| Date | Subject |
|---|---|
| 7 July | π± Universal Human Values (UHV) |
| 9 July | π Cyber Security (CS) |
| 11 July | π» Digital Electronics (D.E) |
| 14 July | β OOPs with Java (OOP) |
| 16 July | π Theory of Automata & Formal Languages (TAFL) |
| 18 July | π Operating System (OS) |
- Number systems: Binary, Octal, Decimal, Hexadecimal
- Complements: 1's and 2's complement, Subtraction using complements
- Binary codes: BCD, Gray code, Excess-3 code
- Binary arithmetic: Addition, Subtraction, Multiplication, Division
- Basic logic gates: AND, OR, NOT
- Universal gates: NAND, NOR
- Boolean algebra: Laws and theorems
- De Morgan 's theorems and their applications
- Standard forms: Sum of products (SOP), Product of sums (POS)
- Karnaugh map (K-map) simplification: 2-variable, 3-variable, 4-variable
- Combinational logic design:
- Half Adder
- Full Adder
- Half Subtractor
- Full Subtractor
- Multiplexers
- Demultiplexers
- Encoders
- Decoders
- Flip-Flops:
- SR Flip-Flop
- JK Flip-Flop
- D Flip-Flop
- T Flip-Flop
- Master-Slave Flip-Flop
- Counters:
- Asynchronous counters (Ripple counters)
- Synchronous counters
- Up/Down counters
- Shift Registers:
- Serial-in Serial-out (SISO)
- Serial-in Parallel-out (SIPO)
- Parallel-in Serial-out (PISO)
- Parallel-in Parallel-out (PIPO)
- Memory:
- Random Access Memory (RAM)
- Read Only Memory (ROM)
- Programmable Logic Devices:
- Programmable Logic Array (PLA)
- Programmable Array Logic (PAL)
- Field Programmable Gate Array (FPGA)
- Memory hierarchy: Registers, Cache, Main Memory, Secondary Memory
- Digital Logic Families:
- TTL (Transistor-Transistor Logic)
- CMOS (Complementary Metal-Oxide-Semiconductor)
- Characteristics:
- Fan-in
- Fan-out
- Propagation delay
- Power dissipation
- Analog to Digital Converters (A/D): Principle and working
- Digital to Analog Converters (D/A): Principle and working
- Definition and functions of Operating System
- Types of OS:
- Batch OS
- Time-Sharing OS
- Distributed OS
- Real-Time OS
- Network OS
- Mobile OS
- System components:
- Process management
- Memory management
- File management
- I/O management
- System calls
- OS structure (Monolithic, Microkernel, Layered, Modular)
- Process concept
- Process control block (PCB)
- Process states and transitions
- Process scheduling: Scheduling criteria and algorithms
- FCFS (First-Come-First-Serve)
- SJF (Shortest Job First)
- Round Robin
- Priority scheduling
- Context switching
- Threads and multithreading models
- Concurrent processes
- Critical-section problem
- Petersonβs solution
- Synchronization hardware
- Semaphores and Monitors
- Classical problems of synchronization
- Producer-Consumer
- Readers-Writers
- Dining Philosophers
- Deadlocks:
- Characterization
- Prevention
- Avoidance
- Detection and Recovery
- Logical vs Physical address space
- Memory management techniques:
- Swapping
- Contiguous memory allocation
- Paging
- Segmentation
- Virtual memory
- Demand paging
- Page replacement algorithms:
- FIFO
- Optimal
- LRU (Least Recently Used)
- Thrashing
- Working-set model
- File concepts:
- File types
- File operations
- Access methods: Sequential, Direct, Indexed
- Directory structures: Single-level, Two-level, Tree-structured, Acyclic Graph, General Graph
- File system mounting
- File sharing and protection
- Disk scheduling algorithms:
- FCFS
- SSTF
- SCAN
- C-SCAN
- LOOK
- C-LOOK
- RAID levels and concepts
- Definition, Objectives, Cyber crimes, Cyber attack types
- Network security basics, Cyber ethics, Security principles
- Cryptographic techniques: Symmetric and Asymmetric encryption
- RSA, AES, DES algorithms
- Public Key Infrastructure (PKI)
- Digital signatures, Certificates
- Authentication, Access control, Firewalls
- IDS, IPS, VPNs, Proxy servers
- Security in Wireless networks
- IT Act 2000, Amendments
- Intellectual Property Rights
- Digital forensics process, Chain of custody
- Cyber forensic tools
- Cloud security, IoT security, Mobile security
- AI in cyber security
- Social engineering attacks, Phishing, Malware, Ransomware
- Definition and importance
- Self-exploration and natural acceptance
- Harmony in the human being: Self and body
- Trust and respect as the foundational values
- Harmony in society, Universal human order
- Interconnectedness in nature
- Co-existence and the role of humans in maintaining harmony
- Ethical human conduct, Integrity, Compassion
- Social justice, Gender sensitivity, Value-based education
- Engineering ethics, Responsibility, Accountability
- Conflict of interest, Whistle-blowing, Global issues in ethics
- Object-oriented programming principles: Abstraction, Encapsulation, Inheritance, Polymorphism
- Classes and objects in Java
- Java basics: Data types, Control structures, Arrays, String handling
- Types of inheritance
- Method overloading and overriding
- Abstract classes, Interfaces
- Runtime polymorphism
- Exception types, try-catch, finally block
- File handling: Byte streams, Character streams
- Serialization and Deserialization
- Thread lifecycle, Thread class, Runnable interface
- Synchronization, Inter-thread communication
- Java Collection Framework: List, Set, Map, Iterators
- Java AWT and Swing basics
- Event handling, Layout managers
- JDBC architecture, CRUD operations using JDBC
- Formal languages, Grammar, Finite automata
- Deterministic Finite Automata (DFA)
- Nondeterministic Finite Automata (NFA)
- Equivalence of DFA and NFA
- Regular expressions and their languages
- Regular grammar
- Pumping Lemma for regular languages
- Context-Free Grammars, Parse trees
- Ambiguity in grammars
- Simplification of CFG, Normal forms: CNF and GNF
- Definition and model
- Acceptance by final state and empty stack
- Equivalence of PDA and CFG
- Turing Machine definition and types
- Halting problem, Unsolvable problems
- Chomsky hierarchy