k|fljlws clws[t-sDKo'6/_ kbsf] v'Nnf
k|ltof]lutfsf] lnlvt k/LIffsf] kf7\of+z
k|fljlws
clws[t-sDKo'6/_ kbsf] v'Nnf k|ltof]lutfsf] lnlvt k/LIff lngsf
lgldQ !)) ÷ !)) k"0ff{Ísf tLg kqx¿ /xg] 5g\ . tLg} kqsf] s"n cÍ
hf]8\bf s"n k"0ff{Í #)) df Go"gtd\ %)Ü cÍ -cyf{t !%) cÍ_ k|fKt
u/]sf pDd]bjf/x¿sf] of]Uotf;"rL tof/ kfl/g] 5 .
k|yd kq M– ljifout / ;}4flGts
k"0ff{Í !))
;do # 306f
1. Computer Fundamentals
1.1.Introduction to computer systems:
1.2.Hardware:
Definition of Hardware
1.2.1.Input devices: keyboard, mouse, Scanner, etc.
1.2.2.CPU: Arithmetic logical unit (ALU), Control Unit
(CU), Memory unit (MU)
1.2.3.Output devices: Monitor, Printer etc.
1.2.4.Storage devices: Primary and Auxiliary Memory
1.2.5.Others: Network card, Modem, Sound card etc.
1.3.Software: Introduction to
computer software, Operating system, Programming Languages and Application
software.
1.4.BIOS, Firmware and cache memory concept
1.5.Concept of computer viruses and remedies
1.6.Concept
of Multimedia, Hypermedia
1.6.1.Troubleshooting methods
2. Procedural and Object Oriented Programming
Languages
2.1.Procedural
Programming Language
2.1.1.Types of data
2.1.2.Data representation
2.1.3.Data structure
2.1.4.Arrays
2.1.5.Operators
2.1.6.Variables and assignments
2.1.7.Control structures
2.1.8.Procedure/Function
2.2.Object
Oriented Programming Language
2.2.1.Object and Classes
2.2.2.Method
2.2.3.Inheritance
2.2.4.Polymorphism
2.2.5.Modularity
2.2.6.Encapsulation
2.2.7.Abstraction
2.2.8.Operator Overloading
3. Digital Logic and Microprocessors
3.1.Digital
Logic
3.1.1.Digital and Analog Systems
3.1.2.Number Systems
3.1.3.Boolean Algebra
3.1.4.Combinational Logic Circuits
3.1.5.Sequential Logic Circuits
3.1.6.MSI Logic circuits
3.1.7.Counters and Registers
3.1.8.IC logic families
3.1.9.Memory Devices
3.2.Microprocessors
3.3.Machine languages, Interpreters and Compilers
3.4.808X and Intel microprocessors: programming and
interfacing
3.5.Instruction sets and addressing modes;
assembly language programming, I/O and interrupt servicing
4. Data Structure and Algorithms
4.1.Abstract
Data Types
4.1.1.Arrays
4.1.2.Stacks
4.1.3.Queues
4.1.4.Linked Lists
4.2.Trees
4.2.1.General and binary trees
4.2.2.Representations and traversals
4.2.3.Binary search trees
4.2.4.Balancing trees
4.2.5.AVL trees
4.3.Indexing
Methods
4.3.1.Hashing Trees
4.3.2.Suffix Trees
4.4.Analysis
of Algorithms
4.4.1.Asymptotic Notation
4.4.2.Notions of Space and Time Complexity
4.4.3.Worst and Average Case Analysis
4.5.Algorithm
Design
4.5.1.Greedy Approach
4.5.2.Dynamic Programming
4.5.3.Divide-and-Conquer
4.5.4.Backtracking
4.6.Graph
Traversals
4.6.1.Connected Components
4.6.2.Spanning Trees
4.6.3.Shortest Paths
4.6.4.Hashing
4.6.5.Sorting
4.6.6.Searching
4.6.7.Merging
4.6.8.Depth-first Search and Breadth-first Search
5. Operating Systems
5.1.History & concepts of operating system
5.2.Processing
and Threads:
5.2.1.Symmetric Multiprocessing
5.2.2.Micro-kernels
5.2.3.Concurrency
5.2.4.Mutual Exclusion and Synchronization
5.2.5.Deadlock
5.3.Scheduling
5.4.Memory Management
5.5.Input
Output and Files
5.5.1.I/O devices and its organization,
5.5.2.Principles of I/O software and hardware,
5.5.3.Disks, Files and directories organization,
5.5.4.File System Implementation
5.6.Distributed
Systems:
5.6.1.Distributed Message passing
5.6.2.RPC
5.6.3.Client/Server Computing
5.6.4.Clusters
5.7.Basic characteristics of modern operating
systems: Linux, Windows
6. Database Management System
6.1.Introduction
6.1.1.The relational model
6.1.2.ER model
6.1.3.SQL
6.1.4.Functional dependency and relational database
design
6.1.5.File structure
6.2.Transaction
Management and Concurrency Control
6.2.1.Concurrent execution of the user programs
6.2.2.Transactions
6.2.3.Concurrency control techniques
6.3.Crash
Recovery
6.3.1.Types of failure
6.3.2.Recovery techniques
6.4.Query Processing and Optimization
6.5.Distributed Database Systems and Object
oriented database system
7. Computer Organization and Architecture
7.1.Basic computer organization and design
7.2.Computer Instruction
7.3.Timing and control
7.4.Execution of instruction
7.5.Input-output and Interrupt
7.6.Addressing modes
7.7.Processor bus organization
7.8.Stack organization
7.9.Microprocessor
organization
7.10.
RISC / CISC architecture
7.11.
I/O devices
7.12.
Asynchronous data transfer
7.13.
DMA
7.14.
I/O organization 7.15. Memory system
k|Zg of]hgf
!) k|Zg x !) º !))
;a} k|Zgx¿
clgjfo{ x'g]5g\ .
-dfly pNn]lvt
k|To]s PsfO{ jf6 kg]{ u/L ljifout k|Zgsf nflu tf]lsPsf] cÍsf k|Zgx¿sf] Pp6f
nfdf] k|Zg jf Pp6} k|Zgsf b'O{ jf b'O{ eGbf a9L efu - two or more
parts of a single question _ jf Pp6f k|Zg cGtu{t b'O{ jf a9L l6Kk0fLx¿ -Short notes
_ ;f]Wg ;lsg] 5 . _
k|fljlws
clws[t -sDKo'6/_ kbsf] v'Nnf k|ltof]lutfsf] lnlvt k/LIffsf] kf7\of+z
bf];|f] kqM– ljifout k"0f{fÍ M– !))
;do # 306f
1 Theory of Computation
7.16. Regular Languages and Finite Automata
7.17. Context Free Languages and Push-down Automata
7.18. Recursively Enumerable Sets and Turing Machines
7.19. Undecidability
7.20. Completeness
2 Computer Networks and Network Security
7.21. Network Definition, Network Models, Connectivity, Network
Addressing
7.22. The Data Package, Establishing a Connection, Reliable
Delivery, Network Connectivity, Noise Control, Building Codes, Connection
Devices
7.23. ISO/OSI Model
7.24. LAN technologies (Ethernet, Token Ring)
7.25. Flow and Error Control Techniques
7.26. Routing Algorithms, Congestion Control
7.27. TCP/IP, UDP, Sockets
7.28. IP (v4), IP (v6),
7.29. Dynamic Host Configuration Protocol
7.30. Application Layer Protocols (ICMP, DNS, SMTP, POP, FTP,
http)
7.31. Basic concepts of Hubs, Switches, Gateways, and Routers
LAN
7.32. Protocols on a Network, IP Routing, IP Routing Tables,
Router Discovery Protocols, Data Movement in a Routed Network, Virtual LANs
(VLANS)
7.33. The WAN Environment, Wan
Transmission Technologies, Wan Connectivity Devices, Voice Over Data Services
7.34. Internetworking, E-mail, Internet and Intranet, Extranet
7.35. Remote Networking: Remote Networking, Remote Access
protocols, VPN Technologies.
7.36. Computer Security: Computer Virus, Worm, Trojan Horse.
7.37. Network Security:
Introduction, Virus Protection, Local Security, Network Access, Internet
Security.
7.37.1. Encryption, Decryption, Asymmetric / Symmetric
Algorithms
7.37.2. RSA Algorithm,
7.37.3. Firewalls, Proxies, Intrusion Detection and
Protection System
7.37.4. Security- Confidentiality, Integrity and
Authentication
7.38. Disaster Recovery: The need for Disaster Recovery,
Disaster Recovery plan, Data backup, Fault Tolerance.
7.39. Advanced Data Storage Techniques: Enterprise Data Storage,
Clustering, Network Attached Storage, Storage Area Networks.
7.40. Network Troubleshooting: Using Systematic Approach to
Troubleshooting.
7.41. Network Support Tools: Utilities, The Network Baseline.
7.42. Network Access Points (NAP), Common Network Component, Common
Peripheral Ports.
3. System Analysis and Design
7.43. Entity Relationship Diagram, Data Flow Diagram, Software
Development Life Cycles, MIS
7.44. Decision Support System, Software Engineering and
User-Interface Design Considerations.
7.45. Context diagram, Top level DFD, Expansion Level DFD,
Conversions of Data
7.46. Object -Oriented Concept, Object Structure, Object
Feature, Class and Object
7.47. Association and Composition, Inheritance, Multiple
Inheritances
7.48. Use Case Diagram, State Diagram, Event Flow Diagram
4. Software
Engineering
7.49. Software process
7.49.1. The software lifecycle models
7.49.2. Risk-driven approaches
7.50. Software project management
7.51. Software requirements
7.52. Software design
7.53. Software Implementation
7.54. Software maintenance
7.55. SE issues
7.55.1. Formal issue
7.55.2. Tools and environments for software
engineering
7.55.3. Role of programming paradigm
7.55.4. Process maturity and improvement
7.55.5. ISO standards
7.55.6. CASE tools
5 Artificial Intelligence
7.56. Concepts
of artificial intelligence 7.57. Overview
of knowledge-based
7.58. Logic programming.
7.59. Programming languages (LISP and Prolog) for AI
7.60. Knowledge representation.
7.61. Rule-based and object-based systems.
7 Data
Communications
7.62. Block Diagram of analog/ digital communication system
7.63. Analog and Digital modulation techniques
7.64. Data communications, including signals, modulation and
reception.
7.65. Error detecting and correcting codes.
7.66. Circuit and Packet switching.
7.67. Multiplexing, including time, frequency and code division
multiplexing.
7.68. Digital networks: ISDN, frame relay and ATM
8 Computer Graphics
7.69. Graphics concepts
7.70. Input devices and techniques
7.71. Basic raster graphics algorithms and primitives
7.72. Scan conversion
7.73. Graphics hardware
7.74. 2D geometrical transformations and viewing
7.75. 3D geometry and viewing
7.76. Hierarchical modeling
7.77. Projections
7.78. Hidden surface removal
7.79. Shading and rendering
(= ljifo
;+u ;DjlGwt Ps k|Zg lgdf{0f ul/g] 5 . pQm k|Zgsf] pQ/ c+u|]hL efiffdf @%) b]lv
#)) zAbdf n]Vg' kg]{5 .
k|Zg of]hgf
!) k|Zg x !) º !))
;a} k|Zgx¿
clgjfo{ x'g]5g\ .
-dfly pNn]lvt
k|To]s PsfO{ jf6 kg]{ u/L ljifout k|Zgsf nflu tf]lsPsf] cÍsf k|Zgx¿sf] Pp6f
nfdf] k|Zg jf Pp6} k|Zgsf b'O{ jf b'O{ eGbf a9L efu - two or more
parts of a single question _ jf Pp6f k|Zg cGtu{t b'O{ jf a9L l6Kk0fLx¿ -Short notes
_ ;f]Wg ;lsg] 5 . _
k|fljlws clws[t -sDKo'6/_ kbsf] v'Nnf k|ltof]lutfsf] lnlvt k/LIffsf]
kf7\of+z
t];|f] kqM–
pRrlzIff / ljZjljBfno ;+u7g ;DaGwL 1fg
k"0ff{Í !))
;do # 306f
!= lzIff / z}lIfs k|zf;g s= lzIffsf]
kl/ro, p4]Zo tyf lzIffsf] ;fdflhs,cfly{s / /fhg}lts e"ldsf
v= g]kfnsf] z}lIfs Oltxf; / dxTjk"0f{ z}lIfs 36gfx¿
u= z}lIfs k|zf;g ;DaGwL 1fgM– kl/ro tyf kl/efiff, p2]Zo / sfo{If]q
3= lqe'jg ljZjljBfnosf] z}lIfs k|zf;gsf]
1fgM– s]Gb|Lo k|zf;g, ;+sfo÷;+:yfg
k|zf;g / SofDk; k|zf;g,
@= pRr lzIffsf] Joj:yfkgsf ljljw kIfM
-s_= u'0f:t/, ;fGble{stf, kx'r / sfo{s'zntf
-v_= ;fj{hlgs, lghL, ;fem]bf/L
-u_= :jfoQtf / hafkmb]lxtf
-3_ g]kfndf pRr lzIffsf] ljsf;s|d
-ª_ g]kfndf ljZjljBfnox? / ltgLx?sf] jt{dfg cj:yf .
-r_= pRrlzIffsf] tfTko{ / g]kfndf pRr lzIffdf b]lvPsf r'gf}tLx¿
#= z}lIfs
cg';Gwfg / ljljw s= z}lIfs
cg';Gwfgsf] cjwf/0f / p2]Zo v= gLlt lgdf{0f tyf of]hgf / sfo{s|dsf] ljsf;df
cg';Gwfgsf] k|of]u / dxTj . u= ;fj{hlgs Joj:yfkgdf tYofÍ / ;"rgfsf] dxTj /
pkof]u
3= ;"rgf k|ljlw ;DaGwL /fli6«o gLlt jf/] hfgsf/L ª= k':tsfno tyf
;"rgf ;DjGwL /fli6«o gLltjf/]sf] 1fg .
r=
ljZjljBfno cg'bfg cfof]u – :yfkgfsf] p2]Zo, st{Jo tyf pQ/bfloTj 5== lzIff
dGqfno, cy{ dGqfno, ljZjljBfno cg'bfg
cfof]u / ljZjljBfno jLrsf] ;DaGwsf ljljw cfofdx¿
$= ;+ljwfg, P]g, lgod tyf lqe'jg ljZjljBfno
;+u7g;DaGwL
-s_=;+ljwfg, P]g, lgod / sfo{Joj:yfkg k|0ffnLsf] cy{ / logLx¿
jLrsf] leGgtfx¿
-v_= lq=lj P]g @)$( -;+zf]wg ;lxt _ sf] hfgsf/L
-u_ lq=lj ;+u7g tyf z}lIfs k|zf;g ;DaGwL lgod @)%)
-;+zf]wg ;lxt _ sf] hfgsf/L .
-3_ lq=lj lzIfs sd{rf/L
;]jf;DaGwL lgod @)%) -;+zf]wg ;lxt _ jf/] hfgsf/L
-ª_= lq=lj cfly{s Joj:yfkg / vl/b ;DjGwL lgod @)%)
-;+zf]wg ;lxt _ jf/] hfgsf/L
-r_ lq=lj=sf] ljs]Gb|Ls/0f lgod @)%% jf/] hfgsf/L
-5_ :jfoQtf ;DaGwL lgod @)^@
jf/] hfgsf/L
%= jf]w–cleJolQm ÷ ;d:of–;dfwfg –
;+If]kLs/0f, lj:t[tLs/0f, a"Fbf l6kf]6, ;f/f+z, l6Kk0fL n]vg, cg'R5]b
n]vg jf af]w k|Zgx?sf] dfWodjf6 uxgtd\ 9+un] af]w / cleJolQm Ifdtfsf] k/LIf0f
jf s'g} klg ;d:of a'em\g / To;sf] ;dfwfg ug{ ;Sg] Ifdtfsf] k/LIf0f .
* k|Zg x !) = *)
af]w cleJolQm÷;d:of/ ;dfwfg ! k|Zg x @) º @)
;a} k|Zgx¿
clgjfo{ x'g]5g\ .
-dfly pNn]lvt
k|To]s PsfO{ jf6 kg]{ u/L ljifout k|Zgsf nflu tf]lsPsf] cÍsf k|Zgx¿sf] Pp6f
nfdf] k|Zg jf Pp6} k|Zgsf b'O{ jf b'O{ eGbf a9L efu - two or more
parts of a single question _ jf Pp6f k|Zg cGtu{t b'O{ jf a9L l6Kk0fLx¿ -Short notes
_ ;f]Wg ;lsg] 5 . _
Download in PDF From - This Link