Computer Science
Computer Science
2025-26
COMPUTER-SCIENCE
SYLLABUS
Computer Science/Informatics Practices
- 308
Note:
There will be one Question Paper which will contain Two Sections i.e. Section A and Section B [B1
and B2].
Section A will have 15 questions covering both i.e. Computer Science/Informatics Practices which
will be compulsory for all candidates
Section B1 will have 35 questions from Computer Science out of which 25 questions need to be
attempted.
Section B2 will have 35 questions purely from Informatics Practices out of which 25 question will
be attempted.
Section A
i. Exception and File Handling in Python
Exception Handling: syntax errors, exceptions, need of exception handling, user-defined
exceptions, raising exceptions, handling exceptions, catching exceptions, Try - except - else clause,
Try - finally clause, recovering and continuing with finally, built-in exception classes.
File Handling: text file and binary file, file types, open and close files, reading and writing text files,
reading and writing binary files using pickle module, file access modes.
File Handling: text file and binary file, file types, open and close files, reading and writing text
files, reading and writing binary files using pickle module, file access modes.
Chapter 2: Stack
Stack (List Implementation): Introduction to stack (LIFO Operations), operations on stack (PUSH
and POP) and its implementation in python. Expressions in Prefix, Infix and postfix notations,
evaluating arithmetic expressions using stack, conversion of Infix expression to postfix
expression
Page | 3
Chapter 3: Queue
Queue (List Implementation): Introduction to Queue (FIFO), Operations on Queue (INSERT and
DELETE) and its implementation in Python.
Introduction to DQueue and its implementation in Python.
Chapter 4: Searching
Searching: Sequential search, Binary search, Analysis of Sequential and Binary Search. Dry run to
identify best, worst and average cases. Implementation of searching techniques in Python.
Chapter 5: Sorting
Overview of sorting techniques, Bubble Sort, Selection Sort and Insertion Sort. Dry run to identify
best, worst and average cases. Implementation of sorting techniques in Python.
Hashing: Hash Functions, Collision Resolution, Implementing the Map Abstract Data Type.
Data and its purpose, collection and organization; understanding data using statistical methods:
mean, median, standard deviation, variance; data interpretation; visualization of data.
Introduction to database concepts, difference between database and file system, relational data
model: concept of domain, tuple, relation, keys - candidate key, primary key, alternate key,
foreign key;
Relational algebra: selection, projection, union, set difference and cartesian product;
Advantages of using Structured Query Language, Data Definition Language, Data Query
Language and Data Manipulation Language, Introduction to MySQL, Creating a database using
MySQL, Data Types
Data Definition: CREATE TABLE, DROP TABLE, ALTER TABLE,
Data Query: SELECT, FROM, WHERE
Data Manipulation: INSERT, UPDATE, DELETE
Math functions: POWER (), ROUND (), MOD ().
Page | 4
Text functions: UCASE ()/UPPER (), LCASE ()/LOWER (), MID ()/SUBSTRING ()/SUBSTR (),
LENGTH (), LEFT (), RIGHT (), INSTR (), LTRIM (), RTRIM (), TRIM ().
Date Functions: NOW (), DATE (), MONTH (), MONTHNAME (), YEAR (), DAY (),
DAYNAME ().
Aggregate Functions: MAX (), MIN (), AVG (), SUM (), COUNT (); using COUNT
(*). Querying and manipulating data using Group by, Having, Order by.
Operations on Relations - Union, Intersection, Minus, Cartesian Product, JOIN
Customizing plots: color, style (dashed, dotted), width; adding label, title, and legend in plots.
Awareness about health concerns related to the usage of technology like effect on eyesight,
physiological issues, and ergonomic aspects.
Threats and prevention: Viruses, Worms, Trojan horse, Spam, Cookies, Adware, Firewall, http vs
https
Network Security Concepts: Firewall, Cookies, Hackers and Crackers
Antivirus and their workings
Network security threats: Denial of service, Intrusion problems, Snooping, Eavesdropping
Page | 7