Modern datacenters rely on virtual infrastructure, and thus demand staff...
Basic Computer Engg.
Course for learning basic computer engineering.
This course covers generic syllabus for Basic Computer Engineering
UNIT I: Computer, Operating System
Definition, Classification, Organisation i.e, CPU, register, Bus Architecture, Instruction set, Memory & Storage System, Input Output Devices, and system and application software. Computer application in e-Business, Bio Information, Health care, Remote Sensing & GIS, Meteorology and Climatology, Computer Gaming, Multimedia and Application etc.
Definition, Function, Types, Management of File, Process & Memory. Introduction to MS word, MS powerpoint, MS Excel.
UNIT II: Programming
Introduction to Algorithms, Complexities and Flowchart, Introduction to Programming, Categories of Programming Languages, Program Design, Programming Paradigms, Characteristics or Concepts of OOP, Procedure Oriented Programming VS object oriented Programming.
Introduction to C++: Character Set, Tokens, Precedence and Associativity, Program Structure, Data Types, Variables, Operators, Expressions, Statements and control structures, I/O operations, Array, Functions.
UNIT III: Object Oriented Programming
Object & Classes, Scope Resolution Operator, Constructors & Destructors, Friend Functions, Inheritance, Polymorphism, Overloading Functions & Operators, Types of Inheritance, Virtual functions. Introduction to Data Structures.
UNIT IV: Computer Networking, Computer Security Basics
Introduction, Goals, ISO-OSI Model, Functions of Different Layers. Internet working Concepts, Devices, TCP/IP Model. Introduction to Internet, World Wide Web, E-commerce.
Introduction to viruses, worms, malware, Trojans, Spyware and Anti-Spyware Software, Different types of attacks like Money Laundering, Information Theft, Cyber Pornography, Email spoofing, Denial of Service (DoS), Cyber Stalking, ,Logic bombs, Hacking Spamming, Cyber Defamation , pharming Security measures Firewall, Computer Ethics & Good Practices, Introduction of Cyber Laws about Internet Fraud, Good Computer Security Habits.
UNIT V: Data base Management System, Cloud computing
Introduction, File oriented approach and Database approach, Data Models, Architecture of Database System, Data independence, Data dictionary, DBA, Primary Key, Data definition language and Manipulation Languages.
Definition, cloud infrastructure, cloud segments or service delivery models (IaaS, PaaS and SaaS), cloud deployment models/ types of cloud (public, private, community and hybrid clouds), Pros and Cons of cloud computing.
|Types of Computers: Based On Operational Principle||00:05:00|
|Types of Computers: Based On Size and Processing Power||00:05:00|
|Types of Computers: Based On Use||00:15:00|
|The Control Unit||00:05:00|
|The Arithmetic/Logic Unit||00:05:00|
|Logical Operations: Testing Conditions||00:10:00|
|Memory And Storage||00:10:00|
|Input Output Devices||00:10:00|
|Use of Computers||00:15:00|
|Functions of an Operating System||00:10:00|
|Types of Operating Systems||00:03:00|
|Process And Memory Management||00:02:00|
|MS Word, MS Excel||00:04:00|
|Unit I Quiz||00:20:00|
|Introduction to C++||00:05:00|
|C++ Character Set||00:02:00|
|Structure of C++ Program||00:05:00|
|Functions in C++||00:10:00|
|Algorithms and Complexity of an Algorithm||00:08:00|
|Types of Programming Languages and Characteristics or Concepts of OOP||00:07:00|
|There Are Several Key Concepts in Object-Oriented Programming (OOP).||00:15:00|
|Difference Between Procedure and Object Oriented Programming Languages||00:05:00|
|Control Structure in C++||00:05:00|
|Unit II Quiz||00:20:00|
|Objects & Classes|
|Scope Resolution Operator||00:05:00|
|Types of Data Structures||00:08:00|
|Virtual Functions,Abstract Class and Pure Virtual Function||00:07:00|
|Function Overloading And Operator Overloading||00:05:00|
|Unit III Quiz||00:20:00|
|Computer Networking & Computer Security|
|Computer Security Basics||00:02:00|
|Trojans, Virus, Worms, Malware, Spyware, Antispyware||00:07:00|
|Denial of Service attacks||00:05:00|
|Cyber Laws in India||00:05:00|
|Good computer security habits||00:09:00|
|Unit IV Quiz||00:11:00|
|Data base Management & Cloud computing|
|Database Management System||00:05:00|
|Relational Data Model||00:07:00|
|Hierarchical Data Model||00:07:00|
|Data Manipulation Language||00:08:00|
|Data Definition Language||00:08:00|
|Cloud Service Models||00:07:00|
|Types of cloud computing||00:09:00|
|Advantages of Cloud Computing||00:08:00|
|Disadvantages of Cloud Computing||00:09:00|
|Unit V Quiz||00:20:00|
No Reviews found for this course.