CLASS XI  INFORMATICS PRACTICES (Python)
# AS PER CBSE SYLLABUS

Unit 1: Introduction Python Programming

  • Basics of Python programming
  • Barebones of Python Programs
  • Python Character Set, Token & Identifiers, Keywords, Literals, Delimiters, Operators
  • Basic concepts of Flowchart
  • Data Handling
  • Data-types (integer, float, string, etc.)
  • Mutable and Immutable Data types (Lists, tuples and dictionary)
  • Operators & types (Binary operators, Arithmetic, Relational operators, Logical Operators,
    Augmented Assignment operators, etc.)
  • Expressions (Evaluation, Typecasting)
  • Use of Comments (Single line & Multiline/ Continuation statements)
  • Debugging of Python Programs
  • Errors and exceptions
  • Debugging Tools (pdb, break points)
  • Conditional and Iterative Statements
  • Conditional Statement (if, if-else, if-elif-else)
  • Iterative statement (while, for)
  • Loop Else statement
  • Jump statement (break, continue)
  • Nested Loops
  • range(), len() function
  • Text Handling (String Manipulation)
  • Traversing, Compare, Concatenation, Substring
  • Comparison Operators
  • String Slices
  • List Manipulation
  • Creating and accessing Lists
  • List Operations (Joining, Repeating, Replicating)
  • List Functions and Methods
  • Dictionaries
  • Creating, accessing elements and characteristics of Dictionary
  • Dictionary Operations (Adding elements, Updating and deleting elements, checking for key, Pretty printing)
  • Dictionary Functions and Methods
  • Working with Standard Library Modules
  • Working with Math Module
  • Using Random Module
  • Using Statistics Module

Unit 2: Data Handling

  • Working with NumPy
  • NumPy Arrays
  • NumPy Arrays vs. Python Lists
  • NumPy Data Types
  • Creating NumPyArays
  • Creating NumPy 1-D 2-D Arrays
  • Working with NumPy Arrays
  • Accessing individual elements using Array Indexing
  • Array Slices
  • Joining (Concatenating) NumPy Arrays
  • Obtaining Subsets of Arrays
  • Arithmetic Operations on 2D Arrays

Unit 3: Introduction of Computer System

  • Basic computer organization
  • CPU
  • Memory
  • Hard disk
  • Input and Output
  • Storage Units (bit, byte, MB, GB, TB, and PB, etc.)
  • Types of software
  • Application
  • System
  • Utility
  • Information representation
  • Numbers in base 2 (Binary), 8 (Octal), 16 (Hexadecimal)
  • Number Conversion
  • Binary addition
  • Character/Strings Representation
  • ASCII
  • UTF8, UTF32
  • ISCII (Indian script code)
  • Unicode
  • Execution of  a program
  • Concept of Compiler & Interpreter
  • Basic flow of Compilation
  • Role of Operating system in running a program (Operating system as a resource manager)

Unit 4: Data Management

  • Relational databases
  • Database, relations, attributes and tuples
  • Keys (candidate key, primary key, alternate key, foreign key)
  • Degree and cardinality of a table
  • SQL (Structured Query Language)
  • DDL/ DML commands
  • CREATE TABLE
  • INSERT INTO
  • UPDATE TABLE
  • DELETE FROM
  • ALTER TABLE, MODIFY TABLE
  • DROPTABLE
  • Eliminating redundant Data (with keyword Distinct)
  • Using Column Aliases
  • Logical Operators
  • SELECT-FROM WHERE-ORDER BY along with BETWEEN, IN, LIKE
  • Table Creation and Data Manipulation Commands
  • Creating, Opening, Removing Database
  • Data Integrity through Constraints
  • Changing Data with DML Commands (UPDATE, DELETE)
  • DDL Commands (ALTER TABLE, DROP TABLE)
  • MySQL functions
  • String Functions
  • Numeric Functions
  • Date and Time Functions
  • Aggregate functions (MIN, MAX, AVG, COUNT, SUM, etc.)
  • Table Joins and Indexes in SQL
  • Joins
  • Joining more than two Tables
  • Equi Join, Non-Equi Join
  • Natural join
  • Indexes
  • Creation of Indexes in MySQL

Unit 5: Society, Law and Ethics

  • Cyber safety
  • Safely browsing the web
  • Identity protection
  • Confidentiality
  • Cyber Crime
  • Social networks
  • Cyber trolls and bullying
  • Appropriate usage of social networks
  • Online access and Computer Security
  • Threats to Computer security while accessing websites
  • Spyware
  • Adware
  • Viruses
  • Trojans
  • Spamming
  • Cookies
  • Threats while communicating data
  • Secure connections
  • Eavesdropping
  • Phishing and identity verification
  • Solutions to Computer Security Threats
  • Solutions to Viruses, Adware, Spyware
  • Solutions to Spam, Eavesdropping
  • Solutions to PC Intrusion
  • Solutions to Phishing and Pharming Attacks
  • Firewall

 

Quick Contact

Are You Looking For XI (Information Practices) Training ?
Open chat