Second Internal Exam Syllabus - November 2025
SEM - V - B. TECH. CSE (CS/CSE/CBA/BDA)
2CSE508 - Microcontroller and Application ( DSD ) |
TEXT BOOK : The 8051 Microcontroller : By Kenneth J Ayala
The 8051 Microcontroller and Embeded Systems : By Mazidi & Mazidi
CHAPTER : 8051 ARCHITECTURE - Architecture of 8051 – Diagram and brief description including specific features. - Programming Model of 8051 – Diagram and brief description - Format of PSW and description about function of each bit - Internal RAM structure with bit addressable area - Stack operations with sample programs CHAPTER : MOVING DATA - All instructions with format and examples - Different Addressing modes with examples CHAPTER : LOGICAL OPERATIONS - All instructions with format and examples - BIT level and BYTE level operations CHAPTER : BRANCHING OPERATIONS (UPTO CALL AND RET – EXCLUDE INTERRUPT PART) - All instructions with format and examples - Diagram of address ranges for jumps and calls - Differentiate between SJMP, AJMP AND LJMP - Differentiate between relative jumps, absolute short jump and absolute long jump - Difference between jump and call instructions. - Operation of CALL and RET instructions (with inherent stack operations) with example PROGRAMS DONE IN LAB / LECTURE AND RELATED LOGICAL PROGRAMS BASED ON THE INSTRUCTIONS DISCUSSED IN SYLLABUS. |
2CSE502 - COMPUTER NETWORKS ( RBP ) |
Transport Layer : Introduction and transport layer services, Multiplexing and Demultiplexing, Connection less transport (UDP), Principles of reliable data transfer, Connection oriented transport (TCP), Congestion control. Network Layer : Introduction, Virtual and Datagram networks, study of router, IP protocol and addressing in the Internet, Routing algorithms. In addition to above Topics, The Network Design based problems will be included similar to Practical Definitions of Laboratory Experiments. |
2CSE503 - ALGORITHM ANALYSIS & DESIGN ( TRK ) |
Greedy Algorithms General characteristics of greedy algorithms and examples, applications: Kruskal’s and Prim’s algorithms, introduction to shortest path problem variants, single source shortest path problem, knapsack problem, scheduling problem, Huffman code. Dynamic Programming Longest Common Subsequence (LCS) problem, memory functions. Graph Algorithms Directed acyclic graph, topological ordering & sorting, backtracking, application of backtracking: knapsack problem, Queen’s problem, Branch & bound and its application. Computational Complexity Polynomial (P) and Non Polynomial (NP) problems, NP Hard and NP Completeness, SAT problem, Traveling Salesman Problem. |
2CSE505 - MICROSERVICES ( RAMAN PREET MA’AM ) |
Unit-2: NODEJS Special Routing, Chaining of handler function, View templates, serving static content,handling http and https. Unit-3: CONTAINER & DOCKERS Docker,benefits of using containers, VM vs Container, development versus operations, docker mission, docker adoption, docker architecture, docker typical workflow, docker shared and layered file systems technology, Docker commands for containers, images and containers. Note: Practical concepts can also be asked. Unit-4: KUBERNETES Container orchestration, kubernetes strengths, kubernetes architecture, master node components, worker node components, kubernetes building blocks, deploying applications on kubernetes. |
2CSE50E20 - VIRTUALIZATION ( JAY SADHU ) |
Unit - 3 Unit - 4 Unit - 5 |
2CSE506 - BIG DATA ANALYTICS ( RUSHIKESH CHAVHAN SIR ) |
Architecture & Storing and Querying Data using PIg, HIVE, Sqoop,DFS,HDFS,YARN |
2CSE50E27 - DATA SCIENCE & MODELING USING R ( DRS ) |
Inferential Statistics through hypothesis tests
|
2CSE507 - IDENTITY & ACCESS MANAGEMENT ( RUSHIKESH DINKAR SIR ) |
Single Sign-On (SSO) Concepts and Methods: Single Sign-On Techniques, Access Control, Password Management, Introduction to Single Sign On Methods Introduction to Federation: Federation Overview, Federation Protocols, Governance Risk and Compliance Identity Management and Provisioning: Multi Factor authentication (Mfa),Origin Of Mfa, Introduction to Auditing & Reporting, Identity Management And User Provisioning, Introduction To Identity Manager, Identity Manager Structure & Components, Identity & Access Management Governance |
2CSE50E24 - CRYPTOGRAPHY ( BHAVIK KATARIA SIR ) |
Cryptographic Mathematics Modular arithmetic, linear congruence, Algebraic structure, checking of primeness, quadratic congruence Modern symmetric key ciphers Modern block ciphers, modern stream ciphers, Data Encryption standard, advanced encryption standard, Electronic code book mode, CBC, cipher feedback mode, output feedback mode Public key cryptography RSA, RSA proof, RSA attacks, Rabin cryptosystem, Key management: Diffie Hellman Key Exchange Algorithm |
2CSE509 - APTITUDE SKILL DEVELOPMENT ( PA ) |
LogicalReasoning: NumberSeries,Alphanumeric,Letter&SymbolSeries. VerbalReasoning: Para–Jumble,TextCompletion. |
2CSE50E28 - WEB DEVELOPMENT USING PYTHON ( BHAVIK KATARIA SIR ) |
Django Models The MVT Development Pattern- Configuring Django for Database Access - Understanding Django Apps - Defining Models in Python- Installing the Model -Understanding Model Fields & Options - Creating A Django Model -Adding Model String Representations-Making Changes to a Database Schema Django Admin Interface Activating the Admin Interface- Using the Admin Interface - Users, Groups and Permissions Customizing the Admin Interface's Look and Feel- Customizing the Admin Index Page- When and Why to Use the Admin Interface- Form Processing- Form Validation- Save Form Response QuerySets and Static Files QuerySet Introduction,Queryset Get, Queryset Filter, QuerySet Order By, Loading css files into templates,Loading js files into templates,Uploading image using models,User authentication Access Control with Session And Users The Django Session Framework- Sessions in Views- Session Tuning-Installing Django User Authentication- Using Authentication in Views- Login and Logout-Building your Own Login/Logout Views- Adding & Deactivating Users- Asynchronous Messaging- Managing Permissions |