A | B | C | D | E | F | |
---|---|---|---|---|---|---|
1 | Course | In short | ||||
2 | BSc (Hon) in Computing | C | ||||
3 | BSc (Hon) in Ethical Hacking and Cyberseurity | E | ||||
4 | ||||||
5 | Intake Cycle | In short | ||||
6 | March | M | ||||
7 | September | S | ||||
8 | ||||||
9 | Intake Year (Last two digit of Year) | YY | ||||
10 | ||||||
11 | Stage | In short | ||||
12 | Stage 1 | S1 | ||||
13 | Stage 2 | S2 | ||||
14 | Stage 3 | S3 | ||||
15 | ||||||
16 | Semester | In short | ||||
17 | Semester 1 | s1 | ||||
18 | Semester 2 | s2 | ||||
19 | ||||||
20 | Section | A, B, C, D so on | ||||
21 | ||||||
22 | EXAMPLE | |||||
23 | CM-20-A (S1s2) | BSc (Hon) in Computing | 2020 | Stage 1 | Semester 2 | Section A |
24 | EM-20 (S1s2) | BSc (Hon) in Ethical Hacking and Cyberseurity | 2020 | Stage 1 | Semester 2 | |
25 | ||||||
26 | Batch 23 CODE | TP3-CM-20 (S3S2) | ||||
27 | 23A | TP3-CM-20-A | ||||
28 | 23B | TP3-CM-20-B | ||||
29 | Batch 24,25 CODE | TP2-CS-19 (S3S1) | ||||
30 | 24A | TP2-CS-19-A | ||||
31 | 24B | TP2-CS-19-B | ||||
32 | 25A | TP2-CS-19-C | ||||
33 | 25B | TP2-CS-19-D | ||||
34 | 25C | TP2-CS-19-E | ||||
35 | 25D | TP2-CS-19-F | ||||
36 | Batch 26(Computing) CODE | CM-19 (S2S2) | ||||
37 | 26A | CM-19 | ||||
38 | Batch 26 (Ethical) CODE | EM-19 (S2S2) | ||||
39 | 26B | EM-19 | ||||
40 | Batch 27 (Computing) CODE | CS-19 (S2S1) | ||||
41 | 27A | CS-19-A | ||||
42 | 27C | CS-19-B | ||||
43 | 27E | CS-19-C | ||||
44 | 27F | CS-19-D | ||||
45 | Batch 27 (Ethical) CODE | ES-19 (S2S1) | ||||
46 | 27B | ES-19-A | ||||
47 | 27D | ES-19-B | ||||
48 | 27G | ES-19-C | ||||
49 | Batch 28 (Computing) CODE | CM-20 (S1S2) | ||||
50 | 28A | CM-20-A | ||||
51 | 28B | CM-20-B | ||||
52 | Batch 28 (Ethical) CODE | EM-20 (S1S2) | ||||
53 | 28C | EM-20 |