Presentation Idea
Group 1. Inside the Case, The Motherboard, Processors, The Control Unit, The Arithmetic Logic Unit,
Machine Cycle, Registers, The System Clock, Personal Computer and Mobile Device Processors, Processor
Cooling, The Internet of Things, Cloud Computing, Cloud Computing Services, Memory, Bytes and Addressable
Memory, Types of Memory, RAM, Cache, ROM, Flash Memory, CMOS, Memory Access Times, Adapters,
Adapter Cards, USB Adapters, Buses, Bus Width, Types of Buses, Power Supply and Batteries, Data Representation
& Number System
Group 2. Programs and Apps, Role of the Operating System, Obtaining Software, Installing Software,
Categories of Programs and Apps, Multimedia and Interest Applications, Communications Applications, File, Disk,
and System Management Tools
Group 3. Operating Systems, Operating System Functions, Starting Computers and Mobile Devices, Shutting
Down Computers and Mobile Devices, providing a User Interface, Managing Programs, Managing Memory, Types
of Operating Systems, Desktop Operating Systems, Windows/Mini Feature, Mac OS/Mini Feature, Unix, Linux,
Chrome Os, Running Multiple, Systems, Android, iOS, Windows Phone Mobile versus Desktop Operating Systems
Group 4. Communications, Networks, LANs, MANs, WANs, and PANs, Network Architectures,
Communications Software, Communications Network, Communications Standards and Protocols Communications
Lines, Transmission Media, Physical Transmission Media, Twisted Pair Cable, Coaxial Cable, Fiber-Optic Cable,
Wireless, Infrared, Broadcast Radio, Cellular Radio, Microwaves
Group 5. Digital Security Ethics, and Privacy: Threats, Issues, and Defenses Digital Security Risks,
Cybercrime, Internet and Network Attacks Malware, Botnets, Encryption, Digital Signatures and Certificates,
Hardware Theft, Vandalism, and Failure
Group 6. Backing Up — The Ultimate Safeguard, Wireless Security, Ethics and Society, Information
Accuracy, Intellectual Property Rights, Codes of Conduct, Cookies, Phishing, Spyware and Adware, Social
Engineering, Privacy Laws, Employee Monitoring, Content Filtering
Group 7. What is database and database management system, Evolution of database management, Data
Concepts and Characteristics, Data Organization
Group 8. Operating Systems, Operating System Functions, Starting Computers and Mobile Devices, Shutting
Down Computers and Mobile Devices, providing a User Interface, Managing Programs, Managing Memory
Assignment 3
Assignment Summary
You are tasked with conducting an advanced investigation into the design, operation, and optimization of modern
communication networks, encompassing LANs, MANs, WANs, and PANs. The assignment requires an in-depth
comparative evaluation of OSI and TCP/IP architectures, emphasizing protocol behavior and real-world constraints
in large-scale distributed systems. You must architect a high-performance, fault-tolerant smart campus network
using IPv6 and IoT-enabled nodes, integrating hybrid transmission techniques. A critical analysis of physical
transmission media—fiber optics, twisted pair, and coaxial cables—will be conducted using signal propagation
models and bandwidth-delay equations. Additionally, you will evaluate the electromagnetic and spectral properties
of wireless transmission channels, including microwave, infrared, cellular radio, and satellite-based systems, through
the lens of modulation theory, Doppler shift, and line-of-sight limitations. Advanced simulation of traffic dynamics
or hybrid topologies using tools like NS3, MATLAB, or Cisco Packet Tracer is encouraged. The objective is to
demonstrate scientific rigor, technical proficiency, and a systems-level understanding of modern communication
infrastructures.
Grand Project
🔹 1. The Evolution of the Internet & Web Technologies
Objective: Trace the history and growth of the internet and web, from ARPANET to today's cloud-driven web apps.
Deliverables: Timeline infographic, animated video or live demo of how data travels (using simulation), and
comparison of Web 1.0, 2.0, and 3.0.
🔹 2. Cyber Threats & Digital Defense: A Real-Time Awareness Campaign
Objective: Analyze current digital security threats (e.g., phishing, ransomware, social engineering) and demonstrate
countermeasures.
Deliverables: Build a mock website to simulate phishing, develop an awareness brochure, or create an animated
video on malware threats.
🔹 3. Inside the System: A Live Dissection of a Computer
Objective: Explore the internal components of a computer system — motherboard, CPU, RAM, buses, ports.
Deliverables: A dismantled hardware demo, visual charts, and comparison of PC vs mobile device architecture.
🔹 4. From Desktop to Pocket: The Rise of Mobile & Embedded Systems
Objective: Research different computing devices and analyze their evolution, from desktops to wearables and
embedded systems.
Deliverables: A comparative case study with charts, hands-on demo with Raspberry Pi/Arduino (optional), and
feature breakdown.
🔹 5. Smart City Networking: Building an IoT Communication Model
Objective: Develop a conceptual model of a smart city communication infrastructure using LANs, WANs, and
cloud services.
Deliverables: Network diagrams, simulation in Cisco Packet Tracer or GNS3, and analysis of bandwidth & protocol
decisions.
🔹 6. App World: A Deep Dive into Modern Software Ecosystems
Objective: Explore software types (OS, utility, mobile apps, communication tools) and analyze their lifecycle
(development, deployment, updates).
Deliverables: An app review report, mock UI demo using Figma, and analysis of app store trends.
🔹 7. Web 360°: Creating & Navigating a Live Website
Objective: Students will create a basic static or dynamic website and present its structure, hosting, security, and
accessibility practices.
Deliverables: A live mini-site, domain structure breakdown, and security implementation summary (e.g., SSL,
CAPTCHAs).
🔹 8. Data Management for the Digital Age
Objective: Explore the fundamentals of databases, how modern DBMS works, and simulate a student management
system.
Deliverables: A prototype DB (in Access, MySQL, or Google Sheets), ER diagram, and use-case walkthrough.