CBSE Class 11 Computer Science Syllabus

Computer Science

CLASS XI

TERM- 2

Unit II:

Computational Thinking and Programming – 1

● Lists: introduction, indexing, list operations (concatenation, repetition, membership & slicing), traversing a list using loops, built-in functions: len(), list(), append(), extend(), insert(), count(), index(), remove(), pop(), reverse(), sort(), sorted(), min(), max(), sum(); nested lists, suggested programs: finding the maximum, minimum, mean of numeric values stored in a list; linear search on list of numbers and counting the frequency of elements in a list

Tuples: introduction, indexing, tuple operations(concatenation, repetition, membership & slicing), built-in functions: len(), tuple(), count(), index(), sorted(), min(), max(), sum(); tuple assignment, nested tuple, suggested programs: finding the minimum, maximum, mean of values stored in a tuple; linear search on a tuple of numbers, counting the frequency of elements in a tuple

Dictionary: introduction, accessing itemsin a dictionary using keys, mutability of dictionary (adding a new item, modifying an existing item), traversing a dictionary, built-in functions: len(), dict(), keys(), values(), items(), get(), update(), del(), clear(), fromkeys(), copy(), pop(), popitem(), setdefault(), max(), min(), count(), sorted(), copy(); suggested programs : count the number of times a character appears in a given string using a dictionary, create a dictionary with names of employees, their salary and access them

Introduction to Python modules: Importing module using ‘import ‘ and using from statement, Importing math module (pi, e,sqrt, ceil, floor, pow, fabs, sin, cos, tan); random module (random, randint, randrange), statistics module (mean, median, mode)

Unit III:

 Society, Law and Ethics

● Digital Footprints

Digital society and Netizen: net etiquettes, communication etiquettes, social media etiquettes

Data protection: Intellectual Property Right (copyright, patent, trademark), violation of IPR (plagiarism, copyright infringement, trademark infringement), open source softwares and licensing (Creative Commons, GPL and Apache)

Cyber-crime: definition, hacking, eavesdropping, phishing and fraud emails, ransomware, preventing cyber crime

Cyber safety: safely browsing the web, identity protection, confidentiality, cyber trolls and bullying.

Safely accessing web sites: malware, viruses, Trojans, adware

E-waste management: proper disposal of used electronic gadgets

● Indian Information Technology Act (IT Act)

Technology & Society: Gender and disability issues while teaching and using computers

<