1. Prerequisites : Computer science — Class XI
2. Learning outcomes:
- Understand functions and recursion.
- Learn how to create and use Python libraries.
- Learn file handling.
- Learn about the concept of efficiency in algorithms and computing in general.
- Learn basic data structures: lists, stacks, and queues.
- Gain basic knowledge of computer networks: networking stack, basic networking hardware, basic protocols and basic tools.
- Connect a Python program to a SQL database and learn the aggregation functions in SQL.
- Have a solid understanding of cyber ethics and cybercrime. Understand the value of technology in society, gender and disability issues, and the technology behind biometric identifiers.
3. Distribution of signs
UnitNo. Unit Name Marks 1. Programming and Computational Thinking – 2 30 2. Computer Networks 15 3. Data Management – 2 15 4. Society, Law and Ethics – 2 10 5. Practicals 30 Total 100
4.1 Block 1: Programming and Computer Thinking (PCT-2) (80 Theory + 70 Practical)
Revision of Python basics
Functions: scope, parameter passing, mutable / immutable properties of data objects, passing arrays to functions, return values, functions using libraries: math and string functions.
File handling: open and close file read not, writing and appending to a file, create and import Python libraries
Recursion: simple algorithms with recursion: factorial , binary search
Idea for efficiency: performance is defined as inversely proportional to wall clock time, counts the number of operations performed by a piece of code, and measures the time spent by the program. Example: Take two different programs for the same problem and understand how an effective program takes less time.
Data visualization with Pyplot: lists , local and global (web and internet) , new technologies such as IoT , public and private cloud, Client and Server Concept .
Network devices, such as NICs, switch, hub, router and amplitude and frequency modulation , error checking and MAC address concept , v4 and v6 ), TCP: retransmission basic idea and speed modulation , when there is congestion (analogy with the road network) , protocols: 2G, 3G, 4G, Wi — traceroute , ping , ipconfig, nslookup , whois, speed-test.
Application layer: work with email , secure communication: encryption and certificates (HTTPS) , networking applications: remote desktop, remote login, FTP , SCP, SSH, POP / IMAP, VoIP, NFC .
4.3 Block 3: data management and (DM-2) (20 Theory + 20 Practical)
Write a minimal Django-based web application that parses GET and POST requests and writes fields to a file — regular file and CSV file.
group by, have , order by .
4.4. Unit 4: Society, Law and Ethics (SLE-2) (10 Theory)
Intellectual Property Rights, Plagiarism, Digital Rights Management and Licensing (Creative Commons, GPL and Apache), Open Source, Open Source data, confidentiality.
Privacy laws, Recursively find the factorial of a natural number.
The purpose of the class project — create something tangible and useful. This must be done in groups of 2 to 3 students and must be started by students at least 6 months before the application deadline. The goal here is — find a real problem worth solving. Students are encouraged to visit local businesses and ask them about the challenges they face. For example, if a business is having difficulty generating invoices for GST claims, students can complete a project that takes raw data (a list of transactions), groups transactions into categories, takes into account GST tax rates, and generates invoices in the appropriate format. Students can be very creative here. They can use a wide range of Python libraries to create user-friendly applications such as games, software for their school, software for students with disabilities, and mobile apps. Of course, some of these projects require additional training to complete; this should be encouraged. Students need to know how to teach themselves. If three people work on a project for 6 months, a minimum of 500 lines of code is expected. The committee was also aware of the extent of plagiarism in such projects. Teachers must be very strict about this situation and take very strict disciplinary action against students who cheat lab assignments or projects or use pirated software to do the same. Anything on offer can be achieved with completely free and legal open source software.