Term 1&2 - Syllabus For Computer Science
Term 1&2 - Syllabus For Computer Science
● Types of software: System software ( Operating systems, system utilities, device drivers),
programming tools and language translators ( assembler, compiler, and interpreter), application
software
● Boolean logic: NOT, AND, OR, NAND, NOR, XOR, NOT, truth tables and De Morgan’s laws, Logic
circuits
● Number System: Binary, Octal, Decimal and Hexadecimal number system; conversion between
number systems
● Knowledge of data types: Number (integer, floating point, complex), boolean, sequence (string,
list, tuple), None, Mapping(dictionary), mutable and immutable data types.
● Flow of Control: introduction, use of indentation, sequential flow, conditional and iterative flow
25
● Conditional statements: if, if-else, if-elif-else, flowcharts, simple programs: e.g.: absolute value,
sort 3 numbers and divisibility of a number.
Term 2
● Lists: introduction, indexing, list operations (concatenation, repetition, membership and slicing),
traversing a list using loops, built-in functions/methods–len(), list(), append(), extend(), insert(),
count(), index(), remove(), pop(), reverse(), sort(), sorted(), min(), max(), sum(); nested lists,
suggested programs: finding the maximum, minimum, mean of numeric values stored in a list;
linear search on list of numbers and counting the frequency of elements in a list.
● Introduction to Python modules: Importing module using ‘import ’ and using from statement,
importing math module (pi, e, sqrt(), ceil(), floor(), pow(), fabs(), sin(), cos(), tan()); random module
(random(), randint(), randrange()), statistics module (mean(), median(), mode()).
● Digital Society and Netizen: net etiquettes, communication etiquettes, social media étiquettes
26
● Data Protection: Intellectual property rights (copyright, patent, trademark), violation of
IPR(plagiarism, copyright infringement, trademark infringement), open source software and
licensing (Creative Commons, GPL and Apache)
● Cyber Crime: definition, hacking, eavesdropping, phishing and fraud emails, ransomware, cyber
trolls, cyber bullying
● Technology and society: Gender and disability issues while teaching and using computers.
27