A | B | C | D | E | F | |
---|---|---|---|---|---|---|

1 | Course | In short | ||||

2 | BSc (Hon) in Computing | C | ||||

3 | BSc (Hon) in Ethical Hacking and Cyberseurity | E | ||||

4 | ||||||

5 | Intake Cycle | In short | ||||

6 | March | M | ||||

7 | September | S | ||||

8 | ||||||

9 | Intake Year (Last two digit of Year) | YY | ||||

10 | ||||||

11 | Stage | In short | ||||

12 | Stage 1 | S1 | ||||

13 | Stage 2 | S2 | ||||

14 | Stage 3 | S3 | ||||

15 | ||||||

16 | Semester | In short | ||||

17 | Semester 1 | s1 | ||||

18 | Semester 2 | s2 | ||||

19 | ||||||

20 | Section | A, B, C, D so on | ||||

21 | ||||||

22 | EXAMPLE | |||||

23 | CM-20-A (S1s2) | BSc (Hon) in Computing | 2020 | Stage 1 | Semester 2 | Section A |

24 | EM-20 (S1s2) | BSc (Hon) in Ethical Hacking and Cyberseurity | 2020 | Stage 1 | Semester 2 | |

25 | ||||||

26 | Batch 23 CODE | TP3-CM-20 (S3S2) | ||||

27 | 23A | TP3-CM-20-A | ||||

28 | 23B | TP3-CM-20-B | ||||

29 | Batch 24,25 CODE | TP2-CS-19 (S3S1) | ||||

30 | 24A | TP2-CS-19-A | ||||

31 | 24B | TP2-CS-19-B | ||||

32 | 25A | TP2-CS-19-C | ||||

33 | 25B | TP2-CS-19-D | ||||

34 | 25C | TP2-CS-19-E | ||||

35 | 25D | TP2-CS-19-F | ||||

36 | Batch 26(Computing) CODE | CM-19 (S2S2) | ||||

37 | 26A | CM-19 | ||||

38 | Batch 26 (Ethical) CODE | EM-19 (S2S2) | ||||

39 | 26B | EM-19 | ||||

40 | Batch 27 (Computing) CODE | CS-19 (S2S1) | ||||

41 | 27A | CS-19-A | ||||

42 | 27C | CS-19-B | ||||

43 | 27E | CS-19-C | ||||

44 | 27F | CS-19-D | ||||

45 | Batch 27 (Ethical) CODE | ES-19 (S2S1) | ||||

46 | 27B | ES-19-A | ||||

47 | 27D | ES-19-B | ||||

48 | 27G | ES-19-C | ||||

49 | Batch 28 (Computing) CODE | CM-20 (S1S2) | ||||

50 | 28A | CM-20-A | ||||

51 | 28B | CM-20-B | ||||

52 | Batch 28 (Ethical) CODE | EM-20 (S1S2) | ||||

53 | 28C | EM-20 |