Operating System - Syllabus
Embark on a profound academic exploration as you delve into the Operating System course (OS) within the distinguished Tribhuvan university's BCA department. Aligned with the BCA Curriculum, this course (CACS251) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60 + 20 + 20 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.
This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.
Course Description
This course includes the topics that help students understand operating system and it's functionality along with its types.
Course Objectives
The general objectives of this subject are to provide the basic feature, function and interface with the hardware and application software to run the computer smoothly.
Units
Key Topics
-
Introduction to Computers
IN-01An overview of computers and their significance in today's world. This topic sets the stage for understanding the basics of computers.
-
Digital and Analog Computers
IN-02Understanding the difference between digital and analog computers, their characteristics, and applications.
-
Characteristics of Computers
IN-03Exploring the key characteristics of computers, including input, processing, storage, and output.
-
History of Computers
IN-04A brief history of computers, from their inception to the present day, highlighting key milestones and developments.
-
Generations of Computers
IN-05Understanding the different generations of computers, including their features, advantages, and limitations.
-
Classification of Computers
IN-06Categorizing computers based on their size, functionality, and application, including desktops, laptops, and mobile devices.
Key Topics
-
Search Engine Optimization
OP-1Understanding how to optimize e-commerce systems for search engines to improve visibility and drive traffic. This includes understanding how search engines work and techniques to improve search engine rankings.
-
Working Mechanism of Search Engines
OP-2In-depth understanding of how search engines crawl, index, and retrieve data to provide search results. This topic covers the inner workings of search engines.
-
On Page SEO
OP-3Optimizing individual web pages to improve search engine rankings. This includes techniques such as keyword optimization, meta tags, and content optimization.
-
Off Page SEO
OP-4Building a website's reputation and authority through external factors such as backlinks, social media, and online reputation management.
-
Page Ranks
OP-5Understanding how search engines rank web pages and the factors that influence page ranking. This includes understanding Google's PageRank algorithm.
-
Using Google Analytics
OP-6Understanding how to use Google Analytics to track website traffic, behavior, and conversion rates to inform e-commerce optimization decisions.
-
Social Media Analytics
OP-7Understanding how to use social media analytics to track engagement, sentiment, and conversion rates to inform e-commerce optimization decisions.
Key Topics
-
Project Management Techniques
PR-1This topic covers various project management techniques used to plan, organize, and control projects. It includes developing project management plans and implementing, monitoring, and controlling projects.
-
Collaborative Development Environment
PR-2This topic focuses on creating an environment that fosters collaboration and teamwork. It includes communications planning, organizing and conducting effective meetings, and other collaborative development strategies.
-
Inter Process Communication
PR-3Methods of communication between processes, including race conditions and critical sections.
-
Implementing Mutual Exclusion
PR-4Techniques for achieving mutual exclusion, including busy waiting, sleep and wakeup, semaphores, monitors, and message passing.
Key Topics
-
Designing Databases
DE-1This topic covers the fundamentals of designing databases, including the relational database model, normalization, and transforming E-R diagrams into relations.
-
Designing Forms and Reports
DE-2This topic focuses on designing forms and reports, including formatting and assessing usability to create effective user interfaces.
-
Designing Interfaces and Dialogues
DE-3This topic explores the design of interfaces and dialogues, including interaction methods and devices, and designing interfaces and dialogues in graphical environments.
-
Implementation Issues
DE-4Addressing common challenges and considerations that arise during the implementation phase of software development.
-
Open-Source Development
DE-5Exploring the principles, benefits, and best practices of open-source software development.
-
Estimation of Missing Values
DE-6Methods for estimating missing values in experimental designs, including CRD and RBD.
-
Advantages and Disadvantages of CRD and RBD
DE-7Discussion of the benefits and drawbacks of Completely Randomized Design (CRD) and Randomized Block Design (RBD).
-
Latin Square Design (LSD)
DE-8A type of experimental design that accounts for two blocking factors to reduce variability.
-
Statistical Analysis of LSD
DE-9Methods for analyzing data from a Latin Square Design (LSD) experiment.
-
Efficiency of LSD relative to RBD
DE-10Comparison of the efficiency of Latin Square Design (LSD) and Randomized Block Design (RBD).
-
Advantages and Disadvantages of LSD
DE-11Discussion of the benefits and drawbacks of Latin Square Design (LSD).
-
Recovery from Deadlock
DE-12Recovery from deadlock involves aborting and restarting processes to recover from a deadlock. This can be done using various techniques, including process termination and resource deallocation.
Basic Memory Management: Introduction, Memory Hierarchy, Logical Versus Physical Adress Space, Memory Management with Swapping: Memory Management with Bitmaps and with Linked List; Memory Management without Swapping, Contigous-Memory Allocation: Memory Protection, Memory Allocation, Fragmentation(Inter Fragmentation and External Fragmentation); Mom-Contiguous Memory Allocation, Fixed Partitioning Vs. Variable Partitioning, Relocation and Protection, Coalescing and Compaction.
Virtual Memory: Background, Paging, Structure of Page Table: Hierarchical Page Table, Hashed Page Table, Inverted Page Table, Shared Page Table, Block Mapping Vs. Direct Mapping, Demand Paging, Page Replacement and Page Faults, Page Raplacement Algorithms:FIFO,OPR,LRU, SCP; Some Numerical Examples on Page Replacement, Thrashing, Segementation, Segmentation With Paging.
Principle of I/O Devices, Device Controllers, Memory Mapped I/O, Direct Memory Acess; Principle of I/O Software: Goals of I/O Software, Program I/O, Interrupt - Driven I/O, I/O Using DMA; I/O Software Layers: Interrupts Handler, Device Drivers, Device Independent I/O Software, User-Space I/O Software; Disk Hardware; Disk Scheduling: Seek Time, Rational Delay, Transfer Time; Disk Scheduling Algorithms: FCFS Scheduling, SSTF Scheduling, SCAN Scheduling, C-SCAN Scheduling, Lock Scheduling
File Concept: File Naming, File Type, File Access, File Attributes, File Operation and File Operation and File Descriptors: Ddirectories: Single-Level Directory Systems, Hierarchical Directory Syatems, Patth Names, Directory Operation; Access Methods: Sequential, Directory Operation; Access methods: Sequntial, Direct; Protection: Types of Acess Control List, Access Control Matrix
Key Topics
-
Real-Time Bidding
DI-10A type of programmatic advertising that enables the buying and selling of online advertising inventory in real-time.
-
E-mail Marketing
DI-11Using email to promote products or services, including email campaign strategy, creation, and optimization.
-
Distributed Database Concepts
DI-1Introduction to distributed database concepts and their advantages.
-
Data Fragmentation, Replication and Allocation
DI-2Techniques for data fragmentation, replication, and allocation in distributed databases.
-
Distributed Database Design Techniques
DI-3Methods and approaches for designing distributed databases.
-
Types of Distributed Database Systems
DI-4Overview of different types of distributed database systems.
-
Distributed Database Architectures
DI-5Introduction to various architectures used in distributed databases.
-
Introduction to NOSQL Systems
DI-6Overview of NOSQL systems and their characteristics.
-
The CAP Theorem
DI-7Understanding the CAP theorem and its implications on NOSQL systems.
-
Document-based NOSQL Systems
DI-8Introduction to document-based NOSQL systems and their features.
-
Key-value Stores
DI-9Understanding key-value stores and their use cases.
Key Topics
-
Nepalese E-Governance Initiatives
CA-001E-Governance initiatives in Nepal, including Cyber Laws, Implementation in the Land Reform, Human Resource Management Software.
-
India's NICNET
CA-002India's National Informatics Centre Network (NICNET) and its role in E-Governance.
-
Collectorate and CARD
CA-003Computer-aided Administration of Registration Department (CARD) and Collectorate initiatives in India.
Lab works
Laboratory Works
Lab works should be done covering all the topics listed above and a small project work should be carried out using the concept learnt in this course. Project should be assigned on Individual Basis.