# AS PER CBSE SYLLABUS
Unit 1: Introduction Python Programming
- Basics of Python programming
- Barebones of Python Programs
- Python Character Set, Token & Identifiers, Keywords, Literals, Delimiters, Operators
- Basic concepts of Flowchart
- Data Handling
- Data-types (integer, float, string, etc.)
- Mutable and Immutable Data types (Lists, tuples and dictionary)
- Operators & types (Binary operators, Arithmetic, Relational operators, Logical Operators,
Augmented Assignment operators, etc.) - Expressions (Evaluation, Typecasting)
- Use of Comments (Single line & Multiline/ Continuation statements)
- Debugging of Python Programs
- Errors and exceptions
- Debugging Tools (pdb, break points)
- Conditional and Iterative Statements
- Conditional Statement (if, if-else, if-elif-else)
- Iterative statement (while, for)
- Loop Else statement
- Jump statement (break, continue)
- Nested Loops
- range(), len() function
- Text Handling (String Manipulation)
- Traversing, Compare, Concatenation, Substring
- Comparison Operators
- String Slices
- List Manipulation
- Creating and accessing Lists
- List Operations (Joining, Repeating, Replicating)
- List Functions and Methods
- Dictionaries
- Creating, accessing elements and characteristics of Dictionary
- Dictionary Operations (Adding elements, Updating and deleting elements, checking for key, Pretty printing)
- Dictionary Functions and Methods
- Working with Standard Library Modules
- Working with Math Module
- Using Random Module
- Using Statistics Module
Unit 2: Data Handling
- Working with NumPy
- NumPy Arrays
- NumPy Arrays vs. Python Lists
- NumPy Data Types
- Creating NumPyArays
- Creating NumPy 1-D 2-D Arrays
- Working with NumPy Arrays
- Accessing individual elements using Array Indexing
- Array Slices
- Joining (Concatenating) NumPy Arrays
- Obtaining Subsets of Arrays
- Arithmetic Operations on 2D Arrays
Unit 3: Introduction of Computer System
- Basic computer organization
- CPU
- Memory
- Hard disk
- Input and Output
- Storage Units (bit, byte, MB, GB, TB, and PB, etc.)
- Types of software
- Application
- System
- Utility
- Information representation
- Numbers in base 2 (Binary), 8 (Octal), 16 (Hexadecimal)
- Number Conversion
- Binary addition
- Character/Strings Representation
- ASCII
- UTF8, UTF32
- ISCII (Indian script code)
- Unicode
- Execution of a program
- Concept of Compiler & Interpreter
- Basic flow of Compilation
- Role of Operating system in running a program (Operating system as a resource manager)
Unit 4: Data Management
- Relational databases
- Database, relations, attributes and tuples
- Keys (candidate key, primary key, alternate key, foreign key)
- Degree and cardinality of a table
- SQL (Structured Query Language)
- DDL/ DML commands
- CREATE TABLE
- INSERT INTO
- UPDATE TABLE
- DELETE FROM
- ALTER TABLE, MODIFY TABLE
- DROPTABLE
- Eliminating redundant Data (with keyword Distinct)
- Using Column Aliases
- Logical Operators
- SELECT-FROM WHERE-ORDER BY along with BETWEEN, IN, LIKE
- Table Creation and Data Manipulation Commands
- Creating, Opening, Removing Database
- Data Integrity through Constraints
- Changing Data with DML Commands (UPDATE, DELETE)
- DDL Commands (ALTER TABLE, DROP TABLE)
- MySQL functions
- String Functions
- Numeric Functions
- Date and Time Functions
- Aggregate functions (MIN, MAX, AVG, COUNT, SUM, etc.)
- Table Joins and Indexes in SQL
- Joins
- Joining more than two Tables
- Equi Join, Non-Equi Join
- Natural join
- Indexes
- Creation of Indexes in MySQL
Unit 5: Society, Law and Ethics
- Cyber safety
- Safely browsing the web
- Identity protection
- Confidentiality
- Cyber Crime
- Social networks
- Cyber trolls and bullying
- Appropriate usage of social networks
- Online access and Computer Security
- Threats to Computer security while accessing websites
- Spyware
- Adware
- Viruses
- Trojans
- Spamming
- Cookies
- Threats while communicating data
- Secure connections
- Eavesdropping
- Phishing and identity verification
- Solutions to Computer Security Threats
- Solutions to Viruses, Adware, Spyware
- Solutions to Spam, Eavesdropping
- Solutions to PC Intrusion
- Solutions to Phishing and Pharming Attacks
- Firewall