Data types; Exceptions.

33

Chapter 6: Servlets T1:Page 950-979

Background; The Life Cycle of a Servlet

13 75

34 Using Tomcat for Servlet Development 35 A simple Servlet; The Servlet API

36 The Javax.servlet Package; Reading Servlet Parameter

37 The Javax. servlet.http package 38 Handling HTTP Requests and Responses 39 Using Cookies; Session Tracking. 40

Chapter 7: JSP, RMI T2:Page 379-394, 485-491

Java Server Pages (JSP): JSP

12 87

41 JSP Tags, 42 Tomcat, Request String 43 User Sessions, Cookies, Session Objects

44 Java Remote Method Invocation: Remote Method Invocation concept;

45 Server side, Client side.

Page 5: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

5

46 Chapter 8: Enterprise Java Beans T2:Page 405-443

Enterprise java Beans

13 100

47 Deployment Descriptors 48 Session Java Bean, 49 Entity Java Bean; 50 Message-Driven Bean; The JAR File. 51 Example 52 Example

Literature: TEXT BOOK NAME

Book Code AUTHOR EDITION/ PUBLICATION

Java the Complete Reference T1 Herbert Schildt

7th Edition, Tata McGraw Hill, 2007.

J2EE The Complete Reference

T2 Jim Keogh Tata McGraw Hill, 2007

Introduction to JAVA Programming

R1 Y. Daniel Liang 6th Edition, Pearson Education, 2007.

The J2EE Tutorial R2 Stephanie Bodoff et al

2nd Edition, Pearson Education, 2004.

Test 1: Chapter 1, 2 & 3 Test 2: Chapter 4, 5 & 6 Test 3: Chapter 7, 8

Page 6: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

6

Question Bank

CHAPTER 1: Introduction to Java Overview: This chapter discusses about the basics of java and its types, variables, array, strings, operators

1. Describe the general structure of a simple JAVA program. 2. Discuss various data types used in JAVA. 3. How java is better than C++? Discuss. 4. What are the advantages of JAVA? Explain. 5. How JAVA is strongly associated with internet? 6. Why is java known as platform-neutral language? 7. Explain the features of JAVA 8. What is a variable? Explain the declaration and rules for variable. 9. Discuss the loop control structures with example. 10. What is array? How are arrays declared and handled in java. 11. How do you define a class in java? 12. Mention different approaches of returning more than nor value from a method? 13. Explain inner classes with an example? 14. Why should main method be static, public and void in java? 15. How are static members different from normal members? what are the restrictions for static members ? 16. What are methods? How they are invoked in java? How does java passes parameters to them?

CHAPTER 2: Classes, Inheritance, Exceptions, Applets Overview: This chapter discusses about how the class and objects are created, various types of inheritance, applet and also how exceptions are han Dled

17. What is an object? Describe the characteristics of object. 18. How a object variable is created? Describe the characteristics of object. 19. What is a class? What are the three parts of a simple, empty class?

20. What is a constructor? What are its special properties? 21. What is polymorphism? 22. Explain the String class in detail with example. 23. What is inheritance? Describe different forms of inheritance with example. 24. Explain method overloading with an example. 25. Describe how an interface is defined and implemented. Give example 26. What is applet? Discuss the steps involved in loading and running a applet 27. Describe the different stages in the life cycle of an applet. Distinguish between init () and start() methods. 28. What is an exception? Explain the exception hierarchy in java. 29. Explain how exception handling mechanism can be used for debugging a program. 30.explain method overloading in java

Page 7: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

7

CHAPTER 3: Multi Threaded Programming, Event Handling Overview: This chapter discusses about multi threading and how the events are handled.

31. What is an object? Describe the characteristics of object. 32. How a object variable is created? Describe the characteristics of object. 33. What is a class? What are the three parts of a simple, empty class? 34. What is a constructor? What are its special properties? 35. What is polymorphism? 36.What is the mechanism of event delegation model .give example 37. Write a program in java that prints the values from one to hundred. 38. How do you implement multiple inheritance using interfaces. 39. What are the uses of the keyword ‘super’ in java? 40. Compare and contrast overloading and overriding methods? 41. What is a package? What its purpose?

CHAPTER 4: Swings Overview: This chapter discusses about the swing features and also how to create swing applet using Jlabel and JTextfield

42. What is a swing? What are the reasons to choose swing in JAVA? 43. Explain the following with an example.

a. JText Field class b. JText Area class c. JLabel class d. Jlist class

44. What are components? Which are the subclasses of components of abstract window toolkit? Briefly discuss.

45. How do you use java system package? 46. What are the different ways of accessing packages? 47. How do you extend one interface by the other?

Page 8: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

8

CHAPTER 5: Java 2 Enterprise Edition Overview, Database Access Overview: This chapter discusses about the Java 2 Enterprise Edition , JDBC Driver types and also the database connection associating the JDBC/ODBC bridge connection.

48. Explain the various types of JDBC Driver 49. Explain the steps involved in connecting the J2EE component with a database. 50. Explain the usage of Prepared Statement and Callable statement 51. Write short note on Metadata. 52. Explain the Result Set object with an example. 53. Explain in brief ODBC and registry in j2ee?

CHAPTER 6: Servlets Overview: This chapter discusses about the life cycle of Servlet, usage of tomcat server, the javaX Servlet package and also the session tracking.

54. Describe the different stages in the life cycle of an Servlet. 55. How the Tomcat server is used for Servlet development 56. Explain the HTTP Request and HTTP Response of a Servlet 57. Write short note on Session Tracking 58. write some major uses of servelets

CHAPTER 7: JSP, RMI Overview: This chapter discusses about the Java server page, JSP tags to design the web page and also about the Remote Method Invocation

59. Discuss various types of JSP tags. 60. Explain the user Sessions and cookies. 61. What is Remote Method Invocation? 62. Write a program to implement a simple client server application using RMI. 63. Explain the RMI Process. 64. what are the restrictions on RMI.

CHAPTER 8: Enterprise Java Beans Overview: This chapter discusses about the Enterprise Java Bean which is a component of the J2EE architecture that primarily provides business logic to a J2EE application

65. List the three kinds of EJB classes. 66. Explain the two important interfaces of EJB. 67. How EJB’s are managed at runtime with deployment descriptor 68. Explain the creation of Session Java Bean. 69. Explain the Entity Java Bean 70. Explain the creation of Message-Driven Bean. 71. List some of the applications of java beans.

Page 9: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

9

SOFTWARE ENGINEERING

Subject: Code: 07MCA42 Hrs / Week: 04 Faculty: NEELAM BAWANE Total Hrs : 52 Overview: Software Development is a multidimensional and complex process. Inherent complexity of a large system calls for a systematic approach to software development. This course covers the fundamentals of Software Engineering containing eight major units representing the complete life cycle of a software product.

Class No.

Chapter Title/Reference Literature

Topics to be covered

% of portions to be covered Reference Chapter Cumulative

1 Chapter1: Overview T1:Page 27-65

Introduction: FAQ's about software engineering

12 12

2 FAQ's about software engineering 3 Professional and ethical responsibility

4 Socio-Technical systems: Emergent system properties

5 Systems engineering

6 Organizations, people and computer systems; Legacy systems

7 Chapter 2: Critical Systems, Software Processes T1:Page 67-115

Critical Systems: A simple safety-critical system

12 24

8 System dependability; Availability and reliability

9 Software Processes: Models 10 Process iteration

11 Process activities; The Rational Unified Process

12 Computer-Aided Software Engineering.

13 Chapter 3: Requirements T1: Page 141-191

Software Requirements: Functional and Non-functional requirements

13 37

14 User requirements; System requirements

15 Interface specification; The software requirements document

16 Requirements Engineering Processes: Feasibility studies

17 Requirements elicitation and analysis 18 Requirements validation 19 Requirements management 20 Chapter 4:

System models, Project

System Models: Context models 14 51 21 Behavioral models

22 Data models

Page 10: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

10

23 Management T1: Page 193-215; 116-136

Object models; Structured methods 24 Project Management: Management activities 25 Project planning; Project scheduling 26 Risk management

27 Chapter 5: Software Design T1: Page 265-288; 337-361

Architectural Design: Architectural design decisions

12

63

28 System organization 29 Modular decomposition styles 30 Control styles

31 Object-Oriented design: Objects and Object Classes

32 An Object-Oriented design process 33 Design evolution 34

Chapter 6: Development T1: Page 415-438; 512-534

Rapid Software Development: Agile methods

12 75

35 Extreme programming 36 Rapid application development

37 Software Evolution: Program evolution dynamics

38 Software maintenance 39 Evolution processes; Legacy system evolution 40

Chapter 7: Verification and Validation T1: Page 537-589

Verification and Validation: Planning

13 88

41 Software inspections 42 Automated static analysis 43 Verification and formal methods 44 Software testing: System testing 45 Component testing; Test case design 46 Test automation 47

Chapter 8: Management T1: Page 615-663

Managing People: Selecting staff

12 100

48 Motivating people; Managing people 49 The People Capability Maturity Model

50 Software Cost Estimation: Productivity; Estimation techniques

51 Algorithmic cost modeling 52 Project duration and staffing

Page 11: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

11

Literature:

Test 1: Chapter 1, 2, chapter 3 up to 16 Classes Test 2: Chapter 3 from 17th class onwards, 4, 5, Test 3: Chapters 6, 7, 8.

Book Type

Book Code

Title & Author Publication Info Edition Publisher Year

Text Book T1 Software Engineering – Ian Sommerville 8th Pearson

Education 2009

Reference Book R1 Software Engineering-A Practitioners

approach - Roger. S. Pressman 7th Mcgraw Hill 2007

Reference Book R2

Software Engineering Theory and Practice - Shari Lawrence Pfleeger, Joanne M. Atlee

3rd Pearson Education 2006

Reference Book R3 Software Engineering Principles and

Practice - Waman S Jawadekar - Tata McGraw Hill

2004

Page 12: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

12

Question Bank

CHAPTER 1: Overview Overview: The objective of this topic is to understand the

Answers to key questions about Software Engineering Process and Product Ethical and professional issues. Concept of socio-technical systems, emergent properties and system engineering Organizations, people and computer systems

1. Define software product and software engineering (IEEE Def). 2. What is software? Explain attributes of good software. 3. What are the main phases in software development? 4. What are the key challenges in software engineering? 5. What are the goals and objectives in software engineering? 6. What are the stakeholders in software engineering? 7. What is the difference between computer science and software engineering? 8. What is the difference between software engineering and system engineering? 9. What is software process? 10. What are the characteristics of software process? 11. What is software process model? 12. What is cost of software engineering? 13. What is “Computer Aided Software Engineering?

14. Explain the salient features of IEEE code of Ethics for software engineering professionals.

15. Discuss the social responsibilities of a software engineer.

16. What are socio-technical systems? Discuss the characteristics of socio-technical systems.

17. What are the emergent properties of socio-technical systems? Give examples. 18. Explain different phases of system engineering. 19. Discuss system procurement process. 20. Write an explanatory note on legacy system.

CHAPTER 2: Critical Systems, Software Processes Overview: The objective of this topic is to understand the

Critical systems and system dependability. The Software Engineering Process activities Various Process Models- Case study and comparisons Rational Unified Process and Computer Aided Software Engineering

21. What are the most important aspects of dependability? Discuss. 22. What is the importance of dependability? Discuss.

23. Explain the relationship between dependability and cost of system development. Why it is impossible to design 100% dependable system? Explain.

24. What are the critical systems? Explain the classification of critical systems.

25. What are the critical systems? Explain the significance of dependability in critical systems.

Page 13: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

13

26.

Write short notes on: a. Reliability b. Availability c. Safety d. Security

27. What do you understand by software process model and its significance? 28. Explain waterfall model giving its merits and drawbacks. 29. Explain evolutionary development method giving its merits and demerits. 30. Discuss component-based software engineering. 31. What is process iteration? Explain incremental development. 32. Explain the spiral model with illustration. Write advantages and disadvantages. 33. Explain the software specifications phase of software development 34. What are the important activities in design phase of software development? 35. Explain the validation phase of software development. 36. Discuss the risk management in spiral model. 37. Mention the drawbacks of each of the software development models. 38. Write a short note on CASE tools. 39. Explain different classification of CASE tools. 40. Explain Rational Unified Process in detail.

CHAPTER 3: Requirements Overview: The objective of this topic is to understand the Various categories of software requirements Software requirements document Requirements Engineering process Requirements validation and management

41. What is the need and characteristics of requirements? 42. Distinguish between functional and non-functional requirements. 43. Discuss the classification of non-functional requirements. 44. What is the significance of non-functional requirements? Explain. 45. What do you understand by user and system requirements?

46. What are the problems associated with natural language used during requirements engineering? Mention the alternatives to natural languages.

47. Explain Structured Language Specifications. 48. Explain the structure of a software requirement document. 49. Describe the aim and characteristics of a good software requirement document. 50. What are the metrics for specifying the non-functional requirements?

51. Explain the major activities of requirements Engineering phase of software development.

52. Distinguish between enduring and volatile requirements. 53. Describe the process of requirement elicitation and analysis with illustration. 54. What are the different methods of requirements discovery? 55. Discuss method “Viewpoints” in requirements discovery. 56. Discuss method “Interviewing” in requirements discovery. 57. Write a note on

Page 14: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

14

a) Use-case b) Sequence diagram

58. Write a note on

c) Ethnography. d) Need of feasibility studies

59. Why is it very difficult to produce a complete and consistent set of requirements?

60. List and explain various techniques of requirements validation. 61. What is the need of requirements management? 62. Write a short note on requirements change management.

CHAPTER 4: System Models, Project Management Overview: The objective of this topic is to understand the

Various system models Concepts of behavior modeling, data modeling and object modeling Management activities Project planning and scheduling Risk management

63. What is a context model? Draw context model for library system.

64. How is the data flow diagram advantageous in requirements analysis process? Explain.

65. Draw a data flow diagram for a library giving brief explanation. 66. Develop a zero level and first level DFD for ATM with suitable specifications?

67. Develop a zero level and first level DFD for payroll system with suitable specification?

68.

Draw a DFD for the following application: A salary system which computes employee salary per week and deductions. Input in to the system is a worksheet containing empid, name, and number of hours worked etc. System maintains table holding tax rates and pay rate for various employee classes. The output is the cheque to the employee.

69. Explain the following briefly: a) Object Models b) Data Flow Models c) Generic Models

70. Write a note on

a) Data dictionary b) CASE Workbench

71. Explain the dynamic nature of state machine model with one example. 72. What is semantic data model? Draw semantic data model of a company. 73. Explain different object models. 74. Write short note on Software project scheduling. 75. Write short note on Risk management. 76. What is the need of software project planning? Explain. 77. Distinguish between milestones and deliverables.

78. Explain the importance of bar charts and activity networks in software project management. Give one example

79. Describe the Risk Management Process. Describe critical risks that need to be

Page 15: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

15

protected against. CHAPTER 5: Software Design

Overview: The objective of this topic is to understand the Architectural design various models Object oriented design

80. What do you understand by system architecture? What is the importance of architectural design.

81. Explain repository model and discuss its advantages and disadvantages.

82. Explain salient features of client-server model and list its advantages and disadvantages.

83. Explain abstract machine model. 84. Discuss different types of control models in detail.

85. Write short notes on

a) Modular decomposition b) Reference architectures

86. Explain the important stages of object oriented development. 87. Discuss advantages and disadvantages of object oriented development. 88. Differentiate between objects and object classes giving suitable examples.

89. Write short notes on

a) Sequence model b) Use-case model

CHAPTER 6: Development Overview: The objective of this topic is to understand the

Rapid Application Development Agile methods and Extreme programming Software prototyping Software evolution and maintenance

90. What are the major difficulties with iterative development? Explain.

91. Write short notes on

a) Rapid Application Development b) Software prototyping

92. Explain extreme programming in brief. 93. What do you understand by pair programming? 94. What is software prototyping? Discuss advantages and disadvantages. 95. Discuss fourth generation tools used in RAD. 96. How testing is carried out in extreme programming? 97. Explain agile method of software development in detail. 98. What are the legacy systems? Explain. 99. Discuss Lehman’s laws of software evolution. 100. Discuss different types of software maintenance. 101. Discuss the key factors that distinguish development and maintenance. 102. Explain evolution process with illustration.

Page 16: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

16

103. Write short notes on

a) System re-engineering b) Legacy systems

104. Explain Re-engineering process in detail.

105. Write short notes on

a) Factors for environment assessment b) Factors for application assessment

106. What are the limitations of Software re-engineering?

CHAPTER 7: Verification and Validation Overview: The objective of this topic is to understand the Planning Verification and Validation Software inspections Software testing Clean room software testing

107. Distinguish between verification and validation.

108. What are the static and dynamic techniques of verification and validation? Explain.

109. Explain the process of software inspections and list their benefits and limitations.

110. What is cleanroom software development? Explain with illustration. List advantages and disadvantages also.

111. What are the characteristics of cleanroom software development? 112. Explain debugging process in detail. 113. Differentiate between debugging and testing. 114. Write a note on automated static analysis. 115. Explain the general principles of software inspections.

116.

Write short notes on a) Defect testing b) Statistical testing c) Inspection checks d) Inspection and testing e) Inspection team

117. Explain the testing process. Distinguish Black box and White box testing. 118. Discuss the main objectives and principles of software testing. 119. Explain bottom up and top down testing?

120. What is functional testing and how it differs from structural testing? Explain any one method for selecting test cases for functional testing?

121. Write short notes on verification and validation?

122. Write short notes on a) Release testing b) Integration testing c) Performance testing d) Cyclomatic Complexity.

123. Explain the types of interface testing. 124. Explain path testing technique with an example. 125. Explain stress testing. Why is it necessary?

Page 17: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

17

126. Write a detailed note on testing workbenches. 127. What is the role of flow graph in software testing? Explain with one example. 128. How is the cyclomatic complexity useful in program testing? Explain. 129. Discuss partition testing with example.

CHAPTER 8: Management Overview: The objective of this topic is to understand the

Managing people The People Capability Maturity Model Software Cost Estimation and Estimation Techniques.

130. Explain the importance of project staffing. What is the information required for staff selection.

131. What is SEI process maturity model? Explain. 132. “Members of a well led, cohesive group are loyal to the group”. Justify 133. What are the various factors in people management? 134. Write short notes on group cohesiveness. 135. What are the criteria for staff selection? Also explain issues in selecting staff.

136. Why motivation is important for employees. Explain Maslow’s Theory of motivation.

137.

Write short notes on a) Group Composition b) Group Cohesion c) Group Communication d) Group organization e) Egoless programming

138. List and explain various factors affecting the software pricing.

139. What is meant by software productivity? Explain two important metrics of software productivity.

140. Write a short note on various techniques of cost estimation. 141. What is COCOMO model? Describe its approach to estimate person months. 142. Discuss four sub-models of cost estimation as defined by COCOMO model.

143. Briefly explain how algorithmic cost can be used for estimating software cost.

Page 18: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

18

WEB PROGRAMMING Subject code: 07MCA43 Hours/Week: 04 Faculty: Dr.Ram P Rustagi / Tamal Dey Total hours: 52 Overview: It is difficult to overestimate the effect of World Wide Web has had on the day-to-day lives of people, at least those in the developed countries, in just a few years; we have learned to use the Web for a myriad of disparate tasks. This course describes basic fundamentals of Web like Internet, Web browsers, Web servers, XHTML – origins and evolutions, basic syntax of XHTML, Hypertext, Links, Forms, Frames etc. It gives information of CSS, i.e. cascading style sheets, Introduction of JavaScript, DHTML with Java Script, General characteristics of Java Script, Arrays, functions and Pattern Matching, Dynamic documents with Javascript etc. It also gives brief introduction about XML, DTP definitions, Namespaces and XML Schemas, XSLT style sheets etc. It also describes the need of programming in Perl, CGI scripting etc. The course attempts at teaching how to format web pages, write dynamic interfaces by using java script, write CGI scripts in Perl, link databases to websites and incorporate latest ideas in web usability also to design various Web sites with attractive information and content in the web pages by applying all the above said.

Class No.

Chapter Title/Reference Literature

Topics to be covered

% of portions to be covered Reference Chapter Cumulative

1

Chapter 1:

Fundamentals of Web, XHTML - 1

T1 : Page#: 19-112

Internet, World Wide Web, Web Browsers

23 23

2 Web Servers, URLs, MIME

3 HTTP, Security

4 The Web Programmers Tool Box

5 XHTML: Origins and evolutions of HTML and XHTML

6 Basic syntax, Standard XHTML document structure

7 Basic text markup

8 Images, Hypertext, Links, Lists

9 Tables, Forms, Frames

10 Syntactic Differences between HTML and XHTML

11 Demonstration of basic tags in HTML and designing of a Web page

12 Revision of chapter 1

Page 19: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

19

13

Chapter 2: CSS

T1 : Page#: 113-150

Introduction: Levels of Style sheets, Style specification formats

12 35

14 Selector forms, Property value forms

15 Font Properties, List properties, Color, Alignment of text

16 The box model, background image

17 The <Span> and <Div> tags

18 Conflict resolution, demonstration of basic tags and properties used in CSS

19

Chapter 3 : Javascript

T1 : Page#: 151-206

Overview of Javascript, Object orientation and Javascript

15 50

20 General syntactic characteristics

21 Primitives, operations and expressions

22 Screen output and Keyboard Input, Control statements

23 Object creation and modification, Arrays, Functions

24 Constructor, Pattern Matching using regular expressions

25 Errors in script and examples

26 Demonstration of various functions used in Javascript through a web page

27

Chapter 4: Javascript and HTML Documents, Dynamic documents with Javascript

T1 : Page#: 207-246

T1 : Page#: 247-282

The Javascript execution environment, The document object model

19 69

28 Element access in Javascript

29 Events and event handling Handling events from body elements, Button elements

30 Handling events from Text box and Password elements

31 The DOM2 event model

32 Navigator Object, DOM tree traversal and modification

33 Introduction to dynamic content, positioning elements, moving elements

34 Element visibility, Changing of color and fonts, Dynamic content

35 Stacking elements, Locating the mouse cursor, Reacting to mouse click, Slow movement of elements

Page 20: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

20

36 Dragging and dropping of elements and demo of all above functionalities using Web page

37

Chapter 5: XML T1 : Page#: 283-328

Introduction: Syntax, Document Structure

12 81

38 Document type definitions

39 Name Spaces, XML Schema

40 Displaying raw XML documents

41 Displaying XML documents with CSS

42 XSLT style sheets, XML processors, Web Services, Demo of all above functionalities using Web page

43

Chapter 6:

Perl, CGI Programming

T1 : Page# : 329-366

T1 : Page# : 367-403

Origins and uses of Perl, Scalars and their operations

19 100

44 Assignment statements and simple input and output

45 Control statements, Fundamentals of arrays

46 Hashes, References

47 Functions, Pattern Matching

48 File Input and output, Examples

49 The Common Gateway Interface

50 CGI Linkage, Query String format, CGI.pm module

51 A survey example, Cookies, Demonstration of various Perl and CGI programs

52 Revision

Page 21: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

21

Literature:

Test 1: Chapter 1 & 2 Test 2: Chapter 3 & 4 Test 3: Chapter 5 & 6

Book Type Code Title& Author Publication info

Edition Publisher Year

Text Book T1 Programming the World Wide Web- Robert.W.Sebesta

4th

Edition

Pearson

Education 2008

Reference

Book R1

Internet and World Wide Web- M.Dietel, P.J.Dietel, A.B.Goldberg

3rd

Edition

Pearson

Education/PHI 2004

Reference

Book R2

Web Programming Building Internet Applications- Chris Bates

3rd

Edition Wiley India 2006

Reference

Book R3

The Web Warrior Guide to Web Programming-Xue Bai et al;

-- Thomson 2003

Page 22: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

22

QUESTION BANK

Chapter 1: Fundamentals of Web, XHTML Overview: The objective of this chapter is provide fundamentals of Web, Internet, Web browsers, Web servers and Hypertext transfer protocols and security.

1. Explain the following a. What is the form of IP Address? b. What is the task of DNS name server? c. What is the purpose of telnet? 2. Brief about origins and evolution of Internet. 3. How do partial paths to documents work in web server? 4. What is hyper text? Explain HTTP in brief. 5. Explain the following i) Virtual host ii) Proxy Server iii) Virtual document tree iv) Plug-in v) XHTML converter 6. What is the relation between Java and Javascript? 7. How many different tags are predefined in an XML based Markup Language. 8. What is the purpose of MIME type specification in a request/response transaction between browser and server? 9. Describe the purposes of five most commonly used HTTP methods. 10. Explain the following a. purpose of the Accept field in HTTP request b. Why response header field is often required? c. What important capability is lacking in markup language. 11. Clearly define the following terms: (1) HTML (2) XML (3) WWW 12. Describe a fully qualified domain name and explain how fully qualified domain names are translated into IP. 13. What is XML? List some advantages and disadvantages of using XML. 14. How is Comments shown in HTML? Explain its Purpose. 15. What is Hypertext Transfer Protocol? Describe the purposes of the five most commonly used HTTP Methods. 16. Differentiate between Web and Internet. 17. Create an HTML pages which demonstrates the use of 3 types of list created with a table. Also explain the related tags used. 18. What is the difference between HTML and XHTML? Explain. 19. What is the difference in the effect of paragraph tag, break tag and pre tag? 20. Write the difference between frames and forms. Create a simple frame set to display two pages at the same time. 21. Create a form to accept name, age, address, E-mail id and comments. 22. What is the document type declaration and why it is needed?

Page 23: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

23

23. What is the role of HTML form? Create a simple form which accepts name, address location and comments, by writing HTML code. Chapter 2: CSS Overview: The objective of this is chapter is provide information about different levels of style sheets, specification formats, Lists and their properties, Background images, Span and div style tags etc 24. What is the advantage of document-level style sheets over inline style sheets? 25. What is the purpose of external style sheets? What is format of external style sheets? 26. What are the five generic fonts used in style sheets? How to use a list font type property? 27. Why background images must be chosen with care? 28. What are the three ways color property values can be specified? 29. What is the purpose of <span> and <div> tags? What layout information does a <span> tag by itself indicate to the browser? 30. Create an external sheet for the chapters of the web programming text book. 31. What is a CSS? Describe the different levels of style sheets and their precedence. 32. List and explain the variety of selector forms with example. 33. Describe the different ways that styles can be added to a page with example. 34. What is a layer? 35. Describe briefly about defining your own styles. Chapter 3 & 4: Java Script and HTML documents, Dynamic documents with Java Script Overview: This chapter gives insight of Javascript, document object model and its usage with Javascript and event handling in java script. 36. Describe briefly three major differences between Java and Java script. 37. Describe briefly three major uses of Java script on the client side. 38. What are the two categories of properties in JavaScript? 39. Why does JavaScript have two categories of data variables, primitives and objects? 40. What purpose do rules of operator precedence and associativity serve in a programming language? 41. Describe the operation of prompt method. 42. What are the three possible forms of control expressions in JavaScript? 43. What is the difference between while and do. While statements? What are the semantics of break statement? 44. What is the difference between constructor in Java and in JavaScript? 45. Describe the two ways of the properties of an object can be referenced. 46. What is the one way in which primitive variables can be passed by reference to a function? 47. Write, test, and debug (if necessary) XHTML files that can include JavaScript for the following problems. When required to write functions, you must include a script to test the function with at least two different data sets 1. Output: A table of numbers from 5 to 15 and their squares and cubes using alert. 2. Output: the first 20 fibonacci numbers, which are defined as the following sequence 1,1,2,3……. 48. What is an event? What is event handler? How the events are handled? 49. Describe the approach to addressing XHTML elements using

Page 24: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

24

a) forms and elements b) name attributes 50. What are the advantages and disadvantages of assigning event handlers to properties? 51. What three things should be done when a form input element is found to have incorrectly formatted data? 52. Explain three phases of event processing in DOM2 event model. 53. Define and explain a dynamic XHTML document. 54. Describe all differences between three possible values of the position property. 55. What events can be used to change a font when the mouse cursor is moved over and away from the element? 56. Describe two ways to embed a java script in a XHTML document. Give example for each. 57. Explain string properties and methods in Javascript. 58. Write and test XHTML and Javascript files for reading three numbers using prompt to get each and output the largest of three numbers. 59. With an example, give the basic structure of a Java script. List the benefits and problems with Java script. 60. Explain basic array functions in Java script. 61. What are the benefits of Java script? With an example give the basic structure of a javascript. 62. Explain with example any four string functions used in java script. 63. Write and test a regular expression, which swaps the first two words of a string. 64. Create a simple HTML page which includes simple form write a script to extract the data from the form when the submit button is clicked. Display the extracted data in a new document. 65. Explain clearly the functioning of javascript key words new, this and dot operators. 66. What is an array? Write a script which accepts inputs from the user, stores all the strings in an array and then displays them in reverse order. 67. Write a script which contains the various types of loops. Print out the loop counter each that the script iterates. 68. List and explain various functions defined in the document object and window object of a Java script. 69. What are events in the Java Script? Explain, also list the eight javascript events. 70. What is a DOM? Describe the DOM structure for a simple document. 71. Describe the approach to addressing XHTML elements using (1) Forms and Elements (2) Name attribute (3) get Element by ID 72. What is an event and event handler? List any five most commonly used attributes related to events, tags that can include the attributes and circumstances under which the associated events are created. 73. A web page has two fields, to accept name and age of a person. Develop javascript to validate these fields.

Page 25: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

25

Chapter 5: XML Overview: The objective of this chapter is to provide a brief description of XML and some of its characteristics, providing explanation of Name Spaces, DTD’s , XSLT Style sheets and Web Services 74. Bring out differences in Goals of XML and Goals of HTML. 75. Explain the parsing of XML documents. 76. What is the purpose of DTD and explain how to find errors in DTD before it is used? 77. Explain three types that can be used to describe data in an element declaration. What are four possible parts of an attribute declaration in DTD? 78. What is a XML Namespace? Explain the usage in brief. 79. What are the advantages of XML schemas over DTD’s? Where do the names used from in defining XML Schema? 80. Explain the ultimate goals of Webservices. Describe three roles in Web Services. 81. What are the four categories of complex types in an XML Schema? 82. What is the purpose of DTD? Explain how elements, attributes are declared in DTD with an example. 83. Why would you use a CSS-style sheet for an XML documents? 84. Define the purpose of XSLT style sheet. How does an XSLT processor use an XSLT style sheet with an XML document?

Chapter 6: Perl, CGI Programming Overview: The objective of this chapter is to give description about Perl, introduction and operations in Perl, using of control statements, arrays, introduction to new data structures such as hashes, references, functions and pattern matching in Perl, Handling File Input and Output etc. 85. What are the three categories of Perl variables? How many numeric data types does perl have? 86. What is file handle? How it works? 87. Why does Perl have two sets of relational operators? 88. What are the fundamental ways in which hashes differ from arrays? 89. In what three fundamental ways do Perl arrays differ from the arrays of other common high-level programming languages? 90. Describe the following a. Two parameters from substitute operator. b. Transliterate operator c. Four file use specifications 91. What are the three categories of operations that are essential in Web documents but that cannot be done with XHTML? 92. What is the most common way for a client to provide information to the server? 93. How is the CGI program that processes a form reside on the server that provided the form to the client? 94. Explain the following a. Form data

Page 26: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

26

b. Query string c. Cookies d. CGI.pm module 95. What are three categories of perl variables? Give example for each. 96. What a file handle? Explain how files can be opened for input and output in perl. 97. Describe basics of perl functions. 98. What is query string? Explain how query string is transmitted into the server with get and post method. 99. What are cookies? Where cookies are stored? What is form of the value of a cookie. 100. What is the purpose of the shortcuts in CGI.PM? 101. What are the basic data types in Perl? 102. Explain briefly text handling facilities provided by Perl. 103. Write a perl program which uses built in Perl function to get the current system time and date, format that information and print it to the screen. 104. What is CGI? How parsing of data is done using Get and Post Methods. 105. What is a Cookie? Explain creating, reading and deleting cookie. 106. What is strict? Explain. 107. With a diagram explain Perl DBI module. 108. List the six benefits of using CGI.pm rather than writing your own code. 109. List the benefits of Perl Programming Language. 110. What are the basic data types in Perl? How Perl variable can acts a string and number. 111. Explain briefly different looping structures in Perl, giving examples. 112. Explain briefly how HTML pages can be created dynamically using CGI. 113. Write a Perl script which accepts string inputs from the user, stores all of them in an array and displays them in the reverse order. 114. Design a CGI script to demonstrate uploading of files to a WEB server.

Page 27: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

27

DESIGN AND ANALYSIS OF ALGORITHMS

Subject Code: 07MCA44 Hrs/Week: 04 Faculty: Mrs. A. Lekha Total Hrs: 52

Overview: An algorithm is a systematic method that contains a sequence of instructions to solve a computational problem. They play a central role in the study of Computer Science. Several algorithms were developed for different problems and we now have several algorithms for the same problem with different design techniques. This course mainly deals with understanding of the different design techniques. It is done by studying the nature of several algorithms. Analysis methods are used to decide whether the algorithms are time or space efficient and where to use them.

Class No.

Chapter Title/Reference Literature

Topics to be covered % of portions covered

Chapter wise Cumulative

1 Chapter 1: Introduction T1: 29-65

Notion of Algorithm

11.5 11.5

2 Fundamentals of Algorithmic Problem Solving

3 Fundamentals of Algorithmic Problem Solving

4 Important Problem Types 5 Fundamental Data Structures 6 Fundamental Data Structures 7 Chapter 2:

Fundamentals of the Analysis of Algorithm Efficiency T1: 67-109

Analysis Framework

11.5 23

8 Asymptotic Notations 9 Basic efficiency classes

10 Mathematical Analysis of Recursive algorithms

11 Mathematical Analysis of Non recursive algorithms

12 Examples 13 Chapter 3:

Brute Force T1: 123-131, 140-146

Selection Sort, Bubble Sort 5.8 28.8 14 Sequential Search, String Matching

15 Exhaustive Search 16 Chapter 4:

Divide and Conquer T1: 149-174

Merge sort

9.6

38.4

17 Quick Sort

18 Binary Search, Binary tree Traversals and related properties

19 Multiplication of large integers 20 Stressen’s Matrix Multiplication

Page 28: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

28

21 Chapter 5: Decrease and Conquer T1: 183-207

Insertion sort

9.6 48.00

22 Depth First Search 23 Breadth First Search 24 Topological Sorting

25 Algorithms for Generating Combinatorial Objects

26 Chapter 6: Transform-and Conquer T1: 223-227,240-255, 263-273

Presorting

13.5

61.5

27 Balanced Search Trees –AVL Trees 28 AVL – Trees Continued 29 2-3 Trees 30 Heaps 31 Heap sort 32 Problem Reduction 33 Chapter 7:

Space and Time Tradeoffs T1: 275-296

Sorting by Counting

7.7 69.2 34 Input Enhancement in String Matching 35 Input Enhancement in String Matching

36 Hashing.

37 Chapter 8: Dynamic Programming T1: 305-318, 325-330

Computing a binomial coefficient

9.6 78.8 38 Wars hall’s Algorithms 39 Floyd’s Algorithms 40 The Knapsack Problem 41 Memory Functions 42 Chapter 9:

Greedy Technique T1: 333-359

Prim’s Algorithm

7.7 86.5 43 Kruskal’s Algorithm 44 Dijkstra’s Algorithm 45 Huffman Trees 46 Chapter 10:

Limitations of Algorithm Power T1: 405-427

Lower-bound Arguments

7.7 94.2 47 Decision Trees 48 P, NP Problems 49 NP-Complete Problems

50 Chapter 11: Coping with the Limitations of Algorithm Power T1: 441-477

Backtracking

5.8 100.00 51 Branch-and-Bound

52 Approximation Algorithm for NP-Hard problems

Page 29: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

29

Literature

Book Type Code Title & Author Publication Info. Publisher Year

Text Book T1 Title : Introduction to the Design and Analysis of Algorithms Author : Anany Levitin, 2nd Edition

Pearson Education 2003

Reference Book

R1 Title : Computer Algorithms Authors : Horowitz E., Sahani S., Rajasekharan S

Galgotia Publications 2001

Reference Book

R2 Title : Introduction to Algorithms Authors : Coremen T.H., Leiserson C.E., and Rivest R. L.

PHI 1998

Test 1: Chapter 1, 2 & 3 Test 2: Chapter 4, 5 & 6 Test 3: Chapter 7, 8, 9, 10 & 11

Page 30: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

30

Question Bank

Chapter 1: Introduction Overview: This chapter deals with the basic understanding of algorithms and fundamental data structures.

1 Explain the term Algorithm, with its properties. Give one example 2 Explain each step in Fundamentals of Algorithm Problem Solving. 3 What are the important problem types in ADA? Explain them. 4 Explain the terms with one example--

a) Binary Tree b) Complete Binary Tree c) Binary Search Tree d) Siblings e) Forest

5 Explain the various stages of algorithm design and analysis process with the help of a flow chart.

6 Let A be the adjacency matrix of a graph. Which property of the matrix indictes that 1. The graph is an undirected graph. 2. The graph is a complete graph. Give examples

7 What is the advantage of first child-next sibling representation of a tree. Explain with an example Chapter 2: Fundamentals of the Analysis of Algorithm Efficiency Overview: This chapter deals with the asymptotic notations and basic efficiency classes and mathematical analysis

8 When do you call an algorithm is stable and algorithm is in place? 9 Write an Algorithm for Sequential Search, Discuss Worst case, Best Case and average-Case

Efficiencies of this Algorithm 10 Discuss the three Asymptotic Notations. 11 List the basic efficiency classes according to their order of complexities. 12 With an example Discuss Mathematical Analysis of a Non Recursive Algorithm. 13 With an example Discuss Mathematical Analysis of a Recursive Algorithm. 14 Define space and time complexities of an algorithm. Explain the concept of Asymptotic

notations, indicating the commonly used notations. 15 Write a recursive algorithm to find the number of digits in the binary representation of a

positive decimal integer and analyze.

Page 31: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

31

Chapter 3: Brute Force Overview: This chapter deals with the asymptotic notations and basic efficiency classes and mathematical analysis

16 Explain Brute Force Method, Write an Algorithm for Sorting an Array Using Brute Force

Method, Analyze it for its Complexity. 17 Write the brute force string matching algorithm and analyze the same for best, average and

worst cases. 18 Discuss TSP and Knapsack Problem using Exhaustive Search Technique.

Chapter 4: Divide and Conquer Overview: This chapter deals with the best known general algorithm design technique.

19 Design an algorithm for finding the maximum and minimum of a given array A(1,n) of

unordered numbers and determine the worst case time complexity. 20 Compare consecutive pairs of elements and then, compare the larger one with the current

maximum and the smaller one with current minimum in turn find the maximum and minimum. Write an algorithm for this and analyses the number of’ comparisons it requires.

21 Explain Selection sort and Bubble sort with its complexities. 22 Discuss sequential search and Brute Force String Matching Algorithm. With its complexities. 23 Explain Merge sort with its complexities. 24 Explain Quick sort with its complexities. Trace the algorithm with an example. 25 Explain Binary Search with its complexities. 26 Explain Binary Tree Traversals and Related Properties. 27 Explain the divide and conquer algorithm for the Multiplication of Large Integers. 28 Discuss the Strassen’s Matrix Multiplication method and derive its complexities. 29 Discuss Master Theorem. 30 Write an algorithm for quick sort and illustrate it with the following input

5, 8, 3, 2, 9, 7, 1, 4 31 Explain the procedure to multiply two large integers based on divide and conquer strategy

and analyze.

Chapter 5: Decrease and Conquer Overview: This chapter deals with a technique that is based on exploiting the relationship between a solution to a given instance of a problem and a solution to a smaller instance of the same problem.

32 Explain Insertion Sort and find the best, worst and average case complexities. 33 Explain DFS and BFS. 34 Explain Toplogical sorting with an application. 35 Write an Algorithm for generating permutations.

Page 32: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

32

36 Discuss the process of generating subsets. 37 Write an algorithm for DFS traversal and apply that to the graph shown starting with vertex

‘g’. Also write the corresponding DFS forest.

38 Explain Johnson-Trotter Algorithm for generating permutation. Illustrate this with n = 3.

Chapter 6: Transform and Conquer Overview: This chapter deals with a group of design methods that are based on the idea of transformation.

39 Discuss the Transform and Conquer Technique. 40 Explain Presorting with its complexities. 41 Discuss an algorithm to calculate the mode of an array. 42 Write a note on Balanced Search Trees. 43 What are AVL trees? Discuss the four types of rotations with its general form. 44 Discuss 2-3 trees. Construct 2-3 tree with a suitable example. 45 Define Heap and discuss the process of construction of Heap with an example. 46 Discuss Heap sort technique and derive its complexities. 47 Discuss Problem Reduction Techniques with examples. 48 Write an algorithm to compute the mode of an array using presorting. 49 Construct an AVL tree for the following list of numbers by inserting the elements

successively: 6,2,1,8,7,5 Chapter 6: Space and Time Tradeoffs Overview: This chapter deals with a well known issue for both theoreticians and practitioners of computing.

50 Explain Sorting by Counting with example. 51 Write an algorithm for Distribution counting. 52 Write Horspool’s Algorithm for String Matching. 53 Write a note on Space and Time tradeoff. 54 Discuss Boyer-Moore Algorithm for String Matching. 55 Explain Open Hashing and Closed Hashing. 56 What is input enhancement? Discuss the Horspool-string matching algorithm and apply this

algorithm to search for the pattern BAOBAB in the text BESS-KNEW-ABOUT-BAOBABS.

Page 33: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

33

Chapter 7: Dynamic Programming Overview: This chapter deals with a technique that is used to solve problems with overlapping

sub-problems. 57 Write an algorithm for Computing Binomial Coefficient. 58 Explain Warshall’s Algorithm With an example. 59 Explain Floyd’s Algorithm With an example. 60 Write an algorithm to solve Knapsack Problem using Memory Functions. 61 Give a pseudo code for Warshall’s algorithm for computing the transitive closure of a

digraph. Apply this to the graph

62 Explain the concept of Huffmann trees with necessary algorithms.

Chapter 8: Greedy Technique Overview: This chapter deals with a general design technique that is more applicable to optimization problems.

63 Explain Greedy Technique. 64 Write Prim’s Algorithm to construct a minimum spanning tree. 65 Explain Kruskal’s Algorithm With an example. 66 Explain Dijkstra’s Algorithm With an example. 67 Write a note on Huffman Trees. 68 Construct a Huffman code for the following data:

Character : A B C D - Probability : 0.4 0.1 0.2 0.15 0.15

69 Solve the single source shortest path problem for the graph shoen by considering a as the source vertex

Page 34: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

34

Chapter 9: Limitations of Algorithm Power Overview: This chapter deals with the limits of the power of algorithms

70 Write note on Lower –Bound Arguments. 71 Write note on Decision Trees. 72 Write note on P, NP, and NP-complete Problems

Chapter 10: Coping with Limitations of Algorithm Power Overview: This chapter deals ways of dealing with difficult problems that are difficult to solve algorithmically.

73 Explain Backtracking method with the help of n-Queens Problem. 74 Explain Hamiltonian Circuit Problem using Backtracking technique. 75 Explain Subset- Sum Problem using Backtracking technique. 76 Explain Branch and Bound Technique with Knapsack Problem. 77 Explain Branch and Bound Technique with TSP Problem. 78 Explain Branch and Bound Technique with assignment problem. 79 Solve the following traveling salesman problem by branch and bound Technique. Cost

matrix for this problem is given below: 2 5 7 2 8 3 5 8 1 7 3 1

80 Explain Branch and Bound technique. Apply this to the following instance of Knapsack problem

Item Weight Value Value/Weight 1 4 40 10 2 7 42 6 3 5 25 5 4 3 12 4

Knapsack capacity W = 10

Page 35: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

35

UNIX SYSTEM PROGRAMMING

Subject Code : 07MCA 452 Hours/week: 04 Faculty : Meena L Total hours: 52

Overview: UNIX system programming, on the other hand, is a course that combines programming languages and Unix operating systems. Commands or Shell commands are composed of executing a program, terminating a process, querying system information, compiling a piece of user program, debugging program, reading mail, running a browser, etc., Unix operating systems are varied from vender to vender though some Unix standards have been built such as ANSI C, POSIX and X/Open. It provides a set of application programming interface functions known as system calls which may be called by users programs to perform system specific functions. It also includes inter process communication like message queues, shared memories etc and network programming using sockets, certain utilities and threads.

Class No.

Chapter Title / Reference Literature

Topics to be covered

% Of portions to be covered Reference Chapter Cumulative

1.

Chapter: 1 Introduction T1: Page No 2 to 18 & 125-128

The ANSI C standard, The ANSI/ISO C++ standard, Differences between ANSI C and C++

10 10

2. The POSIX standard 3. The POSIX.1 FIPS standard ,The X/OPEN

standards 4.

The POSIX APIs, The UNIX and POSIX development Environment,

5. API common characteristic

6. Chapter: 2 Unix Files T1: Page 130 to 144

File Types, UNIX and POSIX file system

12 22

7. The UNIX and POSIX file attributes, Inodes in UNIX system V,

8. Application program interface to files ,UNIX Kernal support for files

9. Relationship of C stream pointers and file descriptors,

10. Directory files, Hard and symbolic links 11.

Chapter: 3 Unix File APIs T1: page 148 to 203

General file APIs-read 12. Creat, read, write, close 13. Fcntl, lseek 14. Link, unlink

14 36 15. Stat , fstat 16. Access, chmod, fchmod 17. Chown,fchown,lchown, utime

Page 36: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

36

18. File and record locking 19. directory file APIs 20. Device file APIs 21. FIFO file APIs, Symbolic link file APIs 22.

Chapter : 4 & 5 Unix Processes & Process control T2: Page 179 to 259

Introduction to environment of a UNIX process, main function, process termination

28 64

23. Environment list, Memory layout of a C program,

24. Shared libraries, Memory allocation

25. Environment variables, setjmp and longjmp functions getrlimit and setrlimit functions

26. UNIX kernel support for processes 27. process identifiers, fork 28. vfork, exit, Wait, waitpid, 29. wait3, wait4 functions, 30. Race conditions, exec functions 31. changing user ID’s and group Ids, 32. interpreter files, System function 33. process accounting, Use identification,

process times 34. terminal login, Network logins 35. Process groups, sessions, controlling

terminal 36. Tcgetgrp and tcsetpgrp functions, job

control 37. Shell execution of programs, Orphaned

process groups 38. Chapter: 6

Signals And Daemon Process T1: Page 261 to 282 T2: Page 423 to 439

The UNIX kernel support for signals

14 78

39. Signal, signal mask 40. Sigaction, the SIGCHLD signal and the

waitpid function 41. Sigsetjmp, siglongjmp functions, kill 42. Alarm, Interval timers, POSIX.1b Timers 43. Introduction to daemon processes, Daemon

characterstics, Coding rules 44. Error logging

Single-instance daemons, daemon conventions, client server model

45. Chapter: 7 & 8 Interprocess Communication and Network IPC -Sockets

pipes

22 100

46. popen and pclose functions 47. Coprocesses, FIFOs

XSI IPC, Message Queues Semaphores

48. Socket descriptors, addressing

Page 37: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

37

49. T2:Page 427 to 471 T2: Page 495 to 82

Addressing 50. Connection establishment 51. Data transfer 52. Socket options: out of band data;

onblocking and asynchronous I/O Literature: -

Book Code Author Book Name Publishers Year

Text T1 Terrance Chan UNIX System Programming using C++ Prentice Hall India 1999

Text T2 W Richard Stevens

Advanced Programming in the UNIX Environment

Prentice Hall India 2005

Test 1: Chapter 1, 2, 3 (Up to Class No. 16) Test 2: Chapter 3 (from Class No. 17 – 21), 4, 5 Test 3: Chapter 6, 7, 8

Page 38: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

38

QUESTION BANK

Chapter1: Introduction Overview: It gives an overview of the ANSI C, draft ANSI/ISO C++ and the POSIX standards. 1) Difference between ANSI C and C++ standards. 2) List out all POSIX.1 and POSIX.1b defined configuration limits in manifested constants with compile time limit, minimum value and meaning. 3) What is POSIX standard? Explain different subsets of POSIX standard . Write the structure of the program to filter out non-POSIX compliant codes from a user program. 4) Write a C++ program that prints the POSIX defined configuration options supported on any given system using feature test macros Chapter2: UNIX files Overview: It provides a set of API functions which may be called by the users programs to perform system specific functions. 5) What is an API? How they are different from ‘C’ library functions? Calling an API is more Time-consuming than calling a user function. 6) Explain the different file types available in UNIX or POSIX systems 7) Describe the UNIX kernel support for files. 8) Explain UNIX kernel support for files with a neat data structure. Chapter3: UNIX file APIs Overview: This describes how the UNIX and POSIX applications interface with files. It covers different types of file system like regular file, directory file, FIFO file, character device file, block device file, symbolic link file. 9) Differentiate between hard link and symbolic links with an example . 10) Describe FIFO and device file classes. 11) Explain how fcntl API can be used for file and record Locking Chapter4: UNIX process Overview: What the typical memory layout looks like , how to allocate additional memory how the process can use environmental variables and different ways for the process to terminate. 12) Describe the UNIX kernel support for process. Show the related data structure. 13)Explain briefly the memory layout of a C program. Chapter5: Process control Overview: This includes the creation of new process, executing Programs and process termination. User and group IDs and how they are affected by the process control primitives 14) What is fork and vfork? Explain with an example for each. 15) What is a zombie process? Write a program in C++/C to avoid zombie process by forking

Page 39: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

39

twice 16) What is job control? Summarize the job control features with a fig 17) Explain different exec functions. Describe how their function differ from each other 18) Explain process of changing user and group ID of files 19) Explain different exec functions. Describe how their functions differ from each other. Write a program that execs an interpreter file. 20) Explain how process accounting is done in UNIX system. Write a program to generate accounting data and give its data structure 21) What is meant by job control? What support is required for job control? Explain with example 22) What is controlling terminal explain its characteristics and relation to session and process groups Chapter 6: Signals and Daemon process Overview: This chapter covers signals and daemons. Signals are triggered by events and are posted on a process to notify it that something has happened and requires some action. Daemons are process that live for along time. Usually they run in the background. We discuss about how to write a daemon and how to control it. 23) Explain with prototypes kill function, sigsetjmp and siglongjmp API’s 24)Discuss daemon characteristics and coding rules 25) Write a program in ‘C’ to st up a real time clock internal time using alarm API. #include <stdio.h> #include <unistd.h> #include <signal.h> #define INTERVAL 5 void callme( int sig_no ) { alarm( INTERVAL ); /* do scheduled tasks */ } int main() { struct sigaction action; sigemptyset(&action.sa_mask);

#ifdef SOLARIS_25 action.sa_handler = (void (*)(int))callme;

#else action.sa_handler = (void (*)())callme;

#endif action.sa_flags = SA_RESTART;

Page 40: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

40

if ( sigaction( SIGALRM,&action,0)==-1 ) { perror( "sigaction"); return 1; } if (alarm( INTERVAL ) == -1) perror("alarm" ); else while( 1 ) { /* do normal operation */ 26) Give an overview of IPC methods 27) Explain p open and p close functions with prototypes and write a program to demonstrate the p open and p close functions 28) What are named pipes? Explain with example the use of l seek , link , access with their prototype and argument values 29) What is the need for sigproc mask function? 30) Write a short note on: a) Environment list b) Semaphores c) Client d) Coprocesses 31) What is a signal? Explain signal mask with example 32) Discuss daemon characteristics and coding rules 33) What are pipes? Explain their limitations explain how pipes are created and used in ipc with example 34) Write a short note on: a) inodes b)FIFO files c) Environment variable d) pipes 35) Explain the different file types available in POSIX with the command types that can be used to create the file types 36) Explain the actions taken by the kernel when the process calls the open function to open a file 37) Explain the access mode flags and access modifier flags .Also explain how the permission value specified in an ‘open’ call is modified by its calling process ‘unmask’ value. Illustrate with an example. 38) Explain the use of the following APIs with example i) fcntl ii)lseek iii)write iv)close 39) With suitable examples explain various directory file APIs 40) Explain briefly the memory layout of a C program 41) With an example explain the use of setjmp and longjmp functions 42) Explain different exec functions. Describe how the function differ from each other . 43) What is a signal? Explain signal mask with example. 44) Discuss daemon characteristics and coding rules 45) What is message queue? Explain client server communication using a message queue 46) Write a program to create a pipe from the parent to child and send the data down the pipe

Page 41: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

41

#include <sys/wait.h> #include "ourhdr.h" Int main(void) { char line[MAXLINE]; FILE *fpin; if ( (fpin = popen("myuclc", "r")) == NULL) err_sys("popen error"); for ( ; ; ) { fputs("prompt> ", stdout); fflush(stdout); if (fgets(line, MAXLINE, fpin) == NULL) /* read from pipe */ break; if (fputs(line, stdout) == EOF) err_sys("fputs error to pipe"); } if (pclose(fpin) == -1) err_sys("pclose error"); putchar('\n'); exit(0); 47) Write short notes on the following a) Memory allocation b) Pipes c) Job control d) UNIX files Chapter 7 & 8: Interprocess communication-1 and Sockets Overview: This chapter provides examination of IPC like pipes, FIFO, message queues, semaphores and shared memory. It also gives introduction to sockets and connection establishment. 48) Describe different to view a pipe. 49) Explain popen and pclose functions with program. 50) What is a coprocesses? Write a simple filter to add two numbers. 51) What is FIFO? Explain how to duplicate output streams and client server communication using FIFO. 52) What is semaphores? Discuss about it. 53) Discuss about socket and write a program to implement sockets. 54) How to establish connection between client and server? 55) Write short note on XSI IPC and message queues.

Page 42: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

42

MULTIMEDIA SYSTEMS

Subject Code: 07 MCA453 Hours / Week: 04 Faculty: P.Sreenivas Total Hours: 52 Overview: Multimedia has become a popular technology in the ever-changing world of computers. Since last few years, it seems to be much sought after the talked about, not only in the World of Information Technology, but also in various functional fields like advertisement, corporate sector, cinema, fashion design and education, to name a few. More and more research work on this new technology of sound, animation and text, is making it better and better with every passing day. It is one of the most realistic ways of working even for people having no knowledge of computers. It targets people from almost all ages of life from a toddler to an aged one.

Class #

Chapter Title/Reference Literature

Topics to be covered

% of portions to be covered Reference Chapter

Cumulative

1

Chapter1: Introduction, Media

and Data streams, Audio Technology

T2 Pgno 1-50 T1 pgno 23-31 & 37-59

Multimedia Elements, Multimedia Applications, Multimedia system Architecture

12 12

2

Evolving technologies for Multimedia Systems, Defining objects for multimedia systems, Multimedia different interface standards

3 The need for data compression, Multimedia databases

4

Media: Perception media, Representation media, Presentation media, Storage media, Characterizing continuous media streams.

5 Sound: Frequency, Amplitude, Sound Perception and Psychoacoustics

6

Audio representation on computers, Three dimensional sound projection, Music and MIDI standards, Speech signals, Speech output, input and transmission

7 Chapter 2: Graphics and Images,

Video Technology, Computer based

animation T1 Pgno 61-93 & 95-109

Capturing Graphics and Images Computer Assisted Graphics and Image processing: Reconstructing images

14 26 8 Reconstructing images, Graphics and Image output options

9 Basics of television systems, digitalization of video signals

Page 43: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

43

10 Digitization of video signals, digital television: basic concepts

11 Basic concepts of animations, methods of controlling animation

12 Methods of controlling animation, display of animation

13 Display of animation, transmission of animation

14 Virtual reality modeling language

15

Chapter 3: Data Compression-I

T1 Pgno 121-151

Storage space: Coding requirements, Source

12 38

16 Entropy and hybrid coding

17 Basic compression techniques, JPEG: Image preparation, Lossy sequential DCT based mode

18 Lossy sequential DCT based mode, Expanded Lossy DCT based mode

19 Expanded Lossy DCT based mode

20 Loss less mode, Hierarchical mode

21

Chapter 4: Data Compression-II

T1 Pgno 153-182

H.261 (Px64) and H.263 an introduction

12 50

22 H.261 (Px64) and H.263 an introduction, Image preparation, coding algorithms

23 Data stream, H.263+ and H.263L, MPEG:Video encoding

24 Video encoding, audio encoding, Data stream

25 Data stream, MPEG-2, MPEG-4

26 MPEG-4, MPEG-7, Fractal compression

27

Chapter 5: Optical Storage Media

T1 Pgno 186-218

History of optical storage, Basic technology: Video discs and other WORMs

12 62

28 Video discs and other WORMs, Compact disc digital audio

29 Compact disc read only memory, CD-ROM extended Architecture

30 Further CD-ROM based developments, Compact Disc recordable

31 Further CD-ROM based developments, Compact Disc recordable, Compact-Disc Magneto-Optical

32 Compact disc read/write, Digital Versatile Disc

33 Chapter 6: Content Analysis T1 Pgno 222-249

Simple Vs Complex Features 12 74

34 Simplex vs Complex features, Analysis of Individual images

Page 44: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

44

35 Analysis of Individual images, Analysis of Image sequences

36 Analysis of image sequences

37 Analysis of Image sequences, Audio analysis

38 Audio Analysis and applications

39

Chapter 7: Data and file Format

Standards T2 Pgno 124-186

Rich Text Format- Tiff File format

14 88

40 Resource Interchange File Format (RIFF)

41 MIDI file format

42 JPEG DIB file format for still and Motion images

43 AVI Indeo file format 44 AVI Indeo file format, MPEG standards 45 MPEG standards, TWAIN

46

Chapter 8: Multimedia

Application Design T2 Pgno 380-240

Multimedia Application classes, Types of multimedia systems

10 98

47 Types of multimedia systems, Virtual reality design

48 Virtual reality design, Components of multimedia systems

49 Organizing Multimedia databases, Application workflow design issues

50 Application workflow design issues, Distributed application Design issues

51

Revision

Revision of important topics

2 100

52 Discussion of Question papers (previous)

Page 45: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

45

LITERATURE:

Book Type code Title and Author

Publication Specification Edition Publication Year

Text Book T1

Multimedia Fundamentals:Vol1-Media coding and content processing-Ralf Steinmetz, Klara narstedt.

2nd

Pearson education/PHI

2003

Text Book T2 Multimedia Systems Design-Prabhat k Andleigh, Kiran Thakrar

PHI

2003

Reference Book R1

Multimedia Communication Systems: techniques, standards and Networks-K.R.Rao,Zoran S.Bojkovic and Dragorad A.Milovanovic

Pearson Education 2002

Reference Book R2 Multimedia information

Networking-nalin k Sharad PHI 2002

Test1: Chapter 1, 2, 3 Test2: Chapter 4, 5, 6 Test3: Chapter 6, 7, 8

Page 46: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

46

Question Bank Unit-1: Introduction, Media Streams, Audio Technology Objective: The objective of this chapter is to present the basic definition of the various data elements and applications sources associated with multimedia and the requirements of the universal multimedia applications, object types and specialized technologies used in multimedia systems are introduced in this chapter. Also different terms used in multimedia are described in this chapter and Important aspects of audio technology such as psychoacoustics, music and the MIDI interface standards and speech synthesis are described in this chapter.

1. Define and explain what constitutes a multimedia system. 2. Explain various Multimedia Elements in brief. 3. What are the different applications of Multimedia? 4. Explain Multimedia architecture with a neat diagram. 5. What are the different technologies that are evolved for Multimedia systems? Explain. 6. What is the need of Data compression? Explain. 7. Explain different Multimedia Data Interface standards. 8. What is the difference between Lossy data compression and Lossless data compression? 9. Explain about Multimedia databases. 10. Explain about various types of media used in Multimedia systems. 11. What are the key properties of Multimedia system. 12. What is sound, frequency, amplitude and psychoacoustics? 13. Explain about three-dimensional sound projection in brief. 14. What is MIDI standard? Explain in brief. 15. Explain the speech synthesis in brief. 16. What is speech recognition? Explain in brief. 17. How speech is transmitted? Explain. 18. Explain the following i) speech input ii) Source Encoding

Unit-2 Graphics and Images, Video Technology and Compute-based Animation Objective: This chapter describes computerized graphics and images, their respective properties and how they can be acquired, manipulated, and output on computers. Also this chapter describes concepts and developments in the area of video technology for a basic understanding of this medium and covers primary computer based animation, medium used for this animation etc

1. Explain various types of image formats. 2. Explain how to create graphics in Multimedia Systems. 3. Explain Image Analysis in brief. 4. Explain Image Segmentation and Image Recognition in brief. 5. Explain Image Synthesis in brief. 6. What is Stereoscopy? Explain in brief. 7. What is Dithering? Explain. 8. How Video signals are represented? Explain. 9. Explain different Video signal formats. 10. Explain about HDTV in brief. 11. Explain digitalization process of video signals. 12. Explain different methods of controlling animation. 13. What is VRML? Explain in brief.

Page 47: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

47

Unit-3 Data Compression-I Objective: This chapter describes different and efficient compression techniques of audio and video using some standards. 1. Explain Source, Entropy and Source Coding in brief and bring out the differences between them. 2. Explain different basic compression techniques in brief. 3. Explain Huffman coding with a example. 4. What is JPEG? Explain in brief. 5. Explain how images are prepared under JPEG? 6. Explain the technique Lossy Sequential DCT-based Mode. 7. Bring out the differences between Lossless mode and Hierarchical Mode. 8. What is Entropy encoding? Explain in brief.

Unit-4 Data Compression-2 Objective: This chapter describes various standards such as H.261 (px64) and H.263, different coding algorithms and various encoding and decoding methods etc

1. Explain in brief H.263 (px64) and H.263. 2. Explain Image preparation under H.261 3. What is MPEG? Explain. 4. Explain video encoding and Audio encoding under MPEG in brief. 5. Explain MPEG-2 in brief. 6. What is Fractal Compression? Explain in brief. Unit-5 Optical Storage Media Objective: This chapter describes different storage media such as hard disks, CD-ROMs, DVDs and technologies associated with those media and standards used in those media. 1. Explain basic underlying technology of Optical Storage Media. 2. Explain CD-ROM technology and their limitations in brief. 3. Explain CD-R technology in brief. 4. What is DVD? Explain different standards of DVD in brief. 5. Explain about CD-ROM extended architecture.

Unit-6 Content Analysis Objective: This chapter describes currently available content analysis techniques inherent to various media. Also describes various analysis methods of individual images and image sequences

1. Explain individual images are analysed. 2. Explain how image sequences are analysed. 3. What is Audio analysis? How it is performed? 4. What are the applications of Content Analysis?

Page 48: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

48

Unit -7 Data and File Format Standards Objective: this chapter describes various data and file format standards such as RTF, TIFF file format, RIFF, JPEG DBI format and AVI Indeo file format, MPEG standards and TWAIN.

1. Explain RTF in brief. 2. What is TIFF file format? Explain in detail. 3. What is RIFF file format? Explain in detail. 4. Explain in detail about MIDI. 5. Explain the following i) AVI Indeo file format ii) MPEG standards 6. Explain about TWAIN in detail.

Unit-8 Multimedia Application Design Objective: This chapter describes various multimedia application classes, types of multimedia systems such home/entertainment systems, business systems, issues related to Virtual Reality Design, components of multimedia systems and organizing of Multimedia databases.

1. What is workflow? Explain benefits of Workflow Management. 2. Explain different Multimedia application classes. 3. What are different types of multimedia systems? 4. Explain about Virtual Reality Design in brief 5. What are Multimedia inputs and outputs? 6. What are various Virtual reality Design considerations? 7. What are components of Multimedia Systems? 8. Explain how to organize multimedia databases? 9. What are different Distributed application design issues?

Page 49: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

49

Principles of User Interface Design

Subject: Code: 07MCA455 No.of hours: 52 Faculty: Chengappa B S No.of hours/week: 04 Overview The software development requires many features of the standard specification since it is used by

world wide users. Smooth flow of the interface is one of the major factors in it. If the interaction is not up to the reach of all kinds of users, the software assessed to be not up to the mark. This subject gives the procedures and guidelines to maintain high degree of interaction required by the system to the user.

Class #

Chapter Title/Reference

Literature Topics to be covered

% of portions to be covered

Reference Chapter Cumulative

1

Chapter1: Human Factor of Interactive S/w Theories,

principles, and Guidelines

Introduction, Goals of System engineering, goals of interface design, accommodation of human diversity.

12 12

2 Goals for the profession, high level theories

3 Object action interface model, principle 1,

4 Recognized the diversity, principle 2, Use the 8 golden rules of interface

5 Principle 3 prevent errors, guide lines for data display.

6 Guide lines for data entry, balance of automation and human control.

7

Chapter 2: Management

issue

Introduction, organization design to support usability, the three pillars of design

12 24

8 Development of methodology, ethnographic observation.

9 Participatory design, scenario development

10 Social impact statement for early design review, legal issues, expert reviews

11 Usability testing and laboratories, surveys, acceptance test, evaluation during active use

12 Control psychologically oriented experiments

13 Chapter 3:

Introduction, specification, methods interface building tools 13 37

Page 50: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

50

14 Tools and Environment

Evaluation and Critiquing tools, introduction

15 Examples of direct manipulation systems, explanation of direct manipulation.

16 Visual thinking and icons, 17 Direct manipulation programming 18 Home automation,

19 Remote direct manipulation Virtual environment.

20 Chapter 4: Menus, Forms, Dialog boxes

and commands

Task related organization, item presentation sequence

14 51

21 Response time and display rate, fast movement through menus

22 Menu layout, form filling, dialog boxes 23 functionality to support users tasks,

24 Command organization strategies, the benefit of structure.

25 naming and abbreviation , command menus,

26 Natural language in computing

27

Chapter 5: Interaction devices and

response time

Interaction devices, introduction, keyboard and function keys

12

63

28 Pointing devices, speech recognition, digitization and generation

29 Image and vide displays 30 Printers 31 Theoretical foundation 32 Expectation 33 Attitudes 34

Chapter 6: Presentation

styles, manuals, help and tutorials-1

Error messages

12 75

35 non-anthropomorphic design 36 Display design 37 Color 38 Reading from paper 39 Versus from displays

40 Chapter 7:

Presentation styles,

manuals, help and tutorials-2

Multiple-Windows strategies, hyper media and the world wide web-1

13 88

41 Preparation of printed manuals, preparation of on line facilities

42 Multiple-Windows strategies: introduction, individual-window design ,

43 Multiple window design coordination by tightly coupled window

44 Image browsing and tightly coupled windows

Page 51: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

51

45 Personal role management 46 Elastic windows 47 Chapter 8:

Multiple window

strategies, hyper media

and world wide web2

Genres

12

100

48 Goals and designers 49 Users and their tasks 50 Object action interface models 51 For web site design 52 Case study of Designs

Reference and Text Books Test 1: Chapter 1, 2 Test 2: Chapter 3, 4 & 5 Test 3: Chapter 6, 7 & 8

Book Type Book Code

Title & Author Publication Info Edition Publisher Year

Text Book T1 Designing the user interface- Ben Shneideraman

3rd Addison Wesley

1998

Reference Book

R1 Human computer interaction – Alan j dixet

2nd Prentice Hall

1998

Reference Book

R2 User interface design- Eberts - Prentice Hall

1994

Reference Book

R3 The essential guide to user interface design- Wilber O Galitz

- Wiley Dream tech India Pvt ltd

1998

Page 52: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

52

Question Bank

Chapter1: Human factors of interactive software Overview: To understand Human performance in the use of computer and information system. 1. What are the measurable human factors central to community evaluation? 2. What are the goals of system engineering in UI? 3. Explain clearly the goals of user interface design. Chapter 2: Management issue Overview: To introduce organization design to support usability, the three pillars of design, Development of methodology, ethnographic observation. 4. Explain clearly the terms standardization, integration, consistency and portability. 5. Explain briefly the techniques used for getting user attention, on the display. 6. Explain briefly the 5 primary interactions styles. 7. Explain the 5 measurable factors to evaluate user interface. 8. How human diversity affects the user interface design process? 9. List the different diversities that challenge the interactive-system designers. 10. Explain the Golden rules of interface design. 11. Describe the three pillars of design. Chapter3: Tools and Environment Overview: Introduces specification, methods interface building tools, Examples of direct manipulation systems, explanation of direct manipulation. Remote direct manipulation Virtual environment. 12. Explain the logical User-Centered Interface Design (LUCID) methodology. 13. What is lucid? Explain briefly the six stages of it. 14. What is the survey? What are its goals? Mention the commonly used scale for surveys. 15 draw and explain transition diagram for simple menu system. 16. Explain briefly the factors to be considered while designing remote direct manipulation environments. 17. What are the varieties of review methods? 18. Which are the various design specification method? Explain any one of them. Chapter4: Menus, Forms, Dialog boxes and commands Overview: Learn about Task related organization, item presentation sequence, Menu layout, form filling, dialog boxes, naming and abbreviation, command menus 19. Discuss the different types of single menus and their implementation. 20. Give the important guidelines for form-filling design. 21. Bring out the different methods of expert reviews. 22. Briefly explain the different specification systems. 23. Explain 3 examples of direct manipulation systems. 24. Explain the guidelines for menu selection.

Page 53: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

53

25. What guidelines for dialog box designing? 26. What strategy is to followed for naming and abbreviations? 27. What is a state chart? Explain state chart of a simplified bank transaction systems showing grouping of states. Chapter 5: Interaction devices and response time Overview: Learning about Interaction devices, keyboard and function keys, Pointing devices, speech recognition, digitization and generation 28 What task can be performed using pointing devices? When are they used? When is the speech generation preferable? 29. When can users achieve rapid task performance, low error rates and high satisfaction? 30. Explain the use of Fitts law. 31. For what kind of tasks pointing devices are applicable? Explain direct control pointing device. 32. What different aspects must be considered for designing generation of error massage? Explain. Chapter6: Presentation styles, manuals, help and tutorials-1 Overview: To Analyze the Error messages, Display design, Color, Reading from paper versus from displays. 33. Explain briefly: i) Limitations of short- term working memory. ii) Sources of errors. 34. Which display attributes have technology employed affects? What are the advantages and disadvantages with respect to these attributes? 35. What is the difference b/w direct control and indirect control pointing devices? 36. Describe the response time and display rate with examples. 37. What recommendations for constructing better messages? 38. Give the guidelines for using colors. What are the benefits and dangers of using color coding? 39. What guidelines we must follow while using colors? Give illustration. Chapter 7: Presentation styles, manuals, help and tutorials-2 Overview: Learning Techniques of Multiple-Windows strategies, hyper media and the world wide web-1, multiple window design coordination by tightly coupled window 40. How can co-ordination be affected using tight coupling of windows? 41. What different objects and actions windows contain? Explain. 42. What different features must be considered while designing web pages? Describe. 43. Explain briefly the searching of various types of multimedia documents. 44. Write notes on: i) Hyper text and hyper media. II) GUI for World Wide Web.

Page 54: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

54

Chapter 8: Multiple window strategies, hyper media and world wide web2 Overview: To know Goals and designers, Users and their tasks, Object action interface models 45. Explain briefly many solutions available for multiple windows. 46. Explain briefly testing and maintenance of websites. 47. Which are the different paper and online manuals that may be prepared? 48. What are the guidelines for developing online help? 49 how can co-ordination be affected using tight coupling of windows? 50. What different objects and actions windows contain? Explain.

Page 55: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

55

ADVANCED COMPUTER NETWORKS

Subject Code : 07MCA456 Hours / Week: 04 Faculty : Mrs. VEENA.S Total Hours: 52 Overview: Data Communication and Networking is one of the fastest growing Technology in today’s world. It changes the way we do business and the way we live. This course covers the left over topics in Computer Networks course which gives the complete knowledge about this ubiquitous technology. This course deals with the widely used technology SONET. Thorough understanding of Virtual Circuit Switching Networks like Frame Relays and ATM Networks will be given. Recent Concepts and protocols like Multicasting. SCTP, RTP, RTCP and VoIP will be discussed. It also covers Congestion Control and Quality of Service Issues. Finally a detailed survey on Mobile Ad-Hoc Networks and Wireless Sensor Networks will be there which is the current trend in Networking Research and Development.

Class No.

Chapter Title/Reference Literature

Topics to be covered

% of portion covered

Chapter wise Cumulative

1 Chapter 1: Review of Network Models T1: Page 27-50

Overview of the subject, Layered tasks

10 10 2 The OSI Model 3 Layers in the OSI Model 4 TCP / IP Protocol Suite 5 Addressing 6

Chapter 2: SONET / SDH T1: Page 491-513

Architecture

10 20 7 SONET Layers 8 SONET Frames 9 STS Multiplexing 10 SONET Networks, Virtual Tributaries 11 Chapter 3:

Frame Relay and ATM T1:Page 517-540

Frame Relay

8 28 12 ATM 13 ATM 14 ATM LANs

15 Chapter 4: IPv6, Address Mapping and Error Reporting T1:Page 596-605, 611-630

IPv6: Advantages, Packet Format

11

39

16 Extension Headers, Transition from IPv4 to IPv6

17 Dual Stack, Tunneing and Header Translation

18 Addsress Mapping: ARP

Page 56: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

56

19 RARP,BOOTP and DHCP

20 Error Reporting : ICMP

21 Chapter 5: Multicast Routing Protocols T1 Page 678 -693

Unicast Multicast and Broadcast

8

47

22 Applications 23 Multicast Routing 24 Routing Protocols

25 Chapter 6: SCTP T1 Page 736 - 753

SCTP Services, SCTP Features

8 55 26 Packet Format, An SCTP Association 27 Flow Control 28 Error Control, Congestion Control

29

Chapter 7: Congestion Control and Quality of Service T1 Page 761 – 790

Data Traffic: Congestion and Congestion Control

11 66

30 Congestion Control in TCP 31 Frame Relay 32 Quality of Service: Techniques to improve

QoS 33 Integrated Services 34 Differentiated Services

35

Chapter 8: Multimedia T1 Page 901 - 925

Digitising Audio and Video: Audio and Video Compression

11 77

36 Streaming stored audio / video

37 Streaming live audio / video, Real time interactive audio / video

38 RTP

39 RTCP 40 VoIP 41

Chapter 9: Mobile Ad-Hoc Networks, Wireless Sensor Networks T2: Page 511-531, 535- 557, 559-561

Overview of Wireless Ad-Hoc Networks

23 100

42 Routing in ad-hoc Networks 43 Routing Protocols for ad-hoc Networks 44 Routing protocols for ad-hoc Networks 45 Security of ad-hoc Networks

46 Sensor Networks and Protocol Structures 47 Sensor Networks and Protocol Structures

48 Communication Energy Model

Page 57: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

57

49 Clustering Protocols 50 Routing Protocols 51 Zigbee Technology

52 IEEE 802.15.4 LITERATURE:

Book Type Code Title and Author Publication Information Edition Publisher Year

Text Book T1 Data Communication and Networking - Behrouz A. Forouzan

IV Tata McGraw-Hill

2006

Text Book T2 Computer and Communication Networks – Nader F. Mir

-- Pearson education 2007

Reference Book R1

Data and Computer Communication – William Stallings

V Prentice Hall India --

Reference Book R2

Understanding Data Communications and Networks – William A.Shay.

II Thomson --

Test 1: Chapter 1, 2, 3 Test 2: Chapter 4, 5, 6, 7 Test 3: Chapter 8, 9

Page 58: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

58

QUESTION BANK

Chapter 1: Review of Network Models Overview: This chapter deals with the OSI reference model and the Internet protocol suite. It also deals with the general idea of the layers of the network and different functions of each of these layers.

1. How do the layers of the Internet Model correlate to the layer of the OSI Model? 2. What are the responsibilities of the Network layer in the internet model? 3. What are the responsibilities of the Transport layer in the internet model? 4. What is the difference between a port address, a logical address and a physical address? 5. What are headers and trailers and how do they get added and removed? 6. Explain the interaction between the layers n the internet model with a neat diagram? 7. Explain the importance of data link layer in the internet model? 8. What is a peer-to-peer process?

Chapter 2: SONET / SDH Overview: This chapter introduces a wide area network SONET which is used as a transport network to carry loads from other WANs.

9. Discuss the functions of each SONET layer? 10. What is a virtual tributary? 11. What are the four SONET layers? 12. What is the relationship between SONET and SDH ? 13. Why is SONET called a synchronous network? 14. Discuss STS-1 Frame Format?

Chapter 3: Frame Relay and ATM Overview: This chapter shows how virtual circuit approach can be used in wide area networks. Two common WAN technologies Frame relays and ATMs are discussed. Finally it gives an insight into ATM LANs.

15. Discuss the Frame relay physical layer? 16. Compare SVC with PVC? 17. Briefly discuss the issues involved in using ATM technology in LANs. 18. How does an NNI differ from UNI? 19. Name the ATM layers and their functions? 20. What are TPs and VPs? 21. Briefly discuss LANE?

Page 59: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

59

Chapter 4: IPv6, Address Mapping and Error Reporting Overview: This chapter deals with the next generation internet protocol IPv6. It also deals with the transition process from IPv4 to IPv6. It also deals with the companion protocols like ARP, RARP, BOOTP, DHCP and ICMP.

22. Discuss the different transition strategies from IPv4 to IPv6? 23. Compare IPv4 and IPv6 headers by considering the fields. 24. Explain why checksum is eliminated in IPv6? 25. Discuss the ARP packet format? 26. Briefly discuss the DHCP protocol. 27. Discuss the five different types of error messages that can be handled by ICMP?

Chapter 5: Multicast Routing Protocols Overview: This chapter deals with Multicast routing and different Multicast Routing Protocols in detail.

28. Relate Unicast, Multicast and Broadcast to the Internet. 29. Discuss some of the applications of Multicasting. 30. Explain MOSPF with a suitable example. 31. Briefly discuss Multicast Distance Vector Routing.

Chapter 6: SCTP Overview: This chapter deals with a new transport layer protocol that is designed for multi-homed, multi-stream applications such as multimedia. It combines the best features of UDP and TCP.

32. Discuss the services offered by SCTP? 33. Explain the usage of TSN, SI, SSN in SCTP? 34. Briefly discuss the packet format of SCTP. 35. Briefly discuss Four way hand shaking. 36. Discuss Flow control in SCTP. 37. Discuss error control and congestion control in SCTP.

Chapter 7: Congestion Control and Quality of Service Overview: This chapter deals with the two main issues of networking Congestion Control and Quality of Service which are closely bounded together. These issues are related to three layers of the network say data link layer, network layer and transport layer.

38. How are Congestion control and Quality of Service related? 39. What is the major difference between Integrated services and Differentiated services? 40. Discuss Briefly Open loop Congestion Control and Closed loop Congestion Control. 41. Discuss briefly congestion control in Frame relays. 42. What are the different techniques that can be used to improve QoS? 43. How is Resource Reservation Protocol related to integrated services?

Page 60: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

60

Chapter 8: Multimedia Overview: This chapter concentrate on applications that use the internet for audio and video services.

44. How does Jitter affect real-time audio / video? 45. What are the different approaches used for streaming stored audio / video? 46. Discuss briefly the RTP packet header. 47. Discuss the five message types in RTCP 48. discuss briefly about VoIP.

Chapter 9: Mobile Ad-Hoc Networks, Wireless Sensor Networks Overview: This chapter deals with the recent trend in networking i.e., Wireless Mobile Ad – hoc Networks which is designed for the establishment of a network anywhere and anytime. It also deals with self organizing Sensor Networks and protocols related to MANETs and Sensor Networks.

49. What are MANETs? Discuss with a neat diagram. 50. How does Routing Protocols can be classified? 51. Discuss briefly WRP(Wireless Routing Protocol)? 52. Write short notes on TORA? 53. Discuss the importance of Security in Ad – hoc networks? 54. What do you mean by a Cluster in Sensor Network? 55. Discuss the structure of a typical Wireless Sensor node? 56. Discuss in detail LEACH protocol? 57. Discuss in detail the DEEP clustering protocol? 58. Write a note on Zigbee Technology?

Page 61: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

61

JAVA AND J2EE LABORATORY

Subject code: 07MCA46 Hours/Week: 03 Faculty: Ms. Meera Rajan

1. a) Write a JAVA Program to demonstrate Constructor Overloading and Method overloading. b) Write a JAVA Program to implement Inner class and demonstrate its Access Protections.

2. a) Write a JAVA Program to implement Inheritance. b) Write a JAVA Program to implement Exception Handling (Using Nested try catch and finally).

3. a) Write a JAVA Program to create an Interface and implement it in a class. b) Write a JAVA Program to create a class (extending Thread) and use methods Thread class to change name, priority, ---- of the current Thread and display the same.

4. a) Write a JAVA Program to create a Scrolling Text using JAVA Applets b) Write a JAVA Program to pass parameters to Applets and display the same.

5. Write a JAVA Program to insert data into Student DATA BASE and retrieve info base on particular queries (Using JDBC Design Front end using Swings).

6. Write a JAVA Program to implement Client Server (Client requests a file, Server responds

to client with contents of that file which is then display on the screen by Client – Socket Programming).

7. Write a JAVA Program to implement a simple Client Server Application using RMI. 8. Write a JAVA Servlet Program to implement a dynamic HTML using Servlet (user name

and password should be accepted using HTML and displayed using a Servlet).

9. Write a JAVA Servlet Program to Download a file and display it on the screen (A link has to be provided in HTML, when the link is clicked corresponding file has to be displayed on Screen.

10. a) Write a JAVA Servlet Program to implement Request Dispatcher object (use include ()

and forward () methods. b) Write a JAVA Servlet Program to implement and demonstrate get () and Post methods (Using HTTP Servlet Class).

11. Write a JAVA Servlet Program to implement send Redirect() method(using HTTP Servlet Class

Page 62: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

62

12. Write a JAVA Servlet Program to implement sessions (Using HTTP Session

Interface).

13. a) Write a JAVA JSP Program to print 10 even and 10 odd numbers. b) Write a JAVA JSP Program to implement verification of a particular user login and display a welcome page

14. Write a JAVA JSP Program to get student information through a HTML and create a JAVA Bean Class, populate Bean and display the same information through another JSP.

Page 63: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

63

WEB PROGRAMMING LABORATORY

Subject code: 07MCA47 Hours/Week: 03 Faculty: Mr. Tamal Dey Note: One exercise must be asked in the examination. The assignment of the exercise must be based on lots. 1. Develop and demonstrate a XHTML document that illustrates the use external style sheet,

ordered list, table, borders, padding, color, and the <span> tag.

2. Develop and demonstrate a XHTML file that includes Javascript script for the following problems: a. Input: A number n obtained using prompt.

Output: The first n Fibonacci numbers.

b. Input: A number n obtained using prompt. Output: A table of numbers from 1 to n and their squares using Alert.

3. Develop and demonstrate a XHTML file that includes Javascript script that uses functions or the following problems: a. Parameter: A string.

Output: The position in the string of the left-most vowel.

b. Parameter: A number. Output: The number with its digits in the reverse order.

4. a. Develop and demonstrate, using Javascript script, a XHTML document that collects the USN ( the valid format is: A digit from 1 to 4 followed by two upper-case characters followed by two digits followed by two upper-case characters followed by three digits; no embedded spaces allowed) of the user. Event handler must be included for the form element that collects this information to validate the input. Messages in the alert windows must be produced when errors are detected.

b. Modify the above program to get the current semester also (restricted to be a number from 1 to 8).

5. a. Develop and demonstrate, using Javascript script, a XHTML document that contains three short paragraphs of text, stacked on top of each other, with only enough of each showing so that the mouse cursor can be placed over some part of them. When the cursor is placed over the exposed part of any paragraph, it should rise to the top to become completely visible.

b. Modify the above document so that when a paragraph is moved from the top stacking position, it returns to its original position rather than to the bottom.

Page 64: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

64

6. a. Design an XML document to store information about a student in an engineering

college affiliated to VTU. The information must include USN, Name, and Name of the College, Brach, Year of Joining, and e-mail id. Make up sample data for 3 students. Create a CSS style sheet and use it to display the document.

b. Create an XSLT style sheet for one student element of the above document and use it to create a display of that element.

7. a. Write a Perl program to display various Server Information like Server Name, Server Software, Server protocol, CGI Revision etc.

b. Write a Perl program to accept UNIX command from a HTML form and to display the output of the command executed.

8. a. Write a Perl program to accept the User Name and display a greeting message randomly chosen from a list of 4 greeting messages.

b. Write a Perl program to keep track of the number of visitors visiting the web page and to display this count of visitors, with proper headings.

9. Write a Perl program to display a digital clock which displays the current time of the server.

10. Write a Perl program to insert name and age information entered by the user into a table created using MySQL and to display the current contents of this table.

11. Write a PHP program to store current date-time in a COOKIE and display the ‘Last visited on’ date-time on the web page upon reopening of the same page.

12. Write a PHP program to store page views count in SESSION, to increment the count on each refresh, and to show the count on web page.

13. Create a XHTML form with Name, Address Line 1, Address Line 2, and E-mail text fields. On submitting, store the values in MySQL table. Retrieve and display the data based on Name.

14. Using PHP and MySQL, develop a program to accept book information viz. Accession number, title, authors, edition and publisher from a web page and store the information in a database and to search for a book with the title specified by the user and to display the search results with proper headings.

Page 65: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

65

ALGORITHMS LABORATORY

Subject code: 07MCA48 Hours/Week: 03 Faculty: Mrs. A. Lekha Implement the following using C/C++ Language. 1. Implement Recursive Binary search and Linear search and determine the time required to

search an element. Repeat the experiment for different values of n, the number of elements in the list to be searched and plot a graph of the time taken versus n.

2. Sort a given set of elements using the Heap sort method and determine the time required to sort the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.

3. Sort a given set of elements using Merge sort method and determine the time required to sort

the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.

4. Sort a given set of elements using Selection sort and determine the time required to sort elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.

5. Implement 0/1 Knapsack problem using dynamic programming.

6. From a given vertex in a weighted connected graph, find shortest paths to other vertices using

Dijkstra's algorithm. 7. Sort a given set elements using Quick sort method and determine the time required sort the

elements. Repeat the experiment for different values on n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.

8. Find Minimum Cost Spanning Tree of a given undirected graph using Kruskal's algorithm. 9. a. Print all the nodes reachable from a given starting node in a digraph using BFS method.

b. Check whether a given graph is connected or not using DFS method.

10. Find a subset of a given set S = {s1,s2,.....,sn} of n positive integers whose sum is equal to a given positive integer d. For example, if S= {1,2, 5, 6, 8} and d = 9 there are two solutions{1,2,6}and{1,8}.A suitable message is to be displayed if the given problem instance doesn't have a solution.

Page 66: IV Semester Course Information 2011

Course outline Semester: IV Session: Jan 2011 – May 2011

_____________________________________________________________________________________

Perseverance Excellence Service

66

11. a. Implement Horspool algorithm for String Matching.

b. Find the Binomial Co-efficient using Dynamic Programming. 12. Find Minimum Cost Spanning Tree of a given undirected graph using Prim’s algorithm.

13. a. Implement Floyd’s algorithm for the All-Pairs- Shortest-Paths problem.

b. Compute the transitive closure of a given directed graph using Warshall's algorithm. 14. Implement N Queen's problem using Back Tracking.