Search results: 481
- Teacher: DR ANURAG GUPTA [ME]
- Teacher: Dr. Gaurav Srivastav [CSE(AI)]
Cyber security focuses on protecting computer systems from unauthorized access or being otherwise damaged or made inaccessible. Information security is a broader category that protects all information assets, whether in hard copy or digital form.
In this course you'll study network security and vulnerability assessment, information security policy and governance, digital forensics, and ethical hacking.
Also, you will learn how to administer networks, troubleshoot hardware/software problems, and determine the best ways to protect customers and clients from vulnerabilities within the network.
Taught till CT1 only
CO1 | Acquire knowledge of the operating system and its functionalities, components, and terminologies used in the subject. |
CO2 | Analyze the role of process synchronization and the concept of concurrent processes in the operating system |
CO3 | Evaluate the process scheduling scenarios based on the existing methods and techniques used in the operating system. |
CO4 | Analyze the memory management mechanism used in the operating system and how the operating system optimizes memory usage. |
CO5 | Analyze the working of input and output management; and how the operating system performs the disk management. |
- Teacher: Dr. Shelly Gupta Gupta
An operating system is software that manages the computer hardware, as well
as providing an environment for application programs to run. Perhaps the most visible aspect of an operating system is the interface to the computer
system it provides to the human user.
To best utilize the CPU, modern operating systems employ multiprogramming, which allows several jobs to be in memory at the same time, thus ensuring
that the CPU always has a job to execute. Time-sharing systems are an extension of multiprogramming wherein CPU scheduling algorithms rapidly switch
between jobs, thus providing the illusion that each job is running concurrently.
The operating system must ensure correct operation of the computer
system. To prevent user programs from interfering with the proper operation of
the system, the hardware has two modes: user mode and kernel mode.
Operating systems must also be concerned with protecting and securing
the operating system and users.
This course includes an overview of the various tools available for writing and running Python and gets students coding quickly. After completing this course what you will learn: -
Identify core aspects of programming and features of the Python language.
Use different tools for writing and running Python code.
Understand and apply core programming concepts like data structures, conditionals, loops, variables, and functions.
Design and write fully-functional Python programs using commonly used data structures, custom functions, and reading and writing to files.
- Teacher: MS. SHIVANI [CO]
- Teacher: Akansha Moral [CS]
- Teacher: Bhagvan Gupta [CS]
- Teacher: MS. ARUSHI GUPTA [CS]
- Teacher: Umnah [CS]
- Teacher: Vishakha Chauhan [CS]
- Teacher: MS KALPANA SAGAR [CO]
- Teacher: Ms. Akanksha [CO]
- Teacher: Mr. UMANG RASTOGI [CSE]
In this course, students will learn to develop the ability to design and build
interactive, responsive web applications using HTML, CSS, JavaScript,
and React, meeting industry standards for modern web development.
- Teacher: Chanchal Maurya _
- Teacher: MS. Veena Parihar (CSAI)
In this course, students will learn to develop the ability to design and build
interactive, responsive web applications using HTML, CSS, JavaScript,
and React, meeting industry standards for modern web development.
- Teacher: Chanchal Maurya _
- Teacher: Gagan Kumar Singh CSE(AI)
Artificial intelligence (AI) courses cover a range of topics, including the definition of AI, its practical applications, and its ethical implications:
Definition
AI is a broad term that encompasses technologies that enable machines to perform tasks that typically require human intelligence, such as speech recognition, decision making, and pattern identification.
Practical applications
AI can be used to solve problems in industry and business, and to improve enterprise computing. Some examples of AI applications include computer vision, natural language processing (NLP), and robotics.

- Teacher: Shish Pal Jatav [MCA]
UNIT-I: (8) Introduction: Introduction to Software Engineering, Software Components, Software Characteristics, Software Crisis, Software Engineering Processes, Similarity and Differences from Conventional Engineering Processes, Software Quality Attributes. Software Development Life Cycle (SDLC) Models: Water Fall Model, Prototype Model, Spiral Model, Evolutionary Development Models, Iterative Enhancement Models.
UNIT-II: (8) Software Requirement Specifications (SRS): Requirement Engineering Process: Elicitation, Analysis, Documentation, Review and Management of User Needs, Feasibility Study, Information Modeling, Data Flow Diagrams, Entity Relationship Diagrams, Decision Tables, SRS Document, IEEE Standards for SRS. Software Quality Assurance :(SQA): Verification and Validation, SQA Plans, Software Quality Frameworks, ISO 9000 Models, SEI-CMM Model.
UNIT-III: (8) Software Design: Basic Concept of Software Design, Architectural Design, Low Level Design: Modularization, Design Structure Charts, Pseudo Codes, Flow Charts, Coupling and Cohesion Measures, Design Strategies: Function Oriented Design, Object Oriented Design, Top-Down and Bottom-Up Design. Software Measurement and Metrics: Various Size Oriented Measures: HalesteSoftware Science, Function Point (FP) Based Measures, Cyclomatic Complexity Measures: Control Flow Graphs
UNIT-IV: (8) Software Testing: Testing Objectives, UNIT Testing, Integration Testing, 8 Acceptance Testing, Regression Testing,Testing for functionality and Testing for Performance, Top-Down and Bottom-Up Testing Strategies: Test Drivers and Test Stubs, Structural Testing (White Box Testing), Functional Testing (Black Box Testing), Test Data Suit Preparation, Alpha and Beta Testing of Products. Static Testing Strategies: Formal Technical Reviews (Peer Reviews), Walk Through, Code Inspection, Compliance with Design and Coding Standards.
UNIT-V: (8)
Software Maintenance and Software Project Management: Software as an Evolutionary Entity, Need for maintenance, Categories of Maintenance: Preventive, Corrective and Perfective Maintenance, Cost of Maintenance, Software Re-Engineering, Reverse Engineering. Software Configuration Management Activities, Change Control Process, Software Version Control, An Overview of CASE Tools. Estimation of Various Parameters such as Cost, Efforts, Schedule/Duration, Constructive Cost Models (COCOMO), Resource allocation Models, Software Risk Analysis and Management.
- Teacher: DR AMIT KUMAR GUPTA [MCA]