DR MPS MEMORIAL
COLLEGE OF BUSINESS STUDIES, AGRA
INSTRUCTIONAL PLAN (MODIFICATION PROPOSED – SUBJECT TO STUDENTS PARTICIPATION
AND INTERACTION)
Faculty: Pawan Kumar Gupta
ALLOCATED LECTURES ARE BASED ON STUDENT INTERACTION AND PARTICIPATION.
SESSIONS REQUIRED MAY VARY, DEPENDING ON CLASS ATTENDANCE AND STUDENT
INVOLVEMENT.
LAST SESSION TOOK 45 LECTURES TO COMPLETE THE SYLLABUS.
First Semester: Aug 2015
Course No. _NMBA IT 02___ Course Title: __SYSTEM ANALYSIS & DESIGN AND
SOFTWARE ENGINEERING
Textbook: ( Book Bank – Given to Student )
1.
Elish m. Awad-System Analysis & Design
Other specific Books: (Reference)
1. Shah-Software Engineering & SAD(Wiley Dreamtech)
2. Kenneth E Kendall and Julie E Kendall – SAD (PHI Publication, 7 Ed.)
3. Singh B –Network Security (PHI Publication, 1st Ed.)
Detailed Plan for Lectures:
Lecture No.
Each
Lecture of
45 Minutes
Duration
1-4
Topic
Systems Concept; Characteristics of a System; Elements of System
5-7
7-11
12-13
14-16
Types of Systems; Decision Support System
System Development Life Cycle, Investigation, Analysis, Design,
Implementation, Post Implementation Review and Maintenance
Systems Planning and Investigation
Basis for Planning in Systems Analysis - Dimensions of Planning, Initial
Investigation, Needs Identification
Chapters/
Sections of
Textbook/ Other
Reference
Ref 1
Ref 1
Ref 1
Ref 1
Ref 1
1
17
18-20
21-22
23-26
Determining the User's Information Requirements
Feasibility Study, Feasibility Considerations
Steps in Feasibility Analysis - Feasibility Report.
Ref 1
Ref 1
Ref 1
27-30
31-33
34-35
36-38
39-41
42-43
44-45
Tools of Structured Analysis : Data Flow Diagram (DFD)
Entity Relationship Diagrams, Data Dictionary
Process Modeling : Structured English, Decision Tree & Decision Table
Object Oriented Analysis (OOA) and Object Oriented Design (OOD)
Ref 1
Ref 1
Ref 1
Basics of Information Security, Types of Attacks, Viruses, Virus Control,
Hackers
Overview of Risks associated with Internet, Intrusion Detection Risk
Management ,
Disaster Recovery Plan, Cryptography and authentication, Managing Risk
Information Security Policy, Creating a secure environment, Internet
Security Standards
Notes Given to
Students
Notes Given to
Students
Notes Given to
Students
Notes Given to
Students
Notes Given to
Students
Details of Assignments Planned:
Assignment 1:-
PPT’s:-
1.
System Development Life Cycle
2.
Tools of Structured Analysis
3.
Entity Relationship Diagrams
Assignment 2:-
PPT’s:-
1.
Information Security, Types of Attacks, Viruses, Virus Control, Hackers
2.
Disaster Recovery Plan, Cryptography and authentication
3.
Internet Security Standards
2
Scheme for Class Assessment: (out of 50):
INT. EXAM {A} ATTENDENCE {B} TEACHER ASSESMENT {C}
30 10 10
Note: Students are suggested to solve last 3 Years University Question Paper.
TOTAL MARKS=A+B+C
50
3