TYBFM Sem 6 Syllabus: Computer Applications in Financial Services

financial services

If you are looking for TYBFM Sem 6 Syllabus of Computer Applications in Financial Services, then your search ends here as we present the main units, chapters and topics covered in each unit.


  • The topics of Unit I and Unit II are expected to provide an introduction. They should be taught mostly at conceptual level

  • Unit III is expected to be taught in the light if Information Technology

  • Unit IV is expected to be taught through mainly by demonstrations and support of practical

Unit – I : Data Communication & Networking

  • Introduction.

  • The Growth of Networking Technology: Modern Benefits of Networking , Data  Sharing , Resource Sharing . The Development of Computer Networking . Life before Networking Early Connections, Modern Networking,. TCP/IP model, OSI Model.

  • Data Communications Technology: Introduction to Analog and Digital Signals,  Analog and Digital technology.

  • Local Area Networks: Network Topologies, Point-to-point Topology, Bus Topology, Star Topology, Ring Topology, Mesh Topology, Special Topology.

  • Components: Workstation, Network Interface Cards, Hubs, Peripherals.,

  • Different types of Transmission Media in Networking: Twisted Pair Cabling,

  • Coaxial Cable, Fiber Optic Cable, Wireless Media, Radio, and Infrared.

  • Connectivity: Repeaters, Bridges, Routers, Gateways.

  • Wide Area Networking: Switching Technology, Mete Switching, Packet  Switching Circuit Switching.

Unit – II : Computer Security

  • Introduction: Security, Attacks, Computer Criminals, Method of Defence

  • Security in Networks : Threats in Networks , Network Security Control , Firewalls Intrusion detection Systems, Secure E mail , Concept of Encryption & decryption

  • Legal ,Privacy &  Ethical Issues in Computer Crime , Privacy , Ethical Issues in Computer Society

  • Network Security: Introduction & Need for Security , Authentication , Access Control, Server Logs, Virus Protection Firewalls, Intrusion Detection System & VPN

  • Cyber Laws

Unit – III : Databases

  • Introduction to Database Concepts: Database systems Vs Files systems, View of Data , Data models, Data abstraction, Data Independence, Three level Architecture, Database Design,  Database Language – Data Definition Language (DDL), Data Manipulation Language (DML)

  • E -R Model: Basic Concepts, Keys, E – R Diagram, Design of E – R Diagram Scheme (Simple  Example)

  • Introduction to Access, Creating Databases ,Tables (Relations) ,Rows (Tuples) ,Domains, Attribute Candidate Keys Primary  Key, Queries, Forms

Unit – IV : Visual Basic

  • Introduction to Visual Basic Programming

  • What is Visual Basic ? Terminology ,Creating & Application, Modular Environment, Building an Application, Setting Properties of Objects, Forms, Introduction to Controls, Object – Based , Event Driven, Programming Coding

  • Examining Code, Using the Object Browser, Statements & Functions, Conditional Statements in Visual Basic, Looping Statements, Overview of Debugging

  • Forms : Using Forms, Multiple Forms, Order of Events, Start up & End of Applications

  • Variables : Data types, Scope & Lifetime of Variables, Constants, Arrays & User Defined Types Procedures

  • Introduction to Procedures, Arguments & Parameters, Named Arguments & Optional Arguments

  • Controls: Using Controls, Standard Controls, Custom Controls

  • Menus : Creating & Documenting Naming Standards. Customs Pop – up menus

  • Error Handling : An Introduction to Error Handlers

  • Record Sets: Choosing ADO or DAO, Adding Data ,Editing Data , Deleting Data

  • Building Active  X Controls: Creating A Data – Bound Control , Creating a Data Source Control, .net

About BFM team

We, at BFM.co.in, believe in sharing knowledge and giving quality information to our BFM students. We are here to provide and update you with all the details required by you BFMites!
No comments yet.

Leave a Reply

WhatsApp chat