Basic Computer Engineering (BT-205) - B Tech RGPV AICTE Flexible Curricula Notes -->

Sunday, December 30, 2018

Basic Computer Engineering (BT-205)
 B.Tech RGPV notes AICTE flexible curricula Bachelor of technology

rgpv bhopal, diploma, rgpv syllabus, rgpv time table, how to get transcript from rgpv, rgpvonline,rgpv question paper, rgpv online question paper, rgpv admit card, rgpv papers, rgpv scheme

B.Tech RGPV notes AICTE flexible curricula Bachelor of technology

Syllabus

UNIT 1:
Computer: Definition, Classification, Organization i.e. CPU, register, Bus architecture, Instruction set, Memory & Storage Systems, I/O Devices, and System & Application Software. Computer Application in eBusiness, Bio-Informatics, health Care, Remote Sensing & GIS, Meteorology and Climatology, Computer Gaming, Multimedia and Animation etc.
Operating System: Definition, Function, Types, Management of File, Process & Memory. Introdcution to MS word, MS powerpoint, MS Excel

UNIT 2:
Introduction to Algorithms, Complexities and Flowchart, Introduction to Programming, Categories of Programming Languages, Program Design, Programming Paradigms, Characteristics or Concepts of OOP, Procedure Oriented Programming VS object oriented Programming. Introduction to C++: Character Set, Tokens, Precedence and Associativity, Program Structure, Data Types, Variables, Operators, Expressions, Statements and control structures, I/O operations, Array, Functions,

UNIT 3:
Object & Classes, Scope Resolution Operator, Constructors & Destructors, Friend Functions, Inheritance, Polymorphism, Overloading Functions & Operators, Types of Inheritance, Virtual functions. Introduction to Data Structures

UNIT 4:
Computer Networking: Introduction, Goals, ISO-OSI Model, Functions of Different Layers. Internetworking Concepts, Devices, TCP/IP Model. Introduction to Internet, World Wide Web, E-commerce Computer Security Basics: Introduction to viruses, worms, malware, Trojans, Spyware and Anti-Spyware Software, Different types of attacks like Money Laundering, Information Theft, Cyber Pornography, Email spoofing, Denial of Service (DoS), Cyber Stalking, ,Logic bombs, Hacking Spamming, Cyber Defamation , pharming Security measures Firewall, Computer Ethics & Good Practices, Introduction of Cyber Laws about Internet Fraud, Good Computer Security Habits,

UNIT 5:
Data base Management System: Introduction, File oriented approach and Database approach, Data Models, Architecture of Database System, Data independence, Data dictionary, DBA, Primary Key, Data definition language and Manipulation Languages.
Cloud computing: definition, cloud infrastructure, cloud segments or service delivery models (IaaS, PaaS and SaaS), cloud deployment models/ types of cloud (public, private, community and hybrid clouds), Pros and Cons of cloud computing


NOTES


List of Experiment

01. Study and practice of Internal & External DOS commands.
02. Study and practice of Basic linux Commands – ls, cp, mv, rm, chmod, kill, ps etc.
03. Study and Practice of MS windows – Folder related operations, My-Computer, window explorer, Control Panel,
04. Creation and editing of Text files using MS- word.
05. Creation and operating of spreadsheet using MS-Excel.
06. Creation and editing power-point slides using MS- power point
07. Creation and manipulation of database table using SQL in MS-Access.
08.WAP to illustrate Arithmetic expressions
09. WAP to illustrate Arrays.
10. WAP to illustrate functions.
11. WAP to illustrate constructor & Destructor
12. WAP to illustrate Object and classes.
13. WAP to illustrate Operator overloading
14. WAP to illustrate Function overloading
15. WAP to illustrate Derived classes & Inheritance
16. WAP to insert and delete and element from the Stack
17. WAP to insert and delete and element from the Queue
18. WAP to insert and delete and element from the Linked List


Recommended Text Books:

1. Fundamentals of Computers : E Balagurusamy, TMH
2. Basic Computer Engineering: Silakari and Shukla, Wiley India
3. Fundamentals of Computers : V Rajaraman, PHI
4. Information Technology Principles and Application: Ajoy Kumar Ray & Tinku Acharya PHI.


Recommended Reference Books:

1. Introduction of Computers : Peter Norton, TMH
2. Object Oriented Programming with C++ :E.Balagurusamy, TMH
3. Object Oriented Programming in C++: Rajesh K.Shukla, Wiley India
4. Concepts in Computing: Kenneth Hoganson, Jones & Bartlett.
5. Operating Systems – Silberschatz and Galvin - Wiley India
6. Computer Networks:Andrew Tananbaum, PHI
7. Data Base Management Systems, Korth, TMH
8. Cloud Computing, Kumar, Wiley India


You May Also Like

Follow Author Here:

Services

COMPLETELY FREE !!!

Yup, everything is free....

NO REGISTRATION REQUIRED

User doesn't have to register for accessing the files, all the files are free & universally accessible without any condition or restriction.

RESPONSIVE DESIGN & USER-FRIENDLY

Our webpages are responsive & user-friendly, which means it will automatically adjust according to your device screen size and you will find stuff without ant hustle.

DIRECT DOWNLOAD LINKS WITH HIGN SPEED

All the files are uploaded on our super-fast servers so that they can be easily downloaded with high speed.

NEW PROJECTS

For providing a better experience to our users we are developing our Android application, the application will have a lot of awesome features so stay tuned ;).

AWESOME SUPPORT TEAM

Our AI-powered Chatbots are always here to help you so, feel free to ask any question or report if you face any problem. Our team also monitors all chatbots traffic & they will contact you if chatbot fails to help.

Contact Us