... | | | | |3 |MC9233 |Software Engineering |3 |0 |0 |3 | |4 |MC9234 |Computer Graphics |3 |0 |0 |3 | |5 |MC9235 |Web Programming |3 |0 |0 |3 | |PRACTICAL | |6 |MC9237 |Graphics Lab |0 |0 |3 |2 | |7 |MC9238 |Microprocessor Lab |0 |0 |3 |2 | |8 |MC9239 |Web Programming Lab |0 |0 |3 |2 | | TOTAL |15 |0 |9 |21 | MC9231 COMPUTER NETWORKS L T P C 3 0 0 3 UNIT I INTRODUCTION 9 Communication model – Data communications...
Words: 1592 - Pages: 7
...Leveraging Existing Tests in Automated Test Generation for Web Applications Amin Milani Fard Mehdi Mirzaaghaei University of British Columbia Vancouver, BC, Canada Ali Mesbah {aminmf, mehdi, amesbah}@ece.ubc.ca ABSTRACT To test web applications, developers currently write test cases in frameworks such as Selenium. On the other hand, most web test generation techniques rely on a crawler to explore the dynamic states of the application. The first approach requires much manual effort, but benefits from the domain knowledge of the developer writing the test cases. The second one is automated and systematic, but lacks the domain knowledge required to be as effective. We believe combining the two can be advantageous. In this paper, we propose to (1) mine the human knowledge present in the form of input values, event sequences, and assertions, in the human-written test suites, (2) combine that inferred knowledge with the power of automated crawling, and (3) extend the test suite for uncovered/unchecked portions of the web application under test. Our approach is implemented in a tool called Testilizer. An evaluation of our approach indicates that Testilizer (1) outperforms a random test generator, and (2) on average, can generate test suites with improvements of up to 150% in fault detection rate and up to 30% in code coverage, compared to the original test suite. these interactions at runtime is manifested through the Document Object Model (DOM) and presented to the end-user in the browser...
Words: 10932 - Pages: 44
............................................................................................................................................... 2 JAVA .................................................................................................................................................................................................. 3 C#....................................................................................................................................................................................................... 4 Database/SQL ................................................................................................................................................................................... 6 Web Development............................................................................................................................................................................ 7 SDLC................................................................................................................................................................................................... 9 UML ................................................................................................................................................................................................. 11 1 Review Guide OOPS Resources: http://en.wikipedia.org/wiki/Object-oriented_programming Object-oriented programming (OOP) is a programming paradigm...
Words: 2407 - Pages: 10
...JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD M. TECH (REAL TIME SYSTEMS) COURSE STRUCTURE AND SYLLABUS I YEAR I SEMESTER Code Group Subject L P Credits Advanced Computer Architecture 3 0 3 Advanced Micro Controllers 3 0 3 Fundamentals of Real Time Systems 3 0 3 Design & Development of Real Time Systems 3 0 3 Elective -I Digital Control Systems Distributed Operating Systems Cloud Computing 3 0 3 Elective -II Digital Systems Design Fault Tolerant Systems Advanced Computer Networks 3 0 3 Lab Micro Processors and Programming Languages Lab 0 3 2 Seminar - - 2 Total Credits (6 Theory + 1 Lab.) 22 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD MASTER OF TECHNOLOGY (REAL TIME SYSTEMS) I SEMESTER ADVANCED COMPUTER ARCHITECTURE UNIT I Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel...
Words: 3183 - Pages: 13
...Assignment Project Part 10. Web Security Life Cycle Software development life cycles are created to help guide businesses towards meeting specific desires and needs within their applications. They drive the steps used to meet best practices and standards that businesses are required to follow to function. SDLCs are made up of various different stages such as; assessments, application development, QA testing, deployments, etc. Best practices and standards dictate that implementing security within the various steps of an SDLC if not all of the steps will provide the best results that any business is trying to achieve. An SDLC can come in a few different models like a waterfall model, spiral model and a V-Model. This document will be used to describe and give a brief summary on many different processes. Application Development: During the development of web applications, things such as poor error handling, and unsecure data transferring can plague the development. Poor error handling could result in malicious users finding much more information about a application than should be revealed and can use that information to gain access to unauthorized areas, while unsecure data transferring could result in data being stolen as it is broadcasted across a network. QA/Testing: Security professionals that continually test software and web applications for malicious attacks or security flaws ensure that products will continue to work as desired. Examples of testing that could be used is Integration...
Words: 1029 - Pages: 5
...MBO TICKET M-BOOKING SYSTEM RIDZWAN BIN ABDOL RAHMAN UNNERSITI TEKNIKAL MALAYSIA MELAKA mcngaku ~nembcnal-kan ti'sis !J'Sh,7:'Sarja!ia;:Doh:tos F:tlsafi~h) ini disi~npr?n Pespust:ikaan di hlal;!umat dan Kot~~uoikasi : ! i '1'cl;nolo:i dc~?g;ins!-arat-syrat kcgunnan sspcsti : hcri k u: haklnilik I 'nil-cssi~i 71'elinik~iI h/l:tlu?-sia hlclaka. 1 . Tesis dari psojek adalal~ 3. Pcrpastal.;aan Fakulti Tchlnlogi hlaklun~atdnn Komuniknsi dihcnarkan mclnbuat snlinan u ~ ~ t u ~ i u a pcngajian saliqia. tk i~ Fg.l;ulti -1'cknnlogi Rlaklumat c!nn Kcm~~nikasi dil~cnaskanrncrul~ui~t -3. Pcrpurtakc~:~n .. salinan tesis itii sehagai bahan pestukaran atitara institus; pcsrtga.11a11 tinggi. 1. "* Sila taiidakan ( 1 ) SlTT_TT (Mcngnt~dungi ~iiahlumatgang berdarjuh hcscla~na~an k e p c i ~ ~ i i ~ >lala!~ S I L I ataLi y:t~ sepcrti >an? termaktub di clalam :\1;T:2 R:IFISI.A RAShll 1972) - / . - - ~. .PTT),\F: 'T'ERI1..1r) II-:1ND.-2I:?NCiA-\n!PENT [I-IS) \loinat tct~lp NO 3 17. .j31a11 K L ' s ~ ~ c : &- e-- (T.4ND.!Il':\N ;.AN PENYF I .!;\ ) C'ih Siti XTnstusa I7inti B;~l-ua~.~icti~i C4..ITi4T:2N: 7-tsis dimaksudkan scbagiii 1.aporan Akhir Prqiek Sariana Muds (PShij, J i b tcsis ini SliI.11- atnu TTIRIT,ZD. sila 1ampisk:tn susnt daripada pil-uth "'$ bcrkurlsa. * MBO TICKET M-BOOKING SYSTEM RIDZWAN BIN ABDOL RAHMAN This report is submitted in partial fulfillment of the requirements for the Bachelor of Computer Science (Software...
Words: 3188 - Pages: 13
...MBO TICKET M-BOOKING SYSTEM RIDZWAN BIN ABDOL RAHMAN UNNERSITI TEKNIKAL MALAYSIA MELAKA mcngaku ~nembcnal-kan ti'sis !J'Sh,7:'Sarja!ia;:Doh:tos F:tlsafi~h) ini disi~npr?n Pespust:ikaan di hlal;!umat dan Kot~~uoikasi : ! i '1'cl;nolo:i dc~?g;ins!-arat-syrat kcgunnan sspcsti : hcri k u: haklnilik I 'nil-cssi~i 71'elinik~iI h/l:tlu?-sia hlclaka. 1 . Tesis dari psojek adalal~ 3. Pcrpastal.;aan Fakulti Tchlnlogi hlaklun~atdnn Komuniknsi dihcnarkan mclnbuat snlinan u ~ ~ t u ~ i u a pcngajian saliqia. tk i~ Fg.l;ulti -1'cknnlogi Rlaklumat c!nn Kcm~~nikasi dil~cnaskanrncrul~ui~t -3. Pcrpurtakc~:~n .. salinan tesis itii sehagai bahan pestukaran atitara institus; pcsrtga.11a11 tinggi. 1. "* Sila taiidakan ( 1 ) SlTT_TT (Mcngnt~dungi ~iiahlumatgang berdarjuh hcscla~na~an k e p c i ~ ~ i i ~ >lala!~ S I L I ataLi y:t~ sepcrti >an? termaktub di clalam :\1;T:2 R:IFISI.A RAShll 1972) - / . - - ~. .PTT),\F: 'T'ERI1..1r) II-:1ND.-2I:?NCiA-\n!PENT [I-IS) \loinat tct~lp NO 3 17. .j31a11 K L ' s ~ ~ c : &- e-- (T.4ND.!Il':\N ;.AN PENYF I .!;\ ) C'ih Siti XTnstusa I7inti B;~l-ua~.~icti~i C4..ITi4T:2N: 7-tsis dimaksudkan scbagiii 1.aporan Akhir Prqiek Sariana Muds (PShij, J i b tcsis ini SliI.11- atnu TTIRIT,ZD. sila 1ampisk:tn susnt daripada pil-uth "'$ bcrkurlsa. * MBO TICKET M-BOOKING SYSTEM RIDZWAN BIN ABDOL RAHMAN This report is submitted in partial fulfillment of the requirements for the Bachelor of Computer Science (Software...
Words: 3188 - Pages: 13
...mention of people whose ceaseless cooperation made it possible, whose constant guidance and encouragement crown all efforts with success. We are grateful to our project guide Mr. Muhammad Waqas Ilyas for the guidance, inspiration and constructive suggestions that helpful us in the preparation of this project. We also thank our colleagues who have helped in successful completion of the project. Aisha Yousuf (Student509323) Muniba Shah (Student503412) Babar Khan (Student509331) Zulekha (Student522023) Glamour Basket Online Shopping System Page 3 Contents 1. INTRODUCTION 2. PROBLEM STATEMENT a. ONLINE SHOPPING SYSTEM b. Business Rules 3. CUSTOMER REQUIREMENT 4. PROJECT REQUIREMENT 5. ANALYSIS AND DESIGN a. DATA MODEL ANALYSIS b. PROCESS DIAGRAM c. Flow Chart Diagrams 6. DEVELOPER’S GUIDE a. IMPORT PROJECT INTO WAMP...
Words: 1738 - Pages: 7
...UNIVERSITY OF MUMBAI Bachelor of Engineering Information Technology (Third Year – Sem. V & VI) Revised course (REV- 2012) from Academic Year 2014 -15 Under FACULTY OF TECHNOLOGY (As per Semester Based Credit and Grading System) University of Mumbai, Information Technology (semester V and VI) (Rev-2012) Page 1 Preamble To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of the program that is being accredited. In line with this Faculty of Technology of University of Mumbai has taken a lead in incorporating philosophy of outcome based education in the process of curriculum development. Faculty of Technology, University of Mumbai, in one of its meeting unanimously resolved that, each Board of Studies shall prepare some Program Educational Objectives (PEO‟s) and give freedom to affiliated Institutes to add few (PEO‟s) and course objectives and course outcomes to be clearly defined for each course, so that all faculty members in affiliated institutes understand the depth and approach of course to be taught, which will enhance learner‟s learning process. It was also resolved that, maximum senior faculty from colleges and experts from industry to be involved while revising the curriculum. I am happy to state...
Words: 10444 - Pages: 42
...1 1.3 Types of Software developing life cycles (SDLC) 2 1. Waterfall Model 2 2. V-Shaped Model 4 3. Evolutionary Prototyping Model 5 4. Spiral Method (SDM) 7 5. Iterative and Incremental Method 8 6. Extreme programming (Agile development) 10 1.4 CASE (computer-aided software engineering) 11 1.5 Conclusion 16 Introduction System development methodology is a standard process followed in an organization to conduct all the steps necessary to analyze, design, implement, and maintain information systems. Organizations use a standard set of steps, called system development methodology to develop and support their information systems. Like many processes, the development of information systems often follows a life cycle. For example, a commercial product such as a Nike sneaker or a Honda car follows a life cycle; it is created, tested and introduced to the market. Its sales increase, peak and decline. Finally, the product is removed from the market and is replaced with something else. Many options exist for developing information systems, but the most common methodology for system development in many organizations is system development life cycle. However, it is important to know other alternative development methodology available in order to maximize the development process. there are four important terminologies in information systems, namely methodology, model, tools and techniques. Methodology Methodology in information system refers to...
Words: 2577 - Pages: 11
...overall business and the customer’s overall satisfaction - IT initiatives must be consistent with company strategy—goal organization and management provide stable benefits to a fast growing, fast moving company - Companies must retain functional organization structure to scale without sacrificing control during high levels of growth - Install resource planning systems that smoothen company processes (don’t mirror old inefficient practices) - “Global Networked Companies” experience higher productivity and profitability - Standardization of Internet business solutions across functional areas leads to increased competitive advantage and shareholder value More in-depth Summary I. Cisco Systems Architecture: ERP and Web-enabled IT a. Company vision i. Pioneer ”New World Network” where voice calls are free over the Internet ii. Cisco = “Internet experts: the Global Internet Company” b. Company background i. Founded by two Stanford scientists in 1984 / went public in 1990 ii. Dominates “Internetworking” Market iii. March 27, 2000, Cisco overtook Microsoft as most valuable business on earth (market cap of $531 billion) iv. Cisco core technologies 1. Began with routers (what make the computer work) 2. Now challenging world of three independent proprietary networks 1. Phone networks (voice) ...
Words: 2724 - Pages: 11
...Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 1 of 16 Annexure No. SCAA Dated BHARATHIAR UNIVERSITY, COIMBATORE – 641 046 M. Sc COMPUTER SCIENCE For School of Distance Education (Effective from the academic Year 2007-2008) Scheme of Examinations 31 J 29.02.2008 Year Subject and Paper I Paper I Paper II Paper III Paper IV Practical I Paper V Paper VI Paper VII Practical II Project Advanced Computer Architecture Computer Graphics & Multimedia Software Engineering Computer Networks Computer Graphics and Multimedia Lab Advanced Operating System Internet programming and Web Design Data Mining and Warehousing Internet programming and Web Design Lab Project Work and Viva Voce Total University Examinations Durations Max in Hrs Marks 3 100 3 100 3 100 3 100 3 100 3 3 3 3 100 100 100 100 100 1000 II For project work and viva voce (External) Breakup: Project Evaluation : 75 Viva Voce : 25 1 Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 2 of 16 YEAR – I PAPER I: ADVANCED COMPUTER ARCHITECTURE Subject Description: This paper presents the concept of parallel processing, solving problem in parallel processing, Parallel algorithms and different types of processors. Goal: To enable the students to learn the Architecture of the Computer. Objectives: On successful completion of the course the students should have: Understand the concept of Parallel Processing. Learnt the different types of Processors. Learnt the Parallel algorithms. Content: Unit I...
Words: 3613 - Pages: 15
...______________ Internal Examiner ______________ Head of the Department Submitted on: ______________ PRIYESH KUMAR, DCA, CUSAT, Kochi-22 2 ONLINE HOTEL MANAGEMENT CONTENTS ACKNOWLEDGEMENT SYNOPSIS 1. INTRODUCTION 1.1. OBJECTIVE 1.2.PROBLEM DEFINITION 1.3. SYSTEM ENVIRONMENT 2. SOFTWARE QUALITY ASSURANCE PLAN 2.1. PURPOSE 2.2. SCOPE 2.3. DOCUMENT OVERVIEW 2.4. TASKS 2.5. IMPLEMENTATION 2.6. DOCUMENTATION 2.7. AUDIT 2.8. SOFTWARE DEVELOPMENT PROCESS 2.9. DOCUMENT REVIEW 2.10 TESTING 3. SYSTEM ANALYSIS 3.1 SYSTEM STUDY 3.2FEASIBILITY STUDY 2010 PRIYESH KUMAR, DCA, CUSAT, Kochi-22 3 ONLINE HOTEL MANAGEMENT 4. SOFTWARE REQUIREMENTS SPECIFICATION 2010 4.1User Interface Requirements 4.2Database Requirements 4.3Functional Requirements 4.4Non-Functional Requirements 4.5Other Requirements and Constraints 5. SYSTEM DESIGN 5.1 ARCHITECTURAL DESIGN 5.2 PROCESS DESIGN 5.3 ER-DIAGRAMS 6. DATA DESIGN 6.1.DATA FLOW DIAGRAMS 6.2ACTIVITY DIAGRAMS 6.3DATABASE DESIGN 7. SYSTEM TESTING 7.1. LEVELS OF TESTING AND TEST CASES 7.2VALIDATION CHECKS 8. SYSTEM IMPLEMENTATION 9. SYSTEM MAINTENANCE 10.SCREEN SHOTS 11.CONCLUSION APPENDIX BIBLIOGRAPHY PRIYESH KUMAR, DCA, CUSAT, Kochi-22 4 ONLINE HOTEL MANAGEMENT 2010 ACKNOWLEDGEMENTS I have a great pleasure in acknowledging the help given...
Words: 7751 - Pages: 32
...TABLE OF CONTENTS Sr. Content Page no No 1. INTRODUCTION 6 1.1 Abstract 1.2 Problem Definition 1.3 Scope of Project 2. REVIEW OF LITERATURE 8 3. SOFTWARE REQUIREMENT SPECIFICATION 18 4. EXISTING SYSTEM 22 5. PROPOSED SYSTEM 26 6. TIMELINE CHART OF PROJECT` 32 7. FUTURE SCOPE 33 8. CONCLUSION 34 9. REFERENCES 35 1. INTRODUCTION 1.1 Abstract Virtual Classroom represents an innovative shift in the field of learning, providing rapid access to specific knowledge and information. It represents an interface between the students and a professor and provides personalized learning materials to the users. It offers a possibility to the attendees to share different resources at once and work with them as if they were at the same place where (real) resources are. In the system design, we use agents as entities that work on different tasks in the system. A set of agents of the same type is responsible for handling different users and their requests. The cooperation among agents is established through the act of exchanging messages. A wide variety of classroom techniques are being advocated to increase learning: active learning, collaboration, integration of assessment...
Words: 7999 - Pages: 32
...SCHEME OF EXAMINATION FOR MASTER OF COMPUTER APPLICATIONS (MCA) (SIX-SEMESTER Programme) |Semester – I | |Paper |Title of the Paper |Duration |Maximum Marks |Total | |No. | |Of Exam | | | | | | |Theory |Sessional* | | |MCA-101 |Computer Fundamentals and Problem Solving Using C |3 Hours |80 |20 |100 | |MCA-102 |Computer Organisation |3 Hours |80 |20 |100 | |MCA-103 |Discrete Mathematical Structures |3 Hours |80 |20 |100 | |MCA-104 |Software Engineering |3 Hours |80 |20 |100 | |MCA-105 |Computer Oriented Numerical and Statistical Methods |3 Hours |80 |20 |100 | |MCA-106 |Software Laboratory - I |3 Hours | | |100 | | |C (Based on MCA-101) |...
Words: 13848 - Pages: 56