programme code : co entrepreneurship development optional6.0 managing people and organizing teams...

42
Entrepreneurship Development Rationale: Globalization, liberalization & privatization along with revolution in Information Technology, have thrown up new opportunities that are transforming lives of the masses. Talented and enterprising personalities are exploring such opportunities & translating opportunities into business ventures such as- BPO, Contract Manufacturing, Trading, Service sectors etc. The student community also needs to explore the emerging opportunities. It is therefore necessary to inculcate the entrepreneurial values during their educational tenure. This will help the younger generation in changing their attitude and take the challenging growth oriented tasks instead of waiting for white- collar jobs. The educational institutions should also demonstrate their uniqueness in the creation of enterprising personalities in their colleges. This subject will help in developing the awareness and interest in entrepreneurship and create employment for others. Objectives: The student will be able to: 1) Identify entrepreneurship opportunity. 2) Acquire entrepreneurial values and attitude. 3) Use the information to prepare project report for business venture. 4) Develop awareness about enterprise management. Programme Code : CO Course Code : MG11509 Course Title : Entrepreneurship Development Compulsory/Optional : Optional Credits Duration of Written Examination Examination Scheme TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL 4 - 4 4 3 hrs 2 Tests of 1 Hour each 80 20 - - - 100 ( * ) indicates assessment by Internal and External examiners

Upload: others

Post on 13-Feb-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Entrepreneurship Development

Rationale:

Globalization, liberalization & privatization along with revolution in Information

Technology, have thrown up new opportunities that are transforming lives of the masses. Talented

and enterprising personalities are exploring such opportunities & translating opportunities into

business ventures such as- BPO, Contract Manufacturing, Trading, Service sectors etc. The

student community also needs to explore the emerging opportunities. It is therefore necessary to

inculcate the entrepreneurial values during their educational tenure. This will help the younger

generation in changing their attitude and take the challenging growth oriented tasks instead of

waiting for white- collar jobs. The educational institutions should also demonstrate their

uniqueness in the creation of enterprising personalities in their colleges. This subject will help in

developing the awareness and interest in entrepreneurship and create employment for others.

Objectives: The student will be able to:

1) Identify entrepreneurship opportunity.

2) Acquire entrepreneurial values and attitude.

3) Use the information to prepare project report for business venture.

4) Develop awareness about enterprise management.

Programme Code : CO

Course Code : MG11509 Course Title : Entrepreneurship Development

Compulsory/Optional : Optional

Credits Duration of Written

Examination Examination Scheme

TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL

4 - 4 4 3 hrs 2 Tests of 1

Hour each 80 20 - - - 100

( * ) indicates assessment by Internal and External examiners

Page 2: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours Marks

SECTION-I 32 40

01 Entrepreneurship, Creativity & Opportunities

1.1) Concept, Classification & Characteristics of Entrepreneur

1.2) Creativity and Risk taking.

1.2.1) Concept of Creativity & Qualities of Creative person.

1.2.2) Risk Situation, Types of risk & risk takers.

1.3) Business Reforms.

1.3.1) Process of Liberalization.

1.3.2) Reform Policies.

1.3.3) Impact of Liberalization.

1.3.4) Emerging high growth areas.

1.4) Business Idea Methods and techniques to generate business

idea.

1.5) Transforming Ideas in to opportunities transformation

involves Assessment of idea &Feasibility of opportunity

SWOT Analysis

14 16

02 Information And Support Systems

2.1) Information Needed and Their Sources.

Information related to project, Information related to support

system,

Information related to procedures and formalities

2.2) SUPPORT SYSTEMS

1) Small Scale Business Planning, Requirements.

2) Govt. & Institutional Agencies, Formalities

3) Statutory Requirements and Agencies.

10 14

03 Market Assessment

3.1) Marketing -Concept and Importance

3.2) Market Identification, Survey Key components

3.3) Market Assessment

08 10

Page 3: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours Marks

SECTION-II 32 40

04

Business Finance & Accounts

Business Finance

4.1) Cost of Project

1) Sources of Finance

2) Assessment of working capital

3) Product costing

4) Profitability

5) Break Even Analysis

6) Financial Ratios and Significance

Business Account

4.2) Accounting Principles, Methodology

1) Book Keeping

2) Financial Statements

3) Concept of Audit

12 16

05 Business Plan & Project Report 5.1)Business plan steps involved from concept to

commissioning: Activity Recourses, Time, Cost

5.2) Project Report

1) Meaning and Importance

2) Components of project report/profile (Give list)

5.3) Project Appraisal

1) Meaning and definition

2) Technical, Economic feasibility

3) Cost benefit Analysis

10 12

06 Enterprise Management And Modern Trends

6.1 Enterprise Management:

a. Essential roles of Entrepreneur in managing enterprise

b. Product Cycle: Concept and importance

c. Probable Causes Of Sickness

d. Quality Assurance

Importance of Quality, Importance of testing

6.2) E-Commerce

Concept and process

6.3) Global Entrepreneur

10 12

Page 4: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Sr. No Assignments

1 Assess yourself-are you are entrepreneur?

2 Prepare project report and study its feasibility

Learning Resources:

1) Reference Books:

Sr. No. Title Author Publisher

01 Entrepreneurship

Theory and Practice

J.S. Saini

B.S.Rathore

Wheeler Publisher

New Delhi

03 Entrepreneurship

Development

E. Gorden

K.Natrajan

Himalaya Publishing.

Mumbai

04 Entrepreneurship

Development

Preferred by

Colombo plan staff

college for

Technical education.

Tata Mc Graw Hill Publishing

co. ltd. New Delhi.

05 A Manual on How to

Prepare a Project Report

J.B.Patel

D.G.Allampally EDI STUDY MATERIAL

Ahmadabad (Near Village Bhat ,

Via Ahmadabad Airport & Indira

Bridge), P.O. Bhat 382428 ,

Gujrat,India

P.H. (079) 3969163, 3969153

E-mail :

[email protected]/olpe@edi

india.org

Website :

http://www.ediindia.org

07

National Derectory of

Entrepreneur Motivator

& Resource Persons.

S.B.Sareen

H. Anil Kumar

08

New Initiatives in

Entrepreneurship

Education & Training

Gautam Jain

Debmuni Gupta

09 A Handbook of New

Enterpreneurs P.C.Jain

10

Evaluation of

Enterpreneurship

Development

Programmes

D.N.Awasthi , Jose

Sebeastian

Academic Coordinator Head of Department Principal

(Computer Engineering) Govt. polytechnic Mumbai

Page 5: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Software Project Management

Rationale:-

The At the end of the course, the student should get familiarize with the characteristics of a project,

project management principles, risk in environment and the management challenges for effective project

management. The student will be able to understand and use the project management principles across all

phases of a project. They will be able to demonstrate competency in the management of a project plan,

especially in monitor and controlling a project schedule and budget, tracking project progress. They will

understand how to work as team member and as individual

without affecting the quality of project. The student should be able to coordinate the close out of a project

contract. They will share best practices and tools related to project management

Objectives: - Students will be able to-

1. Define and highlight importance of software project management.

2. Describe the software project management activities

3. Write a Software Requirements Specification document (SRS)

3. To discuss project planning and the planning process

4.To show how graphical schedule representations are used by project management

5. To discuss the notion of risks and the risk management process

6. Become a member of a development of software project Management Group.

Programme Code : CO

Course Code : MG11509 Course Title : Software Project Management

Compulsory/Optional : Optional

Teaching Scheme and Credits Duration of Written

Examination Examination Scheme

TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL

4 - - 4 3 hrs 2 Tests of 1

Hour each 80 20 - - - 100

( * ) indicates assessment by Internal and External examiners

Page 6: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic No Contents Hours Marks

SECTION-I 32 40

1.0 Introduction

1. What is project?

2. What is project Management

3. The role of project Manager

4. The project Management Profession

5. Project life cycle

10 14

2.0

Software Project Management 1. A system view of project management

2. Understanding organizations

3. Stakeholder management

4. Project phases and the project life cycle

5. The context of software projects

10 14

3.0 Software Project Management Tools

1. project planning tools

2. General purpose project planning tools

3. Process modeling tools

4. Estimating Tools.

5. project risk analysis tools

6. project reporting tools

7. process support tools

12 12

4.0 Software Project Management Plan

1..Developing the project schedule- Sequencing and Scheduling

Activities

2. Network Planning Models – Forward Pass – Backward Pass –

Activity Float

3. Developing the project budget

4. Finalizing the project schedule and budget

5. Monitoring and controlling the project

6. The project communications plan

Topic No Contents Hours Marks

Page 7: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

SECTION-II 32 40

5.0 The importance of project risk management

1 Risk management planning

2. Common sources of risk on information technology projects

3. Risk identification

4. Qualitative risk analysis

5. Quantitative risk analysis

6. Risk response planning

7. Risk monitoring and control

8. Using software to assist in project risk management

6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A

Background –

2.Selecting The Right Person For The Job – Instruction In The Best

Methods – Motivation

3.The Oldman – Hackman Job Characteristics Model – Working In

Groups – Becoming

4.A Team –Decision Making – Leadership – Organizational 5.Structures

– Stress –Health And Safety – Case Studies.

7.0 Leadership & Ethics in Projects

1. Project leadership

2. Ethics in projects

3. Multicultural projects.

14 18

8.0 Project implementation & Closure

1. Project implementation

2. Administrative closure

3. Project evaluation

Page 8: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Reference Books:

Sr.

No.

Book Title Author Publication

1 Software Project Management Bob Hughes, Mikecotterell Tata McGraw Hill, 2004.

2

Information Technology Project

mgt providing measurable

organizational value

Jack Marchewka Wiley India.

3 Applied software project

management

Stellman & Greene SPD

4 Software Engineering Project

Management

Richard Thayer, Edward

Yourdon

WILEY INDIA

5 Software Project Management Jalote Pearson Education, 2002

Websites:

1. http://books.google.co.in/books/about/Information_technology_project_managemen.html

Academic Co-ordinator Head of Department Principal

(Computer Engineering) Government polytechnic Mumbai

Page 9: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Software Testing

Rationale:

This subject will introduce you to basics of software testing, teaching you not just the

fundamental technical skills but also the supporting skills necessary to become a successful

software tester. You will learn how to immediately find problems in any computer program, how

to plan an effective test approach, how to clearly report your finding and how to tell when your

software is ready for release.

Objectives: The student will be able to:

1. Understand the impact of software bugs and importance of software testing

2. Develop the skills necessary to find bugs in any types of software.

3. Learn how to effectively plan your tests, communicate the bugs you find, and measure your

success as a software tester.

4. Use your new testing skills to test not just the software, but also the product specification the

raw code, and even the user’s manual

5. Learn how to test software for compatibility, usability and cultural issues.

6. Discover how to improve your testing efficiency by automating your tests.

Programme Code : CO

Course Code : CO 11 312 Course Title : Software Testing

Compulsory/Optional : Compulsory

Credits Duration of Written

Examination Examination Scheme

TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL

3 - 2 5 3

hrs

2 Tests of 1

Hour each 80 20 - 50* - 150

( * ) indicates assessment by Internal and External examiners

Page 10: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours Marks

SECTION-I 24 40

01 Purpose of Testing

1.1 Software Testing concept

1.2 Software Bug

1.2,1 A Formal Definition

1.2.2 Why does Bug occur?

1.2.3 cost of bugs

1.3 software tester responsibilities

1.4 The Realities of Software Testing

1.5.1 Software Testing terms and definition

Precision and accuracy,

verification and validation

Quality Assurance and quality control

04 08

02 Testing Fundamentals

2.1 Black-Box and white-box Testing

2.2 Static and Dynamic Testing

2.3 Static Black Box Testing

2.3.1 Performing a Review of the Specification

Pretend to be a customer

Research Existing Standards and guidelines

Review and test similar software

2.4 Dynamic Black-Box Testing

2.4 1 Testing the software While Blindfolded

2.4.2 Test-to-pass and Test-to-fail

2.4.3 Equivalences Partitioning

2.5 Data Testing

2.5.1 Boundary Condition, Sub-Boundary Conditions, default,

empty, blank, Null, Zero and None, Invalid, Wrong,

Incorrect and garbage data.

2.6 State Testing

2.6.1 Testing Software ‘s Logic Flow

2.6.2 Testing States to Fail.

08 12

03 Examining the Code

3.1 Static White Box Testing

3.2 Examining the design and code

3.2.1 Formal Review

Peer Review, Walkthroughs, Inspections.

3.2.2 Generic Code Review Checklist

Data Reference Errors, Data Declaration Errors,

Computation Errors, Comparison Error, Control Flow

Errors, Subroutine Parameter Errors, Input/output Errors,

and Other checks.

3.3 Dynamic White Box Testing

3.4 Dynamic white box testing versus debugging,

3.5 Unit and Integration Testing

3.6 Data Coverage

3.6.1 Data Flow, Sub-Boundaries, Formula and Equations, Error

Forcing.

3.7 Code Coverage

3.7.1 Program Statements and Line Coverage, Branch Coverage,

08 12

Page 11: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Condition Coverage.

04 Applying Your Testing Skills

Configuration Testing

4.1 An Overview of Configuration Testing

4.1.1 Isolating Configuration Bugs, Sizing up the job.

Compatibility Testing

4.3 Compatibility Testing Overview

4.3.1 Platform and Application Versions

4.3.2 Backward and forward compatibility

4.3.3 Impact of testing multiple versions.

04 08

Topic

No

Contents Hours Marks

SECTION-II 24 40

05 Usability Testing

5.1 What makes a Good UI?

5.1.1 Follows standards or Guidelines, Intuitive, Consistent,

Flexible, Comfortable, Correct, Useful.

5.2Accessibility Testing

5.3 Web Page Fundamentals

5.4 Black-Box Testing

5.4.1 Text, Hyperlinks, graphics, forms, object

5.5 Gray Box Testing, White Box Testing, Configuration and

Compatibility testing, Usability Testing, Introducing Automation

06 10

06 Supplementing Your Testing

6.1 The benefits of automation and tools

6.2 Test tools

6.2.1 Viewers and Monitors, Drivers, Stubs, Stress and load tools,

Interference injectors and noise generators, analysis tools.

6.3 Software Test Automation

6.3.1 Macro Recording and playback, programmed macros, Fully

Programmable Automated Testing Tools

6.4 alpha and beta testing

08 14

07 Working With Test documentation

7.1 Goal of the test planning

7.2 Test planning topics

7.2.1 what will and won’t be tested , test phases , test strategy ,

resource requirements , tester assignments , test schedule , test

cases , bug reporting , Metrics and statistics , Risk and Issues.

7.3 The goal of test case Planning

7.3.1Test case planning overview

7.2 Test design, test cases, test procedures, test case organization &

tracking.

7.3 Getting bugs fixed, isolating & reproducing bugs

7.4 Bug’s life cycle

10 16

Page 12: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

List of Practical’s:-

Sr.No. Title of Practical

1 Introduction To Software Testing Concepts.

2 Case Study: - Study any system specification and report bugs.

3 Write Test Cases For any Application (e.g. Railway Reservation Form).

4 Display “Hello World” using AutoIT.

5 Create any GUI Application e.g. Calculator.

6 Automate Notepad Application using AutoIT.

7 Automate any installation procedure (e.g. WinZip).

8

Automate Microsoft Word Application.

1) Open Microsoft Word

2) Type text (automatically)

3) Generate random file name.

4) Save files and closes Microsoft Word.

9 Testing Web Site using QTP.

10 Software Testing overview

All above Practical may be performed on Windows or Linux Platform, using the tools

mention below:

Sr.No Testing Tools Type of Tool

1 AutoIT Free Ware

2 Ruby Free Ware

3 Water Free Ware

4 Sahi Free Ware

5 Bugzilla Licensed Software

6 Test Track Licensed Software

Reference Books:

Web Site References:

1. www.autoitv3.com

2. www.selenium.com

Academic Coordinator Head of Department Principal

(Computer Engineering) Govt. polytechnic Mumbai

Sr. No. Title Author Publication

1 Software Testing Ron Patton

SAMS Techmedia

2 Software Testing : Principals

and Practical Srinivasan Desikan

Gopalaswamy Ramesh

Pearson Education

Page 13: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

MySQL

Rationale:

A relational database management system (RDBMS) is an essential tool in many

environments, from traditional uses in business, research, and educational contexts, to

applications such as powering search engines on the Internet. MySQL is portable and runs on

commercial operating systems (such as Mac OS X, HP-UX, and Windows) and on hardware all

the way up to enterprise servers. Furthermore, its performance rivals any database system you

care to put up against it, and it can handle large databases with billions of rows. In the business

world, MySQL’s presence continues to increase as companies discover it to be capable of

handling their database needs at a fraction of what they are used to paying for commercial

licensing and support.

Objectives: The student will be able to:

1) Develop the skills to design database system.

2) Establish entity/relationship.

3) Understand the concept of Database system and Client Server Architecture

4) Understand and develop the concepts of Data Modeling, Security and Integrity.

5) Understand and execute different SQL queries using MySQL.

6) Understand the concept of query optimization in MySQL.

Programme Code : CO

Course Code : CO11416 Course Title : MySQL

Compulsory/Optional : Optional

Credits Duration of Written

Examination Examination Scheme

TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL

3 - 4 7 - - - - 50* - 50* 100

( * ) indicates assessment by Internal and External examiners

Page 14: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours Marks

SECTION-I 24 NA

01 Introduction to MySQL

1.1 Basic Database Terminology

1.1.1 Structural Terminology

1.1.2 Query Language Terminology

1.1.3 MySQL Architectural Terminology

1.2 Establishing and Terminating Connections to the MySQL

Server

1.3.MySQL Data Types

1.3 Working with MySQL database

1.3.1 Executing SQL Statements

1.3.2 Creating a Database

1.3.3 Creating Tables

1.3.4 Adding New Rows

1.3.5 Resetting the sampdb Database to a Known State.

1.3.6 Retrieving Information

1.3.7 Deleting or Updating Existing Rows

1.4 Tips for Interacting with mysql

1.4.1 Simplifying the Connection Process

1.4.2 Issuing Statements with Less Typing

06

02 Use of MySQL to manage data

2.1 The Server SQL Mode

2.2 MySQL Identifier Syntax and Naming Rules

2.3 Case Sensitivity in SQL Statements

2.4 Character Set Support

2.5 Selecting, Creating, Dropping, and Altering Databases

2.6 Creating, Dropping, Indexing, and Altering Tables

2.7 Obtaining Database Metadata

2.7.1 Obtaining Metadata with SHOW

2.7.2 Obtaining Metadata with INFORMATION_SCHEMA

2.7.3 Obtaining Metadata from the Command Line

2.8 Performing Multiple-Table Retrievals with Joins

2.8.1 The Inner Join

2.8.2 Qualifying References to Columns from Joined Tables

2.8.3 Left and Right (Outer) Joins

2.9 Performing Multiple-Table Retrievals with Subqueries

2.10 Performing Multiple-Table Retrievals with UNION

2.11 Using Views

2.12 Multiple-Table Deletes and Updates

2.13 Performing Transactions

2.13.1 Using Transactions to Ensure Safe Statement

Execution

2.13.2 Using Transaction Savepoints

2.13.3 Transaction Isolation

2.13.4 Non-Transactional Approaches to Transactional

Problems

2.14 Foreign Keys and Referential Integrity

2.14.1 Creating and Using Foreign Keys

2.14.2 Living Without Foreign Keys

10

Page 15: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

03 Stored Programs

3.1 Compound Statements and Statement Delimiters

3.2 Stored Functions and Procedures

3.2.1 Privileges for Stored Functions and Procedures

3.2.2 Stored Procedure Parameter Types

3.3 Triggers

3.4 Events

3.5 Security for Stored Programs and Views

06

04 Query Optimization

4.1 The MySQL Query Optimizer

4.2.1 How the Optimizer Works

4.2.2 Using EXPLAIN to Check Optimizer Operation

4.2 Choosing Data Types for Efficient Queries

4.3 Loading Data Efficiently

4.4 Scheduling and Locking Issues

4.4.1 Changing Statement Scheduling Priorities

4.4.2 Using Delayed Inserts

4.4.3 Using Concurrent Inserts

4.4.4 Locking Levels and Concurrency

04

Page 16: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours Marks

SECTION-II 24 NA

05 Introduction to MySQL Administration

5.1 MySQL Components

5.2 General MySQL Administration

5.3 Access Control and Security

5.4 Database Maintenance, Backups, and Replication

4

06 MySQL data directory

6.1 Location of the Data Directory

6.2 Structure of the Data Directory

6.2.1 How the MySQL Server Provides Access to Data

6.2.2 Representation of Databases in the Filesystem

6.2.3 Representation of Tables in the Filesystem

6.2.4 Representation of Views and Triggers in the Filesystem

6.2.5 How SQL Statements Map onto Table File Operations

6.2.6 Operating System Constraints on Database Object Names

6.2.7 Factors That Affect Maximum Table Size

6.2.8 Implications of Data Directory Structure for System

Performance

6.2.9 MySQL Status and Log Files

6.3 Relocating Data Directory Contents

6.3.1 Relocation Methods

6.3.2 Relocation Precautions

6.3.3 Assessing the Effect of Relocation

6.3.4 Relocating the Entire Data Directory

6.3.5 Relocating Individual Databases

6.3.6 Relocating Individual Tables

6.3.7 Relocating the InnoDB Shared Tablespace

6.3.8 Relocating Status and Log Files

8

07 Access control and Security

7.1 Internal Security: Preventing Unauthorized Filesystem Access

7.1.1 How to Steal Data

7.1.2 Securing Your MySQL Installation

7.2 External Security: Preventing Unauthorized Network Access

7.2.1 Structure and Contents of the MySQL Grant Tables

7.2.2 How the Server Controls Client Access

7.2.3 A Privilege Puzzle

7.2.4 Grant Table Risks to Avoid

7.3 Setting Up Secure Connections

4

08 Database Maintenance ,Backups

8.1 Principals of preventive maintenance

8.2 Performing Database Maintenance with the Server Running

8.2.1 Locking Individual Tables for Read-Only or Read/Write

Access

8.2.2 Locking All Databases for Read-Only Access

8.3 General Preventative Maintenance

8.3.1 Using the Server’s Auto-Recovery Capabilities

8.3.2 Scheduling Preventive Maintenance

8.4 Making Database Backups

8.4.1 Making Text Backups with mysqldump

8

Page 17: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

List of Practical’s:- Using MySQL:

Sr.No. Title of Experiment

1 Implementing all DDL statements

2 Implementing all DML statements.

3 Implementation of all string & Date related functions.

4 Implementation of aggregate functions such as sum, avg, min, max, count.

5 Applying constraints such as primary key, not null, foreign key, check, default.

6 Execute the queries containing Where, Group by & Having and Order by Clauses.

7 Selecting the records using set operators such as union, union all, Intersect, minus.

8 Selection records with nested query.

9 Implementation of All Types of Joins.

10 Creating views.

11 Implementation of commit, savepoint, rollback

12 Create Cursors.

13 Create, execute & modify stored procedure.

14 Create Triggers.

15 Implementation of All Indexes.

16 Implement the backup procedure for database.

8.4.2 Making Binary Database Backups

8.4.3 Backing Up InnoDB or Falcon Tables

8.6 Checking and Repairing Database Tables

8.6.1 Using the Server to Check and Repair Tables

8.6.2 Using mysqlcheck to Check and Repair Tables

8.6.3 Using myisamchk to Check and Repair Tables

8.7 Using Backups for Data Recovery

8.7.1 Recovering Entire Databases

8.7.2 Recovering Individual Tables

Page 18: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Reference Book:

Web Site Reference:

3. www.mysql.com

4. www.mysqltutorial.org

5. www.w3schools.com

Academic Coordinator Head of Department Principal

(Computer Engineering) Govt. polytechnic Mumbai

Sr.No. Title Author Publication

1 MySQL (4th Edition). Paul DuBois Developer’s Library

Page 19: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Management information system

Rationale:-

The modern business environment is characterized by intense competition, short product life

cycles and technological development. Hence representing the information in systematic manner

becomes an integral part of the business. The need for the systematic Management Information System is

essential for creating competition firms, managing the global scenario of cut throat competition and no

rover adding value.

Management Information System facilitates the decision makers to extend their planning horizons

and introduce even greater levels of uncertainty in business plans and budgeted allocations. Management

Information System facilities higher degree of accountability in business process.

Objectives: - Students will be able to-

1. Describe important role of Management Information System in modern organization.

2. Describe the function of Business Process Outsourcing, processes in Customer Relationship

Management and types of E-commerce.

3. Use data warehouse, data mining for decision support system.

Programme Code : CO

Course Code : MG11508 Course Title : Management Information System

Compulsory/Optional : Optional

Teaching Scheme and Credits Duration of Written

Examination Examination Scheme

TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL

4 - - 4 3 hrs 2 Tests of 1

Hour each 80 20 - - - 100

( * ) indicates assessment by Internal and External examiners

Page 20: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic No Contents Hours Marks

SECTION-I 32 40

1.0 Foundation of Information System in Business

1.1 Information System

What is an IS?

The roles of IS in Business

Trends in IS

The Role of E-business in Business

System

Feedback and Control

1.2 Types of IS

Operational Support System

Management Support System

Other classification of IS

1.3 Managerial Challenges of IS

Success and Failure with IT

Developing IS solution

Challenges and Ethics of IT

Challenges of IT Carriers

1.4 Components of IS

12 16

2.0

Management Information System

2.1 MIS Concept

2.2 MIS definition

2.3 Role of MIS

2.4 Impact of MIS

2.5 MIS and User

2.6 Management as a control system

2.7 Organization as System

2.8 MIS for Digital Firm

10 14

3.0 Software Assets Management

3.1 Application software: End user Application

Introduction and Definition of Software

Types of Software

Software suits and Integrated Packages

Web browsers and more

E-mails, Instant messaging and weblogs

Word Processing and Desktop publishing

Electronic spreadsheets , presentation graphics and Groupware

10 10

Page 21: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic No Contents Hours Marks

SECTION-II 32 40

4.0 Data Resource Management 4.1 Database Management

4.2 Fundamental Database Concept –Character,Field,Record,File

4.3 Database Development

4.4 Data Resource Management

4.5 Types of Database

Operational Database

Distributed Database

4.6 Data Warehouse and Data Mining

4.7 Database Management Approach

Database Management System

Database Interrogation

Database Maintenance

Application Developer

08 10

5.0 Electronic Commerce System 5.1 Introduction to E-com

5.2 The scope of E-com

5.3 E-com Technologies

5.4 Categories of E-com

Business to Consumer E-com

Consumer to Business E-com

Business to Business E-com

Consumer to Consumer E-com

5.5 Electronic Payment Processes

Web payment Processes

Electronic Funds Transfer

Secure Electronic Payments

5.6 E-com Trends

10 12

6.0 Enterprise Business System 6.1 Customer Relationship Management –The business focus

Introduction and Concept of CRM

The 3 phases of CRM

Benefits and Challenges of CRM

CRM Failure

Trend in CRM

6.2 Supply Chain Management-Business Network

Introduction and Concept of SCM

The role of SCM

Benefits and Challenges of SCM

Trend in SCM

6.3 Major Types of System

Transaction Processing System

Office System

KWs System

MIS

Decision Support System

14 18

Page 22: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Reference Books:

Sr.

No.

Book Title Author Publication

1 Management Information systems K.C. Laudon, J.P. Laudo Pearson edition

2 Management Information systems J.A. O’Brien Tata McGraw Hill

3 Management Information systems W S Jawadekar Tata McGraw Hill

Websites:

www.mu.ac.in/mis

www.csus.edu/indiv/e/eatonr/mis

Academic Co-ordinator Head of Department Principal

(Computer Engineering) Government polytechnic Mumbai

Page 23: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Rationale:-

The goal of Information Security is to familiarize students with the security issues and

technologies involved in modern information systems. Students will gain an understanding of the various

ways in which information systems can be attacked and tradeoffs in protecting networks. Students will

gain an appreciation of the need to develop an understanding of underlying system applications and

potential security issues early in the design process.

New communication systems and digital technology have made dramatic changes in the way we live and

the means to transact our daily business. Businessmen are increasingly using computers to create,

transmit and store information in electronic form instead of traditional paper documents. It is cheaper,

easier to store and retrieve and speedier to communicate.

This will enable them to develop a sound knowledge and analytical ability facilitating their intellectual

and professional development and future employment.

Objectives:-

Student will be able to-

Understand basics of information security

Know about legal, ethical, and professional issues in information security

Will gain knowledge about cyber crime and cyber security

Will know about data recovery and email recovery

Know about information quality and

Programme Code : CO

Course Code : CO 11 413 Course Title : Information Security

Compulsory/Optional : Optional

Credits Duration of Written

Examination Examination Scheme

TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL

4 - - 4 3 hrs 2 Tests of 1

Hour each 80 20 - - - 100

( * ) indicates assessment by Internal and External examiners

Page 24: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours Marks

SECTION-I 32 40

1 Introduction:

1.1 Information, Need and Importance of Information,

information classification, criteria for information

classification.

1.2 Security, need of security, Basics principles of

information security

1.3 Three pillars of information security, data obfuscation,

event classification

8 10

2 Information security architecture and model

2.1 Information security and Risk Management, Security

policies, guidelines, standards.

2.2 Trusted computing base, Rings of Trust, Protection

Mechanisms in a trusted Computing Base.

2.3 System security assurance concepts, Trusted computer

security Evaluation Criteria

2. 4 Information Technology security Evaluation Criteria,

Confidentiality and Integrity Models.

.

12 15

3 Cryptography

3.1 Introduction, Application of cryptography, Classical

encryption Techniques, Symmetric cipher.

3.2 Substitution cipher

Ceasor cipher

Playfair cipher

Hill cipher

3.3 Transposition cipher

Row transposition cipher

One Time Pad

3.4 Stenography, Digital Signatures, Authentication

Protocols, Digital Signature Standards

12 15

Page 25: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours Marks

SECTION-II 32 40

4 Data Recovery

4.1 Introduction to Deleted File Recovery Formatted Partition

Recovery, Data Recovery Tools, Data Recovery Procedures

and Ethics.

8 10

5 Cyber Crime & Security

5.1 Introduction to Cyber Crimes – Hacking, Cracking,

Viruses, Virus Attacks, Pornography, Software Piracy,

Intellectual property, Legal System of Information

Technology, Mail Bombs, Bug Exploits, Cyber Crime

Investigation

5.2 Introduction Cyber Laws- Introduction to IT act 2000 and

IT act 2008, Introduction to the cyber laws

12 15

6 Access, physical control and compliance standards

6.1 Identification, Authorization , Authentication, Biometrics,

Single Sign –on, Kerberos, Remote user access and

Authentication,

6.2 Physical access control, Physical access threats, providing

physical security

6.3 Compliance standards : Implementing and Information

Security Management System , ISO 27001, ISO 20000, BS

25999, PCI DSS, ITIL framework, COBIT framework

12 15

Page 26: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Reference Books:

Sr. No. Author Title Publisher

Sr. No. Author Title Publisher

1 Godbole Nina Information System Security John Wiley

2 Mark Merkov & Jim

Breithaupt

Information Security

Principles and Practices Pearson

3 V.K.Pachghare Cryptography and Information

Security Prentice Hall India

4 Saurabh Sharma Information Security and

Cyber laws

Vikas Publishing

House

Web Reference:

CrypTool 1.4.21 (www.cryptool.org)

http://www.emailtrackerpro.com

http://www.kmint21.com (Keylogger)

http://www.jjtc.com/Steganography/tools.html

http://steghide.sourceforge.net/ (stegnography)

http://www.powerdatarecovery.com/ (data recovery)

Academic Co-ordinator Head of Department Principal

(Computer Engineering) Govt. polytechnic Mumbai

Page 27: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Cyber Laws

Rationale:

There is a wave in the world to develop and enforce cyber crime laws and underdeveloped

countries are especially under pressure from IT enabled businesses from advanced societies for

enacting cyber crime laws. Analyzing this issue from the technical and policy perspective, one

feels quite apprehensive about cyber crime laws. It is not a simple issue of preventing the crime;

the major concern is the impact of cyber crime laws on the growth of information technology

usage and adoption in developing societies.

Objectives: The student will be able to:

1) To make students familiar with the fundamental concepts of computer ethics.

2) To know the linkage between computer, professional, philosophical ethics and decision

making.

3) To develop the concepts in computer forensics.

4) To give emphasis on how cyber security operations are carried out.

5) To introduce the linkage between technology, law and ethics.

Programme Code : CO

Course Code : CO 11 414 Course Title : Cyber Laws

Compulsory/Optional : Optional

Credits Duration of Written

Examination Examination Scheme

TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL

4 - - 4 3 hrs 2 Tests of 1

Hour each 80 20 - - - 100

( * ) indicates assessment by Internal and External examiners

Page 28: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours Marks

SECTION-I 32 40

01 Computer ethics and philosophical ethics

1.1 Vacuum of policies and conceptual muddles

1.2 social context, moral and legal issues

1.3 uniqueness of ethical issues,

1.4 role of analogy, descriptive and normative claims,

1.5 ethical relativism, utilitarianism, other theories

08 10

02 Professional Ethics And Privacy

2.1Characteristics, the system of professions,

2.2computing as a profession, professional

2.3relationships, responsibilities,

2.4code of ethics and professional conduct

Privacy:

2.5Computers and privacy issue,

2.6reframing this issue,

2.7 legislative background,

2.8 better privacy protection

10 14

03 Intellectual property issues in cyberspace

3.1Introduction to intellectual property Protections via Copyright,

3.2Trade Secrets, Trademarks,

3.3Patents, Contracting to protect intellectual property,

3.4Protection options – Encryption, copyright on web-content,

copyright on software

Ethical Decision Making

3.5Types of ethical choices, Making defensible decisions, Ethical

dilemmas, law and ethics,

3.6Guidelines for dilemma (Informal and Formal), Four-step

analysis process of solving dilemma

3.7Case studies: i) A stolen password ii) Recovery of data leads to

Discovery of confidential files iii)

Do copyright ethics change overseas?

14 16

Page 29: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours Marks

SECTION-II 32 40

04 Crime incident Handling Basics

4.1 Hacking, cyber activism,

4.2 Tracking hackers, clues to cyber crime,

4.3 Privacy act, search warrants,

common terms, organizational roles,

4.4 procedure for responding to incidents, reporting

procedures, legal considerations

Information Technology Act 2000

4.5 Scope, jurisdiction,

4.6 Offense and contraventions, powers of police, adjudication.

10 14

05 Cyber Forensics

5.1 Cyber forensics,

5.2 Cyber crime examples,

5.3 Forensics casework,

5.4 Investigative incident-response actions,

5.5 Computer forensics tools,

5.6 Threats in cyberspaces, Blended attacks

5.7 Sample Policy Documents: i) Antivirus Guidelines Policy ii)

Internal Lab Security Policy iii)Server Security Policy iv) Wireless

Communications Policy

12 10

06 Information Security Certifications,

6.1 CISSP and SSCP,

6.2 CISA and CISM, SCP,

6.3 GIAC, certification weaknesses,

6.4 Role of these certified professionals,

6.5 Windows Server 2003 Security Fundamentals

10 08

Page 30: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Reference Books:

Web References:

1. lawebooks.blogspot.com/.../download-indian-law-ebooks-law-

2. ebookbrowse.com/cyber-law-notes-pdf-d283956840

3. books.google.co.in/books/.../information_security_and_cyber...

Academic Coordinator Head of Department Principal

(Computer Engineering) Govt. polytechnic Mumbai

Sr.No. Title Author Publisher

1 Computer Ethics Deborah G Johnson Pearson Education

2 Ethical Decision making and IT: An

Introduction with Cases Earnest A. Kallman, J.P Grillo

McGraw Hill

3 Cyber security Operations Handbook Michael E. Whitman, Herbert J.

Mattord CengageLearning

Page 31: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Rationale

Computer security is one of the most important and relevant art of computing today. The

requirement to address security in computer system design is an important design consideration in

many of today’s systems. It is essential to understand various threats to secure computing and the

basic security design principles and techniques developed to address these threats.

This course will introduce basic cryptography, fundamentals of computer/network security,

risks faced by computers and networks, security mechanisms, operating system security, secure

systems design principles, and network security principles. It will develop knowledge for security of

information and information systems within organizations. It focuses on concepts and methods

associated with planning, managing, and auditing security at all levels including networks.

Objective

The student will be able to-

1. Understand the risks faced by computer systems and the nature of common Information

hazards.

2. Identify the potential threats to confidentiality, integrity and availability of Computer

Systems.

3. Understand the working of standing security mechanisms.

4. Use cryptography Algorithms and protocols to achieve computer Security.

5. Apply security principles to secure Operating Systems and applications.

Programme Code : CO

Course Code : CO11412 Course Title : Computer Security

C / O : Optional

Credits Duration of Written

Examination Examination Scheme

TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL

4 - - 4 3

hrs

2 Tests of 1

Hour each 80 20 - - - 100

( * ) indicates assessment by Internal and External examiners

Page 32: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours Marks

SECTION-I 32 40

01 Introduction to Security and its trends:

1.1 Threats to Security

Viruses and Worms

Intruders, Insiders

Criminal organizations, Terrorists & Information

warfare

1.2 Types of attack

Denial of service, backdoors

Trapdoors, Sniffing, Spoofing

Man in the middle, Replay

TCP/IP Hacking, Encryption attacks.

Malware: Viruses, Logic bombs

1.3 Security Basics

Confidentiality, Integrity, Availability

Operational model of Computer Security

Layers of security

1.4 Access control

Discretionary, Mandatory, Role based Authentication

10 14

02 Organizational/Operational Security

2.1 Role of people in security:

Password selection, Piggybacking

Shoulder surfing, Dumpster diving

Installing unauthorized software/hardware

Access by non employees

Security awareness

Individual user responsibilities

2.2 Physical security: Access controls

Biometrics

Finger prints, Hand prints, Retina

Voice patterns, Digital Signature

Keystrokes

10 12

03 5) Cryptography and Public Key Infrastructure

3.1 Encryption algorithm/Cipher

Substitution s techniques

Caesar Cipher

Mono-Alphabetic Cipher

3.2 Transposition techniques

Rail fence cipher

Columnar transposition-Simple, Double

3.3 Stegnography

3.4 Symmetric Cryptography,DES (Data encryption Standard),

Asymmetric Cryptography,

3.5 Public key infrastructures:

Basics of PKI, Digital certificates, Certificate

12 14

Page 33: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

authorities

Registration authorities

Steps for obtaining a digital certificate

Steps for verifying authenticity and integrity of

certificate

3.6Trust models

Hierarchical

peer to peer

hybrid

Topic

No

Contents Hours Marks

SECTION-II 32 40

04 Network security:

4.1 firewalls

working, design principles, trusted systems, Kerberos

4.2 Security topologies

security zones, DMZ, Internet, Intranet

VLAN, security implication, tunneling

4.3 IP Security

Overview, architecture, IPSec

IPSec configurations, IPSec Security

4.4 Email security

security of email transmission

malicious code, spam

Mail encryption.

12 14

05 System security

5.1 Intruders

Intrusion detection system (IDS)

Host Based IDS

Network Based IDS

5.2 Password Management

Vulnerability of password

Password selection strategies

Components of good password.

5.3 Operating system security

Operating system hardening,

General steps for securing windows operating

System

Hardening Unix/Linux based operating System

Updates

Hot fix

Patch

Service Pack

10 14

Page 34: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Reference Books:

Websites:

http://www.pgpi.org/doc/pgpintro/

Academic Co-ordinator Head of Department Principal

(Computer Engineering) Government polytechnic Mumbai

06 Application and web security

6.1 Application hardening

Application patches, Web servers, Active directory

6.2 Web security threats

Web traffic security approaches

Secure Socket Layer and Transport Layer Security

6.3 Introduction to cyber laws

Cyber Crimes and its Examples

Need of Cyber Laws

10 12

Sr.No. Author Title

Publication

01 Wm. Arthur Conkin

Dwayne Williams

Gregory B. White

Roger L. Davis Chuck

Cothren

Principles of computer

Security + and

Beyond

Mc GrawHill Technology

Education International

Edition 2005

02

Dieter Gollman Computer Security Wiley India Education,

Second Edition

03 William Stallings

Cryptography and Network

Security

Principles and Practices

Pearson Education, Third

Edition

04 Atul Kahate

Cryptography and Network

Security

Tata-McGraw-Hill

Sixth reprint 2006

Page 35: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Advance Web Technology CO11417

Programme Code : CO

Course Code : CO 11 417 Course Title : Advance Web Technology

Compulsory/Optional : Optional

Teaching Scheme and Credits Duration of Written

Examination Examination Scheme

TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL

3 - 4 7 - - - - 50* - 50 100

( * ) indicates assessment by Internal and External examiners

Rationale:

PHP is a powerful tool for making dynamic and interactive Web pages.

PHP is the widely-used, free, and efficient alternative to competitors such as

Microsoft's ASP.

"PHP is an HTML-embedded scripting language. Much of its syntax is borrowed

from C, Java and Perl with a couple of unique PHP-specific features thrown in. The

goal of the language is to allow web developers to write dynamically generated pages

quickly."

Objectives:

Students will be able to:

1. PHP scripts are execute on the server 2.HP files can contain text, HTML tags and scripts

3.PHP files are returned to the browser as plain HTML

4. PHP is an open source software

5. PHP is a server-side scripting language, like ASP

Page 36: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours

SECTION-I 24

01 Introduction to PHP

1.1The origin of PHP

PHP vs HTML

Work with Web Server

PHP Prons and Cons

Strength of PHP

06

02 Basic PHP Developments 2.1 Working PHP Scripts 2.2Basic PHP syntax

2.3 PHP variables

2.4 PHP data types

2.5Displaying type information

2.6Operators and Strings in PHP

08

03 Controls Structures

3.1 IF statements

3.2 Using Multiple statements

3.3Swich statements

3.4Using the ? operator 3.5 Looping

While

Do-while

For

10

Page 37: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

List of Practical’s:-

Sr.no Title of Experiment

1 Implement a code to make use of HTML.

2 Implement a code to for printing on screen in PHP.

3 Implement a code to make use of PHP variable e.g. Get and Post

4 Implement a code to make use of Strings in PHP.

5 Implement a code to make use of IF statement.

6 Implement a code to make use of Multiple IF Statements.

7 Implement a code to make use of FOR loop.

8 Implement a code to make use of Switch Case.

9 Implement a code to make use of Arrays.

10 Implement a code to make use of While Control structures.

11 Implement a code to make use of do-while Control structures.

Topic

No

Contents Hours

SECTION-II 24

04

Arrays and Functions

Arrays:- 1.2 Concept of Array

1.3 Types of Arrays

Functions

4.3 PHP Library Function

Arrays

String

Date and Time

4.4 User Defined Function

06

05 Forms 5.1 Introduction to Forms

5.2 Design Concept of Forms

5.3Super Global variable

5.4 Combine HTML and PHP code

08

06 Classes and Objects

5.2 OOP

5.3 Define Class

5.4 Object Properties

5.5 Object Methods

5.6 Object Constructor and Destructor

10

Page 38: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

12 Implement a code to make use of Date and Time.

13 Implement a code to make use of FORMS.

14 Implement a code to make use of combination of HTML and PHP code.

15 Implement a code to make use of Classes and Objects.

16 Implement a code to make use of Constructor and Destructor.

Reference Books:

Academic Coordinator Head of Department Principal

(Computer Engineering) Govt. polytechnic Mumbai

Sr.No. Title Author Publisher

1 Murach's PHP and MySQL Joel Murach and

Ray Harries Murach: Training &

Reference

2 Head First Labs O’Reilly O’Reilly Media

3 PHP/MySQL Programming for the Absolute

Beginner

Andy Harries Premier Press

Page 39: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Advance Database Management System

Rationale:

Oracle 10g or latest version has many enhancements to support the largest customers in

terms of database size limits and continues to remove complexity from the database to make it

easier to manage and reduce the total cost of ownership (TCO), The idea of Oracle 10g is that the

database will be able to dynamically requisite the resources from the grid to meet levels of peak

demand. Other enhancements for Oracle 10g or latest are aimed at reducing costs and improving

the quality of service by making the database easier to deploy and manage including enhancements

to backup and recovery and data warehousing

Objectives: The student will be able to:

1) To learn SQL, PL/SQL, and Oracle Database 10g or latest version available.

2) To learn how to create, retrieve, and manipulate objects in Oracle Database 10g Structured

Query Language (SQL).

3) Implement Oracle10g features and tools.

4) Learn the fundamentals of the PL/SQL

5) Write Stored Procedures, Functions, Packages, and Triggers.

6) Take Backup of data and able to provide recovery to the damaged or lost data.

7) Create and manage users and their privileges.

Programme Code : CO

Course Code : CO 11 415 Course Title : Advance Database Management System

Compulsory/Optional : Optional

Credits Duration of Written

Examination Examination Scheme

TH TU PR TOTAL TH TS TH TS PR OR TW TOTAL

3 - 4 7 - - - - 50* - 50 100

( * ) indicates assessment by Internal and External examiners

Page 40: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours Marks

SECTION-I 24 N.A

01 Database Fundamentals

1.1 Oracle database 10g or latest available Architecture

1.1.1 The Control Files, Online Redo 10g or latest available

1.1.2 System table space, SYSAUX Table space

1.1.3 Default temporary table space, Undo table space

1.1.4 The System parameter file, background process

1.2 Basic oracle 10g or latest available data type

1.3 Handling the stored objects

1.3.1 Views, triggers, Procedures, Functions, Packages

1.4 Important items in the oracle 10g or latest available

1.4.1 Indexes, Users, table space Quotas, synonyms, Roles

1.4.2 Default User Environment

1.5 Object & System Privileges

1.5.1 Select, Insert, Update, Delete

10

02 Overview of SQL through oracle 10g or latest available

Database

2.1 SQL statement Component

2.1.1 DDL, DML

2.2 Functions

2.2.1 String, Numeric, Aggregate, Date

2.3 Joins

2.3.1 Inner & Outer

2.4 Clauses

2.4.1 Where, GroupBy, Having, OrderBy

2.5 Sub queries

2.5.1 Simple, Correlated Sub queries With Join

2.6 Use of Set Operators

2.6.1 Union, Union all, Intersect, Minus

2.7 Creating Views & using Triggers & Cursors

2.8 Managing Tables

2.8.1 Guidelines

2.8.2 Creating, Altering, Loading, Dropping

2.8.3 Redefining table online

2.8.4 Managing External tables

06

03 PL/SQL

3.1 Introduction

3.2 Basic PL/SQL Program Structure

3.3 PL/SQL Data type & Character Set

3.4 Execution of PL/SQL Program in sql*Plus

3.5 Handling Error Conditions in PL/SQL

3.6 Using Conditions & loops in PL/SQL

3.7 Creating Stored Procedures & Functions

3.8 Calling Of PL/SQL program

08

Page 41: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

Topic

No

Contents Hours Marks

SECTION-II 24 N.A

04

Backup & Recovery

4.1 Oracle 10g or latest available Backup & Recovery

Fundamentals

4.1.1 Backup Architecture, Oracle Binaries

4.1.2 Parameter Files, Control Files, Redo 10g or latest

available

4.1.3 Undo Statement, Checkpoints, Archive 10g or latest

available

4.1.4 Data files, Table spaces, Segments, Extents & Blocks

4.2 Oracle User managed backup & Recovery

4.2.1 Types of User Managed Backup

4.2.2 Cold Backups, Hot Backups.

4.2.3 Seven Steps to Recovery

4.2.4 Recovery Using Backup Control Files

4.3 Write a Database Backup

4.4 Backup achieved redo 10g or latest available

4.5 Introduction to recovery manager & its key features

12

05 Starting Up & shutting down

5.1 Starting Up database

5.1.1 Options for starting up database

5.1.2 Understanding initialization Parameter Files

5.1.3 Preparing to Start up an instance

5.1.4 Starting up an instance

5.2 Altering Database Availability

5.2.1 Mounting a database to an instance

5.2.2 Opening a closed database

5.2.3 Opening a database in read only mode

5.2.4 Restricting access to an open database

5.3 Shutting down a Database

5.4 Introduction to Quiescing Statement of Database

5.5 Suspending & Resuming a database

07

06 Managing Users & Securing the database

6.1 Importance

6.2 Managing Users & Resources

6.3 Managing User Privileges & Roles

6.4 Auditing Database Use

05

Page 42: Programme Code : CO Entrepreneurship Development Optional6.0 Managing People and Organizing Teams 1.Introduction – Understanding Behavior – Organizational Behaviour: A Background

List of Practical’s:- Using Oracle 10g or latest available:

Sr.No. Title of Experiment

1 Implementing all DDL statements

2 Implementing all DML statements.

3 Implementation of all string & Date related functions.

4 Implementation of aggregate functions such as sum, avg, min, max, count.

5 Applying constraints such as primary key, not null, foreign key, check, default.

6 Execute the queries containing Where, Group by & Having and Order by Clauses.

7 Selecting the records using set operators such as union, union all, Intersect, minus.

8 Implementation of All Types of Joins.

9 Creating views.

10 Create Triggers.

11 Create Cursors.

12 Create, execute & modify stored procedure.

13 Creating PL/SQL Program Using condition statements.

14 Creating a PL/SQL Program using For loop.

15 Creating a PL/SQL Program using Do while loop

16 Creating Functions.

17 a) Creating Different Users.

b) Assigning & managing Users privileges & Roles.

18 Implement the backup procedure for database.

19 A case study: study the complete database design of project

Reference Books:

Web Site References:

6.www.oracle.com

7. www.w3schools.com

Academic Coordinator Head of Department Principal

(Computer Engineering) Govt. polytechnic Mumbai

Sr.No. Title Author Publication

1 Oracle Database 10g

A Beginners Guide

Ian Abramson,

Michael Abbey,

Michael Corey

Oracle Press

2 Oracle Database Administrators

Guide 10g, Release2(10.2)

Steve Fogel

Paul Lane Oracle