BPSC PGT Computer Science Teacher Detailed
Syllabus
Computer System
Introduction to computer and computing: evolution of computing devices, data and
information, types of data, functional components of a computer system and their
interconnections, I/O devices, data transfer through system bus. Computer Memory: Units
of memory, types of memory – primary and secondary; data deletion, its recovery and
related security concerns. Microprocessor: Evolution, features of microprocessor including
memory size, word size , clock speed, introduction to microcontrollers. Software: purpose
and types – system and application software, operating system, language translators,
device drivers, programming tools, generic and specific purpose software, classification of
programming languages (high level language, machine language). Operating System (OS):
Need for operating system, brief introduction to functions of OS, user interface.
Encoding Schemes and Number System
Encoding schemes: American Standard Code for Information Interchange (ASCII),
UNICODE, Indian Script Code for Information Interchange (ISCII) Number system:
Decimal, Binary, Octal and Hexadecimal number system and converting a number from a
number system to another, including its fractional part.
Emerging Trends
Brief understanding of the following emerging trends: Artificial Intelligence, Machine
learning, Natural Language Processing, Immersive experience, Robotics, Big data and its
characteristics, Internet of Things (IoT), Sensors, Smart cities, Cloud Computing and Cloud
Services (SaaS, IaaS, PaaS); Grid Computing, Blockchain technology.
Problem Solving
Introduction to Problem Solving: problem solving cycle - analyzing a problem, designing
algorithm, implementation through coding, testing the solution Algorithms : what is an
algorithm, need of algorithm in problem solving, characteristics of algorithm,
representation of algorithm using flowchart and pseudo-code Programming: concept of a
program, need for writing programs, process of conceptualizing a solution to a problem
and moving from algorithm to programming. Programming Constructs: Sequence,
Selection and Iteration; Simulation (dry run) of program for better understanding of
algorithm; Comparison and Analysis of Algorithms through simulations. Decomposition:
concept, need for decomposing a problem, examples of problem solving using
decomposition.
Getting started with Python
Basics of Python programming, working with Python interpreter in interactive mode
and script mode, structure of a program, debugging-errors and exceptions, identifiers,
keywords, constants, variables, types of operators, precedence of operators, data types,
mutable and immutable data types, statements, expressions, evaluation and comments,
input and output statements, data type conversion, debugging
Flow of control
Control structures: Sequence, selection (decision) and repetition (iteration) Selection: if,
if-else, and nested if statement, indentation Repetition: for, while, and nested loops,
break, continue;
Functions
Introduction to functions, need of functions User defined functions: passing arguments to
a function, returning values from functions, scope of variables, Standard library:, using
built-in functions, importing modules-math, random, statistics, creating and importing
user defined module
Strings
Strings: initializing strings and accessing strings, string operations, built-in functions for
string manipulation, string traversal, string as argument to function
Lists
list operations - creating, initializing, traversing and manipulating lists, list methods and
built-in functions, nested lists, list as argument to a function.
Tuples and Dictionary
Tuples: Creating, initializing, accessing elements, tuple assignment, operations on tuples,
tuple methods and built-in functions, nested tuples. Dictionary: concept of key-value pair,
mutability, creating, initializing, traversing, updating and deleting elements; dictionary
methods and built-in functions.
Societal Impacts
Digital footprint, Etiquettes for Net surfing and for communicating through social medias,
data protection, Intellectual Property Rights (IPR) and their violation, plagiarism and
copyrights, Free and Open Source Software (FOSS), Cyber crime and cyber laws, hacking,
phishing, cyber bullying, Indian IT Act, preventing cyber crime. Awareness about health
concerns related to usage of technology like effect on eyesight, physiological issues and
ergonomic aspects
Exception and File Handling in Python
Exception Handling: syntax errors, exceptions, need of exception handling, user-defined
exceptions, raising exceptions, handling exceptions, catching exceptions, Try - except -
else clause, Try - finally clause, recovering and continuing with finally, built-in exception
classes. File Handling: text file and binary file, file types, open and close files, reading and
writing text files, reading and writing binary files using pickle module, file access modes.
Stack
Stack (List Implementation): Introduction to stack (LIFO Operations), operations on stack
(PUSH and POP) and its implementation in python. Expressions in Prefix, Infix and
postfix notations, evaluating arithmetic expressions using stack, conversion of Infix
expression to postfix expression
Queue
Queue (List Implementation): Introduction to Queue (FIFO), Operations on Queue (INSERT
and DELETE) and its implementation in Python. Introduction to DQueue and its
implementation in Python.
Searching
Searching: Sequential search, Binary search, Analysis of Sequential and Binary Search. Dry
run to identify best, worst and average cases. Implementation of searching techniques in
Python.
Sorting
Overview of sorting techniques, Bubble Sort, Selection Sort and Insertion Sort. Dry run to
identify best, worst and average cases. Implementation of sorting techniques in Python.
Hashing: Hash Functions, Collision Resolution, Implementing the Map Abstract Data Type.
Understanding Data
Data and its purpose, collection and organization; understanding data using statistical
methods: mean, median, standard deviation, variance; data interpretation; visualization
of data.
Database Concepts
Introduction to database concepts, difference between database and file system,
relational data model: concept of domain, tuple, relation, keys - candidate key, primary
key, alternate key, foreign key; Relational algebra: selection, projection, union, set
difference and cartesian product;
Structured Query Language
Advantages of using Structured Query Language, Data Definition Language, Data Query
Language and Data Manipulation Language, Introduction to MySQL, Creating a database
using MySQL, Data Types Data Definition: CREATE TABLE, DROP TABLE, ALTER TABLE,
Data Query: SELECT, FROM, WHERE Data Manipulation: INSERT, UPDATE, DELETE
Math functions: POWER (), ROUND (), MOD (). Text functions: UCASE ()/UPPER (),
LCASE ()/LOWER (), MID ()/SUBSTRING ()/SUBSTR (), LENGTH (), LEFT (), RIGHT (),
INSTR (), LTRIM (), RTRIM (), TRIM (). Date Functions: NOW (), DATE (), MONTH (),
MONTHNAME (), YEAR (), DAY (), DAYNAME (). Aggregate Functions: MAX (), MIN (),
AVG (), SUM (), COUNT (); using COUNT (*). Querying and manipulating data using
Group by, Having, Order by. Operations on Relations - Union, Intersection, Minus,
Cartesian Product, JOIN
Computer Networks
Introduction to computer networks, Evolution of networking, Network types: LAN, WAN,
MAN Network devices: Modem, Ethernet Card, Repeater, Hub, Switch, Router, Gateway.
Network Topologies: Mesh, Ring, Bus, Star, and Tree topologies Basic concept of MAC and
IP Address Difference between Internet and web Page |
Data Communication
Concept of communication, Types of Data Communication, switching techniques
Communication Media: Wired Technologies – Twisted pair cable, Co-axial cable, Ethernet
Cable, Optical Fibre; Introduction to mobile telecommunication technologies Wireless
Technologies – Bluetooth, WLAN, Infrared, Microwave Network Protocol: Need for
Protocol, Categorization and Examples of protocol, HTTP, FTP, IP, PPP; electronic mail
protocol Concept of Channel, Bandwidth (Hz, KHz, MHz) and Data Transfer rate (bps,
Kbps, Mbps, Gbps, Tbps)
Security Aspects
Threats and prevention: Viruses, Worms, Trojan horse, Spam, Cookies, Adware, Firewall,
http vs https Network Security Concepts: Firewall, Cookies, Hackers and Crackers
Antivirus and their workings Network security threats: Denial of service, Intrusion
problems, Snooping, Eavesdropping