Lect No.
UNIT
  UNIT I
Introducti
    on        1
              2
              3
              4
              5
              6
              7
              8
              9
 UNIT II     10
 Macro
Processor    11
   and       12
Compiler
    s        13
             14
             15
 Unit-III    16
 Linkers
   and       17
 Loaders     18
             19
             20
             21
Unit-IV
Operating    22
System       23
(OS)
             24
             25
             26
Unit V       27
Synchroni
zation       28
and
Concurre     29
ncy          30
Control
             31
          32
          33
          34
          35
Unit-VI
Memory    36
Manage    37
ment
          38
          39
          40
          41
          42
          43
                                                Topic to be covered
                                                      Registration
Introduction to Systems Programming, Need of Systems Programming, Software Hierarchy,
Types of software: system software and application software
Evolution of components of Systems Programming: Text Editors, Assembler, Macros
Compiler, Interpreter, Loader, Linker, Debugger, Device Drivers, Operating System
Assembly Language Programming: Assembly Language statements, Benefits of Assembly Language
A simple Assembly scheme, Pass Structure of Assembler
Design of two pass Assembler: Processing of declaration statements, Assembler Directives and imperative
statements
Advanced Assembler Directives, Intermediate code forms
Pass I and Pass II of two pass Assembler
Introduction, Features of a Macro facility: Macro instruction arguments
Conditional Macro expansion
Macro calls within Macros, Macro instructions, Defining Macro
Design of two pass Macro processor
Concept of single pass Macro processor
Introduction to Compilers: Phases of Compiler with one example, Comparison of Compiler and Interpreter
Introduction, Loader schemes: Compile and Go
General Loader Scheme, Absolute Loaders
Subroutine Linkages, Relocating Loaders
Direct linking Loaders, Overlay structure
Design of an Absolute Loader,
Design of Direct linking Loader,Self-relocating programs,
Static and Dynamic linking.
Introduction: Evolution of OS, Operating System Services
Functions of Operating System
Process Management: Process, Process States: 5 and 7 state model
Process control block, Threads, Thread lifecycle, Multithreading Model, Process control system calls.
Process Scheduling: Uni-processor Scheduling, Scheduling: Preemptive, Non-preemptive
Long- term, Medium-term, Short term scheduling
Scheduling Algorithms: FCFS, SJF, RR, and Priority.
Concurrency: Principle and issues with Concurrency, Mutual Exclusion
Hardware approach, Software approach, Semaphore
Mutex and monitor, Reader writer problem
Producer Consumer problem, Dining Philosopher problem
Deadlocks: Principle of Deadlock, Deadlock prevention
Deadlock avoidance, Deadlock detection, Deadlock recovery.
Deadlock avoidance, Deadlock detection, Deadlock recovery.
Introduction: Memory Management concepts, Memory Management requirements.
Memory Partitioning: Fixed Partitioning, Dynamic Partitioning, Buddy Systems Fragmentation
Paging, Segmentation, Address translation
Placement Strategies: First Fit, Best Fit, Next Fit and Worst Fit
Virtual Memory (VM): Concepts, Swapping, VM with Paging, Page Table Structure, Inverted Page Table,
Translation Look aside Buffer
Page Size, VM with Segmentation, VM with Combined paging and segmentation.
Page Replacement Policies: First In First Out (FIFO), Last Recently Used(LRU), Optimal,
Thrashing
 Planned Conducte Course BL Level
   Date   d Date Outcome          Remark
                    /s
                 Addresse
                    d
20.722 20.722 CO1         L1
21.722    21.722    CO1   L1
                                 Sachin gadekar was absent
25.7.22   25.7.22   CO1   L1
27.7.22   27.7.22   CO2   L2
                                 Adjustment with Kharde sir
27.7.22   27.7.22   CO2   L2
                                 NASCOM Seminar
28.7.22   28.7.22   CO3   L3
1.8.22    1.8.22    CO3   L3
2.8.22    2.8.22    CO3   L2
2.8.22    2.8.22    CO3   L2
3.8.22    3.8.22    CO3   L2
8.8.22    8.8.22    CO3   L3
10.8.22   10.8.22   CO3   L2
17.8.22   17.8.22   CO3   L3
18.8.22   18.8.22   CO3   L3
18.8.22   18.8.22   CO3   L3
22.8.22   22.8.22   CO3   L3
22.8.22   22.8.22   CO3   L3
23.8.22   24.8.22   CO2   L1
25.8.22   25.8.22   CO3   L3
25.8.22   25.8.22   CO3   L3
25.8.22   25.8.22   CO3   L3
29.8.22   29.8.22
                    CO3   L3
29.8.22   29.8.22
29.8.22   29.8.22
30.8.22   30.8.22
1.9.22    1.9.22
6.9.22    6.9.22
7.9.22    7.9.22                 pedhe Vatap
8.9.22    8.9.22                 pedhe Vatap
13.9.22   13.9.22                Sachin not taken the attendance
15.9.22   15.9.22                Bokil madam Seminar
20.9.22   20.9.22
21.9.22   21.9.22
22.9.22   22.9.22
27.6.22   27.6.22
29.9.22   29.9.22
11.10.22 11.10.22
11.10.22 11.10.22
11.10.22 11.10.22
12.10.22 12.10.22
18.10.22 18.10.22
19.10.22 19.10.22
3.11.22   3.11.22
                                3.9.21/64   17..9.21/65   24.9.21/62
ADSARE GANESH RAJENDRA
AHER AKASH NIMBA
AMBRE RUTUJA JANARDHAN
ARDE SNEHAL GUNGA
AWARI ROHAN BHASKAR
BHALERAO SAMIKSHA SARVOTTAM
BHAVAR SUDARSHAN GOKUL
BHISE AISHWARYA SHIVRAJ
BRAMHANE VIPUL VILAS
CHANDWADE SHUBHAM KALYANSING
DAKHORE RUTUJA CHANDRASHEKHAR
DARADE RUTIK DILIPKUMAR
DAREKAR BHUSHAN SONYABAPU
DIGHE PRANALI DNYANESHWAR
DOKHE DIVYA PRALHAD
DUKRE PUJA SOPAN
GAIKWAD JAYSHRI SURESH
GANDULE PRITAM BHAGWAN
GAVHANE SAURABH KRISHNA
GAYKE SAURABH PRAKASH
GHOLAP ISHWARI VILAS
GHOLAP VAISHNAVI BALASAHEB
GHUGE MONIKA MARUTI
JADHAV AKSHAY GANESH
JADHAV SHRADDHA MUKUND
JAGDHANE PRATIKSHA AVINASH
KADAM SARA DEEPAK
KADU ADARSH VIJAY
KADU PRAJWAL VIKAS
KADU SUPRIYA POPAT
KALE AKSHADA DATTATRAY
KHARAT DIKSHA VASANT
KHARDE SHARAYU SANTOSH
KHOSE SHUBHANGI ANIL
KOLAPKAR MAYURI GANESH
KOLSE NISHA BABASAHEB
KOTHAWADE PIYUSHA PRAMOD
KURHE PRATIK BALASAHEB
KUWAR KETAN CHANDRAKANT
LAGAD PALLAVI SUNIL
LANDE VAIBHAV BHAVRAO
MAGAR HRUSHIKESH SANJAY
MAGAR NIKITA RAMPRASAD
MURGE PRAJAKTA NILKUMAR
NAIKNAWARE CHARUKESH HEMANT
NEMANE AKANKSHA SHIVAJI
NIKAM ANIKET SOPAN
NIMBALKAR ADITI RAJENDRA
PATIL CHANCHAL CHANDU
PATIL SUDARSHAN AMBALAL
PAWANE PRATIK DATTATRAYA
PAWAR SAKSHI KASHINATH
RAHANE PAVAN ARUN
ROKADE DEEKSHA DEEPAK
ROKADE SAMRUDDHI PRAKASH
SABALE RUTIKA SANJAY
SAKAT VISHAL MOHAN
SALVE VIDYA VIJAY
SARODE RENUKA GAJANAN
SAWANT PRACHI ASHOK
SAYYAD ROSHNI ASLAM
SAYYAD TOHID ARIF
SHELKE GANESH SANJAY
SHINDE KARISHMA SHANKAR
SHINDE KETAN LAXMIKANT
SHINDE SAKSHI SUNIL
SHIRSATH SHIVANAND SANDIP
SHITOLE SUJATA DIGAMBAR
SONAWANE NISHA RAJENDRA
SURYANWANSHI PRIYANKA KALYAN
TAMHANE SHRUTI SADANAND
THORAT NIKITA ANNASAHEB
THORAT VAISHNAVI LAHANU
TRIBHUVAN SANDESH BALU
TRIBHUVAN SHWETA SHARAD
TUWAR VINAYAK BHAUSAHEB
VIKHE HARSHADA GITARAM
VIKHE SHUBHAM DILIP
VISHWASRAO VAISHNAVI PRASHANT
WAGH PRANOTI PANDURANG
WAKADE KOMAL RAJENDRA
WARALE ARTI GORAKSHNATH
MORADE RAHUL
Lect No.     UNIT
  UNIT I
Introducti
    on        1
              2
              3
              4
              5
              6
 UNIT II
 Macro        7
Processor     8
   and
Compiler     9
    s        10
             11
             12
 Unit-III    13
 Linkers
   and       14
 Loaders     15
             16
             17
             18
Unit-IV      19
             20
             21
             22
             23
             24
Unit-V       25
             26
             27
             28
             29
             30
             31
Unit-VI
             32
33
34
35
36
                                                   Topic to be covered
                                                       Registration
Introduction and Overview of Cyber Crime
Nature and Scope of Cyber Crime, Types of Cyber Crime: crime against an individual
Crime against property, Cyber extortion
Drug trafficking, cyber terrorism. Need for Information security
Threats to Information Systems, Information Assurance
Cyber Security, and Security Risk Analysis
Unauthorized Access to Computers, Computer Intrusions
Viruses, and Malicious Code, Internet Hacking and Cracking, Virus and worms
Software Piracy, Intellectual Property, Mail Bombs, Exploitation, Stalking and Obscenity in Internet
Cybercrime prevention methods, Application security (Database, E-mail, and Internet), Data Security Considerations-
Backups
Archival Storage and Disposal of Data, Security Technology-Firewall and VPNs
Hardware protection mechanisms, OS Security
What is Computer Forensics?, Use of Computer Forensics in Law Enforcement, Computer Forensics Assistance to
Human Resources/Employment Proceedings
Computer Forensics Services, Benefits of Professional Forensics Methodology
Steps taken by Computer Forensics Specialists Types of Computer Forensics Technology: Types of Military
Computer Forensic Technology
Types of Law Enforcement — Computer Forensic Technology
Types of Business Computer Forensic Technology Computer Forensics Evidence and Capture: Data Recovery Defined
Data Back-up and Recovery, The Role of Back-up in Data Recovery, The Data-Recovery Solution.
Why Collect Evidence? Collection Options ,Obstacles
Types of Evidence — The Rules of Evidence, Volatile Evidence, General Procedure, Collection and Archiving
Methods of Collection, Artifacts, Collection Steps, Controlling Contamination: The Chain of Custody Duplication and
Preservation of Digital Evidence: Preserving the Digital Crime Scene
Computer Evidence Processing Steps, Legal Aspects of Collecting and Preserving Computer Forensic Evidence
Computer Image Verification and Authentication: Special Needs of Evidential Authentication
Computer Evidence Processing Steps, Legal Aspects of Collecting and Preserving Computer Forensic Evidence
Computer Image Verification and Authentication: Special Needs of Evidential Authentication
Practical Consideration, Practical Implementation
Determining what data to collect and analyze, validating forensic data, addressing data-hiding techniques
performing remote acquisitions Network Forensics: Network forensics overview, performing live acquisitions
developing standard procedures for network forensics, using network tools, examining the honeynet project. Processin
Crime and Incident Scenes: Identifying digital evidence
collecting evidence in private-sector incident scenes, processing law enforcement crime scenes
preparing for a search, securing a computer incident or crime scene, seizing digital evidence at the scene
storing digital evidence, obtaining a digital hash, reviewing a case
Evaluating computer forensic tool needs, computer forensics software tools,
computer forensics hardware tools, validating and testing forensics software E-Mail Investigations: Exploring the role
e-mail in investigation
computer forensics hardware tools, validating and testing forensics software E-Mail Investigations: Exploring the role
e-mail in investigation
exploring the roles of the client and server in e-mail
investigating e-mail crimes and violations
understanding e-mail servers, using specialized e-mail forensic tools
 Planned Conducte Course BL Level
   Date   d Date Outcome
                    /s
                 Addresse
                    d
21.7.22 21.7.22 CO1       L1
                                    Sachin gadekar was absent
25.7.22   25.7.22   CO1   L1
25.7.22   25.7.22   CO2   L2
28.7.22   28.7.22   CO3   L3
1.8.22    1.8.22
1.8.22    1.8.22    CO3   L2
2.8.22    2.8.22    CO3   L2
4.8.22    4.8.22    CO3   L3
5.8.22    5.8.22    CO3   L2
5.8.22    5.8.22    CO3   L3
8.8.22    8.8.22    CO3   L3
12.8.22   12.8.22   CO3   L3
18.8.22   18.8.22   CO3   L3
22.8.22   22.8.22   CO3   L3
22.8.22   22.8.22   CO2   L1
23.8.22   23.8.22   CO3   L3
                    CO3   L3
25.8.22   25.8.22
                    CO3   L3
26.8.22   26.8.22
29.8.22   29.8.22
29.8.22   29.8.22
31.8.22   31.8.22
1.9.22    1.9.22
5.9.22    5.9.22
5.9.22    5.9.22
9.9.22    9.9.22
12.9.22   12.9.22
12.9.22   12.9.22
15.9.22   15.9.22
19.9.22   19.9.22
22.9.22   22.9.22
26.9.22   26.9.22
26.9.22   26.9.22
29.9.22    29.9.22
29.9.22    29.9.22
13.10.22 13.10.22
17.10.22   17.10.22
17.10.22   17.10.22
31.10.22   31.10.22
31.10.22   31.10.22
Unit              Chapter                                   Description
                                                Introduction to Embedded systems
 1           Embedded Systems
                                             Characteristics, Challenges,Processors in
                                             Embedded systems ,hardware Unit s and
 1           Embedded Systems                  devices in an embedded system –
 1           Embedded Systems                Power source memory, real-time clocks,
                                              timers, reset circuits, watchdog-timer
 1           Embedded Systems                   reset,Input-output ports, buses and
                                               interfaces, ADC, DAC, LCD, LED
 1           Embedded Systems
                                                    Keypad, pulse dialer,modem,
                                           transceivers,embedded software software are
 1           Embedded Systems                tools for designing an embedded system..
                                           Embedded SOC, ASIC, IP core ,SIP, ASSP,
 1     Embedded System On Chip (SOC)
                                                Advanced architectures,Processor
 1     Embedded System On Chip (SOC)                     organization
                                            Processor selection and memory selection
 2     Embedded System On Chip (SOC)
 2     Embedded System On Chip (SOC)              examples of embedded systems
 2     Embedded System On Chip (SOC)                 Internet enabled systems
 2     Embedded System On Chip (SOC)              Networked embedded systems
 2           I/O Communication                Wireless and mobile system Protocols
 2           I/O Communication Devices and communication buses,types of serial communication
 2           I/O Communication                            Serial protocols
 2           I/O Communication                        RS-485, HDLC, SPI, SCI
 3           I/O Communication                SI, SDIO,ARM bus, Wireless devices
 3           I/O Communication Parallel ports and interfacing. Parallel device protocols: ISA, PCI
 3                            Introduction to real-time operating ,Temporal parameters of real-time
         Real Time Operating System
 3       Real Time Operating System      Types of real-time tasks Functional parameters
 3       Real Time Operating System        Resource parameters
3   Real Time Operating System              Real-time task and task states
3   Real Time Operating System               priority-driven- Fixed priority
3   Real Time Operating System                  Earliest-Deadline-First
4   Inter-process communication        Static and Dynamic systems,Resources
4   Inter-process communication      and resource access control
4   Inter-process communication    Enforcing mutual exclusion shared data problem
4   Inter-process communication             Effects of resource contention
4   Inter-process communication             Inter-process communication
4                         mailboxes and pipes Other RTOS services-Timer function Interrupts
    Inter-process communication
4    Multiprocessor Scheduling                Multiprocessor Scheduling
4    Multiprocessor Scheduling                Real-time communication
5    Multiprocessor Scheduling            Medium access-control protocols
5                   Software development process ,mplementation aspects in an embedded system
     Multiprocessor Scheduling
5                        Validation and debugging of embedded systems Debugging techniques
     Multiprocessor Scheduling
                Actual Date     Time       Proposed Date   Course Outcomes
                  3.11.22                     3.11.22
                              2.15-3.10                          1
                  4.11.22                     4.11.22
                              12.15-1.15                         1
                  7.11.22                     7.11.22
                              4.05-5.00                          1
serial communication                                             2
e protocols: ISA, PCI                                            3
parameters of real-time                                          3
parameters                                                       3
                                                                 3
                              3
 data problem                 4
mer function Interrupts       4
 ects in an embedded system   5
 s Debugging techniques       5
Program Outcomes
     1,2,4
     1,2,4
     1,2,4
     1,2,4
     1,2,4
     1,2,4
     1,2,4
     1,2,4
    1,2,3,4,5
    1,2,3,4,5
    1,2,3,4,5
    1,2,3,4,5
    1,2,3,4,5
    1,2,3,4,5
    1,2,3,4,5
    1,2,3,4,5
       1
 1
1,2,3
1,2,3
1,2,3
1,2,3
1,2,3
1,2,3
1,2,3
1,2,3
2,5
2,5
2,5