Showing posts from 2017

Data Structures and Programming Methodology

Data Structures and Programming Methodology Objectives: This course should provide the students with a fairly good concept of the fundamentals of different types of data structures and also the ways to implement them. Algorithm for solving problems like sorting, searching, insertion & deletion of data etc. related to data structures should also be discussed. After completion of this subject student should be able to choose an appropriate data structure for a particular problem.

Introduction: Definition and brief description of various data structures, operations on data structures, Algorithm development, Complexity analysis, Big O notation, Time space trade-off. Arrays: Linear and Multi-dimensional arrays and their representation, operations on arrays, Linear Search, Binary Search, Sparse matrices and their storage. Stacks: Array Representation and Implementation of Stacks, Operations on Stacks, Application of stacks: Conversion of Infix to Prefix and Postfix Expressions, Evaluat…

Digital Circuits and Logic Design

Digital Circuits and Logic Design   Digital Circuits and Logic Design  2016 final question papers 2016 1st MST question papers 2016 2nd MST question papers 

IT Methodologies

IT Methodologies
IT Methodologies 2016 final question papers
2016 1st MST question papers  2016 3rd MST question papers 

Social and Professional Aspects of Information Technology

Social and Professional Aspects of Information TechnologyOrganizational Context: Business processes, Workflow, IT environment, Organizational culture, Organizational structure, professionalism [4]  Teamwork Concepts and Issues : Collaboration, group dynamics, leadership styles, personality types, collaboration tools [4] Professional Communications: Skill of effective oral presentation, efficient technical writing, system documentation, technical requirements [4]  Security and Legal issues in computing: Data security, system security and network security, GhostNet, cloud computing and security, cyber terrorism, hacktivism, information warfare, Compliance, Hackers/crackers, computer crime, viruses, system use policies and monitoring, risk and liabilities of computer-based systems [5]  Social context of computing:Social informatics, social impact of IT on society, online communities and social implications, globalization issues, economic issues in computing, digital divide [6]  Intellectual …

Database Management Systems Laboratory

Database Management Systems Laboratory  SYLLABUS 1. Introduction to SQL and installation of a database product 2. Data Types, Creating Tables, Retrieval of Rows using Select Statement, Conditional Retrieval of Rows, Alter and Drop Statements. 3.Working with Null Values, Matching a Pattern from a Table, Ordering the Result of a Query, Aggregate Functions,Grouping the Result of a Query, Update and Delete Statements. 4.Set Operators, Nested Queries, Joins, Sequences. 5.Views, Indexes, Database Security and Privileges: Grant and Revoke Commands, Commit and Rollback Commands. 6.PL/SQL Architecture, Assignments and Expressions, Writing PL/SQL Code, Referencing Non-SQL parameters. 7.Stored Procedures and Exception Handling. 8.Triggers and Cursor Management in PL/SQL. 9.Working with XML databases 10.Introduction to a data mining tool


CREATE THE TABLE: create table client_master11 (client_no varchar2(6), name varchar2(20), address varchar2(30), city varchar2(15), state varchar2(15), pincode varchar2(…