{"id":50824,"date":"2023-03-22T07:16:20","date_gmt":"2023-03-22T07:16:20","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/cs3351-digital-principles-and-computer-organization-syllabus-for-cyber-security-2021-regulation\/"},"modified":"2023-03-22T07:16:20","modified_gmt":"2023-03-22T07:16:20","slug":"cs3351-digital-principles-and-computer-organization-syllabus-for-cyber-security-2021-regulation","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/cs3351-digital-principles-and-computer-organization-syllabus-for-cyber-security-2021-regulation\/","title":{"rendered":"CS3351: Digital Principles and Computer Organization syllabus for Cyber Security 2021 regulation"},"content":{"rendered":"<p align=\"justify\">Digital Principles and Computer Organization detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna University<\/a> official website and presented for the Cyber Security students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Cyber Security 3rd Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/cyber-security-3rd-sem-syllabus-2021-regulation\">Cyber Security 3rd Sem 2021 regulation scheme<\/a>. The detailed syllabus of digital principles and computer organization is as follows. <\/p>\n<p>  <title>Digital Principles and Computer Organization<\/title><\/p>\n<h4>Course Objectives:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Unit I<\/h4>\n<p>  <strong>COMBINATIONAL LOGIC 9<\/strong> Combinational Circuits &#8211; Karnaugh Map &#8211; Analysis and Design Procedures &#8211; Binary Adder -Subtractor &#8211; Decimal Adder &#8211; Magnitude Comparator &#8211; Decoder &#8211; Encoder &#8211; Multiplexers -Demultiplexers<\/p>\n<h4>Unit II<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Unit III<\/h4>\n<p>  <strong>COMPUTER FUNDAMENTALS 9<\/strong> Functional Units of a Digital Computer: Von Neumann Architecture &#8211; Operation and Operands of Computer Hardware Instruction &#8211; Instruction Set Architecture (ISA): Memory Location, Address and Operation &#8211; Instruction and Instruction Sequencing &#8211; Addressing Modes, Encoding of Machine Instruction &#8211; Interaction between Assembly and High Level Language.<\/p>\n<h4>Unit IV<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Unit V<\/h4>\n<p>  <strong>MEMORY AND I\/O 9<\/strong> Memory Concepts and Hierarchy &#8211; Memory Management &#8211; Cache Memories: Mapping and Replacement Techniques &#8211; Virtual Memory &#8211; DMA &#8211; I\/O &#8211; Accessing I\/O: Parallel and Serial Interface &#8211; Interrupt I\/O &#8211; Interconnection Standards: USB, SATA<\/p>\n<h4>Practical Exercises:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<h4>Course Outcomes:<\/h4>\n<p>  At the end of this course, the students will be able to:<\/p>\n<ol>\n<li>Design various combinational digital circuits using logic gates<\/li>\n<li>Design sequential circuits and analyze the design procedures<\/li>\n<li>State the fundamentals of computer systems and analyze the execution of an instruction<\/li>\n<li>Analyze different types of control design and identify hazards<\/li>\n<li>Identify the characteristics of various memory systems and I\/O communication<\/li>\n<\/ol>\n<h4>Text Books:<\/h4>\n<ol>\n<li>M. Morris Mano, Michael D. Ciletti, Digital Design : With an Introduction to the Verilog HDL, VHDL, and System Verilog, Sixth Edition, Pearson Education, 2018.<\/li>\n<li>David A. Patterson, John L. Hennessy, Computer Organization and Design, The Hardware\/Software Interface, Sixth Edition, Morgan Kaufmann\/Elsevier, 2020.<\/li>\n<\/ol>\n<h4>Reference Books:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p align=\"justify\">For detailed syllabus of all other subjects of Cyber Security, 2021 regulation curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/cyber-security+3rd-sem\">Cyber Security 3rd Sem subject syllabuses for 2021 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Cyber Security results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University Cyber Security all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital Principles and Computer Organization detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the Anna University official website and presented for the Cyber [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[46,158],"tags":[],"class_list":["post-50824","post","type-post","status-publish","format-standard","hentry","category-3rd-sem","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/50824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=50824"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/50824\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=50824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=50824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=50824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}