# AS PER CBSE SYLLABUS
Unit 1: Computational Thinking and Programming
- Basics of Python programming, Barebones of Python Programs
- Python Character Set, Token & Identifiers, Keywords, Literals, Delimiters, operators
- Variables and Assignments
- Data Handling
- Data-types (integer, float, string, etc.)
- Mutable and Immutable Data types (Lists, tuples and dictionary)
- Operators
- Binary operators, Arithmetic, Relational operators
- Logical Operators, Augmented Assignment operators, etc.
- Use of Comments (Single line & Multiline/ Continuation statements)
- Conditional and Iterative Statements
- Conditional Statement (if, if-else, if-elif-else)
- Iterative statement (while, for)
- Loop Else statement
- Jump statement (break, continue)
- Nested Loops
- range(), len() function
- String Manipulation
- Traversing, Compare, Concatenation, Substring
- String Operators (Basic Operators, Comparison Operators etc.)
- String Slices, String Functions and methods
- Debugging of Python Programs
- Errors and exceptions
- Debugging Tools (pdb, break points)
- List Manipulation
- Creating and accessing Lists
- List Operations (Joining, Repeating, Replicating)
- List Functions and Methods
- Tuples
- Creating and accessing Tuples
- Tuple Operations (Joining, Slicing)
- Tuple Functions and Methods
- Dictionaries
- Creating, accessing elements and characteristics of Dictionary
- Dictionary Operations
- Adding, Updating and deleting elements
- Checking for key, Pretty printing
- Dictionary Functions and Methods
- Sorting
- Bubble sort
- Insertion sort
- States and Transition
- States, Transition and Diagrams
- Introduction to Python modules
- Importing math (sqrt, cell, floor, pow, fabs, sin, cos, tan)
- random (random, randint, randrange)
- statistics (mean, median, mode) modules
Unit 2: Computer System and Organization
- Basic computer organization
- CPU
- Memory
- Hard disk
- Input and Output
- Storage Units (bit, byte, MB, GB, TB, and PB, etc.)
- System Bus
- Types of software
- Application
- System
- Utility
- Information (Data) representation
- Numbers in base 2(Binary), 8(Octal), 16(Hexadecimal)
- Number Conversion
- Binary addition
- Character/Strings Representation
- ASCII
- UTF8, UTF32
- ISCII (Indian script code)
- Unicode
- Boolean logic
- Logic Gates (OR, AND, NAND, NOR, XOR, NOT)
- Truth Tables
- Postulates of Boolean Logic
- Principle of Duality
- Basic Theorems of Boolean Algebra
- De Morgan’s laws
- Simplifying a Boolean Expression
- Basic concepts of Flowchart
- Execution of a program
- Concept of Compiler & Interpreter
- Basic flow of Compilation
- Role of Operating system in running a program
- (Operating system as a resource manager)
- Concept of cloud computing, cloud (public/private)
- Introduction to parallel computing
Unit 3: Data Management
- Relational databases
- Database, relations, attributes and tuples
- Keys (candidate key, primary key, alternate key, foreign key)
- Degree andcardinality of a table
- SQL (Structured Query Language)
- DDL/ DML commands
- CREATE TABLE
- INSERT INTO
- UPDATE TABLE
- DELETE FROM
- ALTER TABLE
- MODIFY TABLE
- DROPTABLE
- Eliminating redundant Data (with keyword Distinct)
- Using Column Aliases
- Logical Operators
- SELECT-FROMWHERE-ORDER BY along with BETWEEN, IN, LIKE
- MySQL functions
- String Functions
- Numeric Functions
- Date and Time Functions
- Aggregate functions (MIN, MAX, AVG, COUNT, SUM)
- Table Joins and Indexes in SQL
- Joins
- Joining more than two Tables
- Equi Join
- Non-Equi Join
- Natural join
- Indexes
- Creation of Indexes in MySQL
- Basics of NoSQL databases
- Types of NoSQL databases
- Working with MongoDB
- CRUD Operations in MongoDB (Create, Read, Update, Delete)
Unit 4: Society, Law and Ethics – Cyber safety
- Cyber safety
- Safely browsing the web, Identity protection
- Confidentiality
- Social networks
- Cyber Crime, Cyber trollsand bullying
- Appropriate usage of social networks
- Online access and Computer Security
- Threats to Computer security while accessing websites
- Spyware, Adware
- Viruses, Trojans
- Spamming, Cookies
- Solutions to Computer Security Threats, Firewall
- Threats while communicating data
- Secure connections
- Eavesdropping
- Phishing and identity verification