LESSON PLAN1-cyber Security
LESSON PLAN1-cyber Security
ENGINEERING COLLEGE
Autonomous
(Approved by AICTE, New Delhi, Permanently Affiliated to Anna University, Chennai&
Accredited by National Board of Accreditation (NBA), New Delhi,
National Accreditation Assessment Council, Bangalore& IE(I), Kolkata)
PERUNDURAI, ERODE-638 057
DEPARTMENT OF CSE(AI&ML)
LESSON PLAN
Actually No of
S. Planned Topic to be Methodo ICT Tools
conducted Key terms Objective periods
No. Date covered logy adopted used
date required
UNIT I - LINEAR DATA STRUCTURE – LIST
To know the syllabus
Course Web Resources, PPT
1 14.07.25 of Data structures using Lecturing 1
Orientation Assessment,
C, web resources, Software
Program Scope
Assessment procedure
Abstract Data Separating To define a model of a PPT
2 16.07.25 Types (ADTs), interface from data structure based on Lecturing 1
Software
List ADT implementation behavior
Use contiguous To store list elements
Array-based memory (array) for in a fixed-size PPT
3 18.07.25 Lecturing 1
implementation list implementation continuous memory Software
with fixed size block
Efficient insertion
and deletion To store elements
Linked list PPT
4 18.07.25 operations dynamically using Lecturing 1
implementation Software
without shifting nodes and pointers
elements
Implement
dynamic linear To link nodes in one
Singly linked PPT
5 21.07.25 list with nodes direction using a Lecturing 1
lists Software
pointing to the pointer to the next node
next.
Implement
dynamic linear To link nodes in one
Singly linked PPT
6 23.07.25 list with nodes direction using a Lecturing 1
lists Software
pointing to the pointer to the next node
next.
Last node points
To link the last node
Circularly linked to the head, PPT
7 25.07.25 back to the first, Lecturing 1
lists enabling circular Software
forming a loop
traversal.
Nodes have two To allow bi-directional
Doubly-linked links: one to the traversal using pointers PPT
8 25.07.25 Lecturing 1
lists next and one to to both next and Software
the previous node. previous nodes
Applications of
lists, Polynomial
To create and modify
Manipulation – Insert and delete Assignme
9 28.07.25 polynomials using list - 1
All operations polynomials nt
structures
(Insertion,
Deletion)
Polynomial
Manipulation – To combine two
Add and show PPT
10 30.07.25 All operations polynomials into one Lecturing 1
Polynomials Software
(Merge, by adding like terms.
Traversal)
Content beyond
the Syllabus: Best case,
Algorithms To understand the PPT
11 01.08.25 Average case, Lecturing 1
notations- Time efficiency of algorithm Software
Worst case
complexity
Number of hours specified in the Syllabus: 9
Number of Hours Planned: 10
Number of hours actually conducted:10
Reasons, if any deviation
UNIT II LINEAR DATA STRUCTURES – STACKS, QUEUES
To store and manage
01.08.25 Last In First Out data using the Last In PPT
12 Stack ADT Lecturing 1
(LIFO) Order First Out (LIFO) Software
method
To understand how to
04.08.25 Stack ADT- use a stack with PPT
13 Push,Pop,Peek Lecturing 1
Operations operations like push(), Software
pop(), and peek()
Applications -
To solve math
06.08.25 Evaluating Operator PPT
14 expressions using Lecturing 1
arithmetic precedence Software
stacks
expressions
Conversion of To change a math
08.08.25 Precedence & PPT
15 Infix to postfix expression from infix to Lecturing 1
associativity Software
expression postfix using a stack
To sort elements by
24.10.25 Inserts in correct inserting each new Online
46 Insertion sort - 1
place element into its correct Test
position
Gap-based
24.10.25 To sort data using gap- PPT
47 Shell sort insertion, Reduces 1
based insertion Lecturing Software
comparisons
To sort data by
27.10.25 Pivot-based PPT
48 Quick sort partitioning the array Lecturing 1
partitioning Software
around a pivot
To sort data using a
29.10.25 PPT
49 Merge Sort. Divide and merge divide-and-conquer Lecturing 1
Software
approach
Converts key to To map keys to indices
31.10.25 Hashing- Hash PPT
50 index in a hash table using a Lecturing 1
Functions Software
Fast lookup deterministic function.
Collision resolution To resolve hash
31.10.25 strategies- Separate Multiple keys per collisions by using PPT
51 Lecturing 1
Chaining slot linked lists at each Software
index.
To resolve hash
Finds next empty
03.11.25 Open Addressing , collisions by probing PPT
52 slot, Resize hash Lecturing 1
Rehashing. for next available slot Software
table
in the array.
To implement Radix
Content Beyond Digit-by-Digit Sort and demonstrate PPT
53 03.11.25 the Syllabus: Lecturing 1
Sorting how it efficiently sorts Software
Radix Sort integers
Number of hours specified in the Syllabus: 9
Number of Hours Planned: 11
Number of hours actually conducted:
Reasons, if any deviation
Total no. of Hours 53
Total hours prescribed in the syllabus 45
REFERENCES
1. Narasimha Karumanchi,”Data Structures and Algorithms Made Easy:Data Structures and Algorithmic Puzzles”,
5th Edition, Career Monk, 2016.
2. Debasis Samanta,“Classic Data Structures”, Prentice Hall of India, 2nd Edition, 2014.
3. Seymour Lipschutz,“Data Structures by Schaum Series”,2nd Edition,Tata McGraw Hill, 2013.
4. Thomas H. Cormen, Charles E. Leiserson, Ronald L.Rivest and Clifford Stein, Introduction to Algorithms,
Second Edition, McGraw Hill, 2002.
WEB LEARNING RESOURCES:
1. https://onlinecourses.nptel.ac.in/noc25_cs81/preview, Prof. Nitin Saxena, IIT Kanpur