You are on page 1of 6

Java Programming

UNIT I

C++ v/s Java, Java, Internet and www, Java Support System, Java Environment, Java Virtual Machine, Java
Program Structure, Tokens, Constant and Variables, Data Types, Scope of Variables, Type Casting, Operators
and Expression; Conditional Statements and Loop Statements.

UNIT II

Defining a Class, Adding Variables and Methods, Creating Objects, Accessing Class Members, Constructors,
Method Overloading, Static Member, Nesting of Methods, Inheritance: Extending a Class, Overriding
Methods, Final Variables and Methods, Abstract Methods and Classes, Visibility Control.

UNIT III

Arrays: One Dimensional and Two Dimensional, Strings, Vectors, Wrapper Classes, Defining Interface,
Extending Interface, Implementing Interface, Accessing Interface Variables, System Packages, Adding a
Class to a Package, Using System Package, Adding a Class Into Packages, Hiding Class.

UNIT IV

Creating Threads, Extending the Threads Class, Stopping and Blocking a Thread, Life Cycle of a Thread,
Using Thread Methods, Thread Exceptions, Thread Priority, Synchronization, Implementing the Runable
Interface; Local and Remote Applets V/s. Applications, Applet Life Cycle, Applet Tag, Adding Applet to
HTML File; Passing Parameters to Applets, Getting Input From User.

UNIT V

AWT: AWT Classes, Working With Frame Windows, Working With Graphics, Working With Color, Adding
and Removing Controls, Responding to Controls: Labels, Buttons, Checkbox, Checkbox Group, Choice
Control, Lists, Scroll Bars, Text Field, Text Area. Menus, Dialog Box Handling Events; Swings: Icons and
Labels, Text Field, Buttons, Combo box; JDBC: Class Methods, JDBC Components, Driver, Connectivity to
Database, Processing Result and Interfaces.
Network Security

UNIT I

Introduction to security attacks, need for security, security approaches, principals of security, types of attacks,
Introduction to cryptography, Plain text and Cipher text, Substitution techniques, Transportation techniques,
Encryption and decryption, Steganography, Key range and key size, possible type of attacks.

UNIT II

Symmetric Key: Introduction, Symmetric key cryptography and the problem of key distribution, Algorithm
types and modes, data encryption standards (DES), International data Encryption Algorithm (IDEA),
Advanced Encryption Standard (AES).

UNIT III

Asymmetric Key: Introduction, Asymmetric key operation, the RSA algorithm, Comparison between
Symmetric and Asymmetric key cryptography, Digital signatures: Introduction, Message digest: idea and
requirement, digital signature techniques.

UNIT IV

Digital certificates, private key management, the PKI model, public Key Cryptography Standards,(PKCS),
Internet Security protocols: Secure socket layer(SSL), Secure Hypertext Transfer protocol(SHTTP), Time
Stamping Protocol(TSP), Secure Electronic transaction(SET), SSl versus SET, 3-D Secure protocol,
Electronic money, Email Security.

UNIT V

User Authentication Mechanisms: Authentication basics, Passwords, Authentication Tokens, Certificate based
Authentication, Biometric Authentication, and Kerberos. Cryptographic solution using JAVA, Cryptographic
solution using Microsoft and .NET, Cryptographic Toolkits, Security and operating systems. Network
Security: Brief Introduction to TCP/IP, Firewalls, IP Security, Virtual Private Networks (VPN), Intrusion.
Computer Graphics

UNIT I

Introduction to Computer Graphics: Definition, Application Areas of Computer Graphics, Graphical User
Interface (GUI), Cathode Ray Tubes, Random Scan Displays, Raster Scan Displays (With Introduction to
Flickering, Interlacing. American Standard Video), Color CRT Monitors, Flat Panel Displays (Plasma Panels,
Liquid Crystal Displays, Electroluminescent Displays), Graphics Software (GKS, PHIGS), Color Models
(RGB, CMY, HSV, YIQ).

UNIT II

Raster Graphics Algorithms: Line Drawing Algorithms (DDA, Bresenham's algorithm), Circle and Ellipse
Drawing Algorithms, Filling (Scan-Line Polygon fill Algorithm, Inside Outside Tests, Boundary Fill and
Flood Fill Algorithm).

UNIT III

Transformations and Projections: 2-D transformations (Translation, Rotation, Scaling, Reflection, shearing),
Homogeneous Coordinate Representation.

UNIT IV

3-D transformations(Translation, Rotation, Scaling), Projections- Parallel Projections, Perspective


Projections, Bezier Curves, B-Spline Curves.

UNIT V

Two Dimensional Clipping and Visible Surface Detection Methods: Viewing Pipeline, WINDOW and
Viewport, Line Clipping (Cohen Sutherland), Polygon Clipping(Sutherland Hodgement) Sutherland Cohen
Sub Division Algorithm, Cyrus-Beck Algorithm, Classification of Visible Surface Detection Algorithm,
Backface Algorithm, Depth Sorting Method, Depth Buffer Method, Area Subdivision Method.
E-Commerce, E- Banking and Cyber Security

UNIT I

E-Commerce: Benefits of E-Commerce, Impact of E-Commerce, E-Commerce v/s Traditional Commerce,


Classification of E- Commerce: B2B, B2C, C2B, C2C; Applications of E-Commerce Technologies,
Framework of E-Commerce, E-Commerce: Securing Network Transaction: Transaction Security, Cryptology,
Cryptographic Algorithms, Authentication Protocols, Security Protocols of Web Commerce.

UNIT II

Electronic Payment System: Introduction to Payment Systems, Online Payment Systems, Pre-Paid Electronic
Payment Systems, Post-Paid Electronic Payment Systems; Digital Token, Smart Cards, Credit cards,
Electronic funds transfer, Risks in Electronic Payment System, Security issues on electronic payment system,
Solutions to security issues.

UNIT III

Electronic data interchange (EDI), EDI: the nuts and bolts, EDI and Business Interorganisational; Mobile
Commerce: Introduction, Benefits of mobile commerce. E-banking: Definition, Transaction websites
components, E-Banking support services, Wireless Banking. E-Banking Risk: Transaction/Operation Risk,
Credit Risk, Liquidity/Internet Risk, Price Risk, Strategic Risk, Reputation Risk;

UNIT IV

Cyber Crime: Definition, Cybercrime and Information security; Classification of cybercrime: E-Mail
Spoofing, Spamming, Cyber defamation, Forgery, Hacking, Online Frauds, Pornographic Offenses, Software
Piracy, E-Mail Bombing/Mail Bombs, Computer Network Intrusions, Password Sniffing, Identity Theft,
Frauds in Mobile; Password Cracking, Key loggers, DoS and DDoS Attacks.

UNIT V

Cyber law: The Indian Context, The Indian IT Act, Amendments to the Indian IT Act, Cybercrime and
Punishment, Cyber law, Technology and Students: Indian Scenario. Background of Cyber forensics, Digital
Forensics Science. The Need for Computer Forensics, Cyber forensics and Digital Evidence, Forensics
Analysis of Email, Security/Privacy Threats.
Object Oriented Software Engineering

UNIT I

Software Engineering: Software Engineering Problem and approach. Software Process: Process
Characteristic, Software Process Model- Linear Sequential Model, Prototyping Model, Spiral Model.
Software Quality: McCall’s Quality Factors. Software Requirement Analysis and Specification (SRS): Need,
Characteristics and Components.

UNIT II

Planning a Software Project: Cost estimation, COCOMO Model, Project Monitoring Plan, and Risk
Management Plan, Function-Oriented Design: Design Principles, Module level concepts- Cohesion and
Coupling, Design notations and specifications, Verification, Metrics.

UNIT III

Object Oriented Design: Concepts, Design Notation and Specification, Design methodology, metrics.

UNIT IV

UML: An overview of UML- UML notations, UML Class diagrams-association, multiplicity, generalization,
aggregation, interfaces.

UNIT V

Debugging Process : Information Gathering, Fault Isolation, Fault Confirmation, Documentation, Fixing fault
isolation. Testing: Testing Fundamental, Function Testing (Black Box), Structural Testing (White Box),j
Alpha and Beta Testing, Testing Object Oriented Programs, Testing Process: Comparison of Different
Testing, Level of Testing. Project management for special classes of software projects: Using CASE tools,
CBSE.
Advanced Web Programming

UNIT I

Basic of the .net framework: .net Architecture, managed code, assemblies, clr, execution of assemblies code,
il, jit, net framework class library, common type system, common language specification, interoperability
with unmanaged code. Overview C#, similarities and differences from JAVA, Structure of C# program.
Language features Type system, boxing and Unboxing, flow controls.

UNIT II

C#: Classes, Properties, Indexers, Constructors, Inheritance, Interfaces, Serialization, Delegates, Reflection. .

UNIT III

Overview of ASP. NET framework; Understanding ASP. NET Controls, Applications Web servers,
Installation of IIS Web forms, web form controls -server controls, client controls, web forms and HTML,
Adding controls to a web form, Buttons, Text Box, Labels, Checkbox, Radio Buttons, List Box etc. Running a
web Application, creating a multiform web project.

UNIT IV

Form Validation: CIient Side Validation, Server Side Validation, Validation ControlsRequired Field,
Compare, Range. Calendar Control, Ad RotatorControl, State Management-View State, Session State,
Application State.

UNIT V

Architecture Of ADO. NET, Connected and Disconnected Database, Create Connection Using ADO. NET
Object Model Connection Class. Command Class, Data Reader Class, Data adapter Class, Dataset Class.
Display Data on Bound Controls and Grid view. Database . Accessing on Web Applications : Insert records
in database, delete and update records from database, Display a particular record and all records on web form.

You might also like