To Know About More Useful Books For Class-12: Click Here

  • Uploaded by: priyanka malhotra
  • 0
  • 0
  • February 2021
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View To Know About More Useful Books For Class-12: Click Here as PDF for free.

More details

  • Words: 4,919
  • Pages: 14
Loading documents preview...
3. Logical error : It occurs due to programmer’s mistaken analysis of the error. Corrected by : • TDD(Test Driven Development) • Using print statement • By using python debugger

2. Run time error : It occurs during the execution of program.

1. Compile time error : It occurs at compile time. • Syntax error : It occurs when rules of programming are misused. • Semantic error : It occurs when statements are meaningless.

Python Basics

1. for loop : counting loop repeats a certain number of times. 2. while loop : conditional loop repeats until a certain thing happen.

1. if Syntax : if : statement 2. if else Syntax : if : statement else : statement 3. if elif Syntax: if : statement elif : statement else: statement 4. Nested if In nested if statement, we can have if–elif–else statement inside another if–elif–else statement.

1. Concatenation 2. Replication 3. Membership in and not in 4. Comparison operator

An error or bug is anything in the code that prevents a program from compiling & running correctly.

1. break : It terminates the loop it lies within 2. continue : It forces the next iteration of the loop to take place, skipping any code in between

UNIT - 1 Chapter : 1 Revision of Basics of Python

• string • list • tuple

int long float complex

• dictionary

• • • •

1. Interactive mode : It allows us to interact with operating system. 2. Script mode : In this mode, we type program in a file and use interpreter to execute the content of the file.

1. Bubble sort : It compares two adjoining values & exchanges them if they are not in proper order. 2. Insertion sort : It scans the array & inserts it into proper position

1. Arithmetic operators: +, - *, /, %, **, // 2. Relational operators: <, >, <=, >=, != or <>, == 3. Logical operators: or, and, not 4. Assignment operators: =, +=, -=, *=, /=, %=, //= 5. Bitwise operators: &, |, ^, <<, >> 6. Membership operators: in, not in

It was created by “GUIDO VAN ROSSUM” late in 1980 at National Research Institute in the Netherland.

unit - I CHAPTER : 1 1.1Revision of the basics of python Topic : Pythom Basics

Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

[ 1

To know about more useful books for class-12 click here

1. Local variable : They are defined and declared inside a function. 2. Global variable : They are defined and declared outside a function.

Functions

• import<module name> • from<module> import

1. Built in functions : These functions are built into python and can be accessed by programmer 2. Function in module : It is a separately saved unit whose functionality can be reused. 3. User defined function : They are declared with a keyword def. followed by the function name.

1. Required argument : Are the arguments passed to a function in correct position and order. 2. Keyword argument : It is a function call, the caller identifies the argument by the parameter name. 3. Default argument : It is an argument that assumes a default value, if a value is not provided in a function call for that argument. 4. Variable length argument : An “*” is placed before the variable name that holds the value of all non – keyword variable arguments.

1. Mutable object : The objects that can be changed after its creation. Example: list, set, dictionary 2. Immutable objects : The objects that cannot be changed after its creation. Example: int, float, boolean, str, tuple, unicode.

• A function is a block of organized, reusable code that is used to perform a single, related action. • It begins with the keyword def. followed by the function name and parenthesis().

ceil(x) : returns the smallest integer greater or equal to x. copysign(x,y) : returns x with sign of y. fabs(x) : returns the absolute value of x. factorial (x) : returns the factorial of x floor (x) : returns the largest integer less than or equal to x. pow (x,y) : returns x raised to the power y. sqrt(x,y) : returns the square root of x. fmod (x) : returns the remainder when x is divided by y. exp(x) : returns e** x.

capitalize() : converts the first character to uppercase casefold() : converts string into lower case count() : returns the number of times a specified value occurs. find() : searches the string for a specified value. isalnum() : returns true if all characters in string are alphanumeric isalpha() : returns true if all characters are alphabets. isdigit() : returns true if all characters are digits. islower() : returns true if all characters are in lowercase. isupper() : returns true if all characters are in uppercase.

CHAPTER : 2 FUNCTIONS

2 ] Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

To know about more useful books for class-12 click here

read ( ) : It reads atmost n bytes and returns the read bytes readline ( ) : It reads a line of input and return it in the form of a string. readlines ( ) : It reads all lines and returns them in a list. write ( ) : it writes string to file referenced by . writelines ( ) : It writes all string in list L as lines to file referenced by . 6. flush ( ) : It forces the writing of data on disc that is still pending in output buffer. 7. split ( ) : It splits a line in column. It returns columns as item of a list. 8. rename ( ) : It used to rename the file existing on the disk. 9. remove ( ) : It is used to delete a file existing on the disk. 10. os.path.join ( ) : It is used to assemble directory names into a path. 11. os.path.split ( ) : It is used to split of the last path component. 12. os.path.split text ( ) : It is used to split file name into primary name and extension. 13. os.path.exist ( ) : It checks if a path actually exist.

1. 2. 3. 4. 5.

1. Absolute file path : It describes how to access a given file or directory, starting from the root of the file system. 2. Relative file path : It is interpreted from the perspective your current working directory.

1. open ( ) : It creates a file object, which would be utilized to call Syntax file Object = open ( file name [, access mode] [ buffering ] 2. write ( ) : This method writes any string to an open file Syntax file Object. write (string) 3. read ( ) : This method records a string to an open file. Syntax file Object. read ([count]) 4. close ( ) : It closes the file Syntax file Object.close ( )

tell ( ) It tells us the current position of the file pointer. seek ( ) It moves the file pointer to the specified position.

: It returns true if file is closed, false otherwise. 2. file.mode : It returns access mode with which file was opened. 3. file.name : It returns name of the file 4. file.soft space : It returns false if space explicity required with print, true otherwise.

File Handling

1. file.closed

1. read : It opens a file in read mode. 2. write : It opens a file in write mode. 3. append : It opens a file to add some data

UNIT - 1 Chapter : 3 Data file handling 1. Text file : They store information in ASC II or Unicode characters. Each line of text is terminated with a especial character EOL. 2. Binary file : They contain information in the same format in which the information is held in memory.

: It opens a file for reading only. This is default mode. 2. rb mode : It opens a file for reading only in binary format. 3. r+ mode : It opens a file for both reading and writing. 4. rb+ mode : It opens a file for both reading and writing in binary format. 5. w mode : It opens a file for writing only. Overwrites the file if the file exists. 6. wb mode : It opens a file for writing only in binary format. 7. w+ mode : It opens a file for both writing and reading. 8. wb+ mode : It opens a file for both writing and reading in binary format. 9. a mode : It opens a file for appending. The file pointer is at the end of the file, if the file exists. 10. ab mode : It opens a file for appending in binary format. 11. a+ mode : It opens a file for both appending and reading. 12. ab+ mode : It opens a file for both appending and reading in binary format.

mkdir ( ) : this method is used to create directory, in the current directory. chdir ( ) : this method is used to change the current directory getcwd ( ) : this method is used to display the current working directory. rmdir ( ) : this method is used to delete the directory. Before removing the directory, all the content in it, should be removed 1. r mode

CHAPTER : 3 File handling

Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

[ 3

To know about more useful books for class-12 click here

To know about more useful books for class-12 click here

This directory is known as package.

Finally create an _unit_.py file inside the directory.

Put the classes, functions and modules in it

First create a directory and give it a name

While using the import syntax for packages the last attribute must be a subpackage. As a module, it should not be any function or class name.

import <package_name> statement doesn’t put any of the modules in the package into the local name space.

The import statement for a package: from <package_name>import *

While importing packages python looks in the list of directories defined in sys.path.

Module contents are available to the caller with the import statement. • import <module_name> • from <module_name> import • from <module_name> import as

Using Python Libraries

A Python library is a coherent collection of python modules that is organized as a Python package.

The names that begin with an underscore are default python attributes associated with the module.

It can be imported using dot operator.

They are python files with (.py) extension

A Module is a piece of software that has a specific functionality.

It can also contain nested sub packages to arbitrary depth

To make directory, a package _uint_.py file is to be created in it.

All the sub-packages and modules are part of this directory.

A package in python is nothing but simply a directory

Three ways to define :• It can be written in Python itself. • It can be written in C and loaded dynamically at run time. • A built-in module is intrinsically contained in the interpreter, like the intertools module.

UNIT - 1 1.4 Chapter : 4 Using Python libraries

CHAPTER : 4 using python libraries

4 ] Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

• Factorial of a number is the product of all the integer from 1 to that number • When we call the factorial function with a positive integer , it will recursively call itself by decreasing the number. • Each function calls multiple the number with the factorial of number 1 until the number is equal to 1.

A Fibonacci sequence is a sequence of integer whose first two terms are ‘0’ and ‘1’ and all other terms of the sequence are obtained by adding preceding two numbers. For example 0,1,1,2,3,5,8,13,…….

We use an order list of items of design recursive function to take in the list along with starting and ending index as input. Then the binary search calls itself till find the searched item as conclude about its absence in the list.

CHAPTER : 5 Recursion

1. Recursive functions are hard to debug. 2. Recursive calls are expensive (inefficient) as they take up a lots of memory and time. 3. Sometimes the logic behind recursive is hard to follow through.

Recursion

UNIT - 1 Chapter : 5 Recursion

1. Sequence generation is easier with recursion than using some nested iteration. 2. A complex task can be broken down into simplex sub-problems using recursion. 3. Recursive functions make the code look clean and elegant.

1. Base case : The base case is used to step recursion the function call endlessly itself and a stack overflow error will occur. 2. Recursive case : Every recursive function must have a base condition that stops the recursion or else the function call itself infinitely.

• When a function calls itself, it is known as recursion. • It works on the principle of LIFO (Last In First Out) • Fixed steps of code get executed again and again for new values until a base condition is encountered.

Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

[ 5

To know about more useful books for class-12 click here

• It is used to profile a Program’s performance. It provides a detailed breakdowns of call counts and times.

• It is useful for timing small pieces of Python code and can be used to compare the performance of the two or more implementation of a particular function.

• The master theorem gives asymptotic estimates for a class of recurrence relations that often show up when analyzing recursive algorithm.

• Use Python’s built in data structure-dicts,tuples and lists rather than custom data structure. • Use generator rather than creating large tuples or lists to iterate over.

• An operation that is performed repeatedly is termed as an elementary operation. • The time to execute an elementary operation is known as unit cost.

Profiling is the technique of knowing how long it takes for a particular function to run.

When the execution time depends not only on the number of inputs but also on the value of the input, it is called worst case complexity.

Defines the Lower bound for the growth of a function.

Idea of Efficiency

• CPU time refers the amount of time the task was actually executing excluding I/O OR running other task.

Indicates that the function is bounded from both above and below.

• Time complexity estimates the time to run an algorithm. It is calculated by counting elementary operations. • Running time of an algorithm depends on Input and coding skills. • It is denoted by big ‘O’, big omega, and big theta notation.

• Performance is inversely proportional to time: To maximize performance, minimize execution time • If a program X is ‘n’ times faster than ‘Y’, the execution time on ‘Y’ is ‘n’ times longer than X

• Wall clock time refers to elapsed time as determined by wrist watch or wall clock. • It is actual time, usually measured in seconds, that a program takes to run or to execute its assigned task. • For a computer user, the total amount of elapsed time, as measured in days ,hours minute and seconds that the computer has worked on a specific job is measured in a wall time. • The wall time may not be a single contiguos block of time because a computer may perform more than one job over a given period.

CHAPTER : 6 Idea of Efficiency

6 ] Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

To know about more useful books for class-12 click here

• • • •

Scatter plot Line plot Histogram Bar plot

• It is a graphical representation of data where the individual values contained in a matrix, are represented as colors. • It is used for the correlation of features in a dataset.

Stacked

Grouped

Regular

• Series • Data frame • Panel

• n rows • n cols • Plot-number

• It is an open source, high performance, easy to use library providing data structure such as data frames & data analysis.

Data Visualization using Pyplot

• It is python visualization library based on matplotlib. It provides a high level interface for creating attractive graphs.

It is the act of breaking data variables across multiple subplots and combining those subplots into a single figure.

• Matplotlib is a popular python library that can be used to create Data Visualization easily • Matplotlib .plot() is used to create a line chart • Matplotlip.show() is used to plot graph on screen

It is the discipline of trying to understand data by placing it in a visual content so that patterns , trends and correlation that might not otherwise be detected , can be exposed.

UNIT - 1 Chapter : 7 data visualization using pyplot

CHAPTER : 7 Data visualization using pyplot

Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

[ 7

To know about more useful books for class-12 click here

• Insertion : addition of new data element in data structure. • Deletion : removal of data element from data structure. • Searching : to look for a specified data element in the data structure. • Traversal: one by one processing of all data elements. • Sorting: arranging all data elements in a specified order. • Merging: combining to similar data structure to form new data structure.

• TOP : Insertion and deletion occur at only one end • PUSH : Adding data in the stack • POP : Removal of data from the stack

• Infix : Left Root Right. • Prefix : Root Left Right. • Postfix : Left Right Root.

UNIT - 1

• Expression evaluation • String Reversal • Memory management

Data Structure and lists

It is a way to store and organize data so that it can be used effectively

Dynamic

1.8 Chapter : 8 lists, stacks, and queues Topic 1 : data structure and lists

CHAPTER : 8 Data structures

Static

ii) Dequeue : Removal of elements from the queue.

i) Enqueue : Addition of elements in the queue.

Bubble sort

Selection sort

Insertion sort

binary search

Linear search

• Tree • Graph

• Stack • Queue • Linked List

Structure

Union

Array

8 ] Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

To know about more useful books for class-12 click here

• Tracert/Traceroute • Ping • ipconfig • nslookup • whois • speed test

• HTTP (Hyper Text Transfer Protocol) • TCP/IP (Transmission Control Protocol/Internal Protocol) • FTP (File Transfer Protocol) • POP3 (Post Office Protocol version 3) • SMTP (Simple Mail Transfer Protocol) • VoIP (Voice over Internet Protocol) • NFC (Near Field Communication) • SCP (Secure Copy Protocol)

• IPv6 (Internet Protocol version 6)

• WLAN (Wireless Local Area Network)

• SSL (Secure Socket Layer)

Types of Network

• WAN (Wide Area Network)

• Digital Certificate

Routing Table

To know about more useful books for class-12 click here • Forward Error Correction

For example: Railway reservation system

For example: Bluetooth, WiFi, VSAT

For example: Ethernet

Internet of Things

Types of Cloud

• Hybrid cloud

• Private cloud

• Public cloud

1. Router : It transmits data between two same protocol supporting LAN’s 2. MODEM : Modulator DEModulater transmits data over telephone lines 3. RJ45 Connector : RJ-45 (Registered Jack) is used to connect LAN’s, particularly Ethernet 4. Ethernet Card : They help in connecting the nodes within a network 5. Hub : • Active Hub • Passive Hub 6. Switch : It is used to interconnect device within a network 7. Gateway : It is used to connect dissimilar network 8. Repeater : It is used to amplifies and restore signals for long distance transmission 9. Access point : It is used to receive and transmit data in a network

• Backward Error Correction

• Check sum

• LRC

• CRC

• Parity Check

• Burst Error

• Multiple bit

• Single bit

• SAN (Storage Area Network)

• MAN (Metropolitan Area Network)

• LAN (Local Area Network)

• Encryption

Computer Networks

Hyper Text Transfer Protocol

• IPv4 (Internet Protocol version 4)

• Downloading • Uploading

Electronic mail

unit-II Computer networks UNIT -CHAPTER 1 Chapter :: 99 computer networks

Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

[ 9

• REST (Representational State Transfer) is a web architecture. • Featured with:• A distributed network of interlinked documents • A client-server architecture • Servers and stateless • Resources • Representations

• REST defines a client server relationship between actors. • A document on the web is stored on a particular server and delivered upon request to a client who ask for it. • A client talks only to servers and a server to its client.

• MVC (Model Video Controller) : It is the architecture under which the DJango framework operates. • Model : The actual data or content that is displayed in the pages and is stored in a database. • View: The viewer is webpage. • Controller : The portion of the code that collects the data from model and passes to the view i.e., web page.

• Beautiful soup is a python library for pulling data out of HTML and XML files. • It is designed for soup scrapping.

Django

MTV is a model-template-view architecture.

• CSV (Comma Separated Values) files allow us to store tabular data in plain texts and is a comma format for spreadsheets and database. • Import python built in CSV module with import CSV.

• GET : To retrieve a resource • PUT : To create a resource • POST : To modify a resource • DELETE : To delete a resource

• A model in Django describes the data that this held in the database. • It gives information on how to access the data, the various relationship in the database and to validate the data.

• Django is the standard web application framework used by Python developers. • Django apps are the Python packages that consist of model, views and variety of the other code.

Unit-III CHAPTER : 10 django

10 ] Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

To know about more useful books for class-12 click here

close () commit() sellback() cursor()

• • • •

• A cursor is a python object that enables you to work with the database. • It is positioned at a particular location within a table in the database.

c.arraysize() c.close() c.execute (sql, param) c. executemany (sql, seq-of-param)

• • • •

Interface Python with an SQL Database

• MySQLdb is an interface for connecting to a MySQL database servers from Python. • Connect method of MySQLdb interface is used to create a connection object using MySQLdb module.

• Python Database API supports a wide range of database servers such as Gadfly , MySQL , Oracle , Sybase etc. • It provides a minimal standard for working with database.

UNIT - 3 Chapter : 11 interface python with an sql database

Chapter : 11 interface python with an SQL Database

Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

[ 11

To know about more useful books for class-12 click here

sum() avg() min() max() count()

Constraint is a condition applicable on a field or a group of fields. Types : i) Column constraints ii) Table constraints

• • • • •

• Arithmetic operators : +, -, *, / • Relational operators : =, <, >, <=, >=, <> • Logical operators : OR, NOT, AND

• Range check: between low and high • List check – in • Pattern check: like, not like

SQL Commands

Structured Query Language (SQL) is a query language that allows user to specify the conditions (instead of algorithm).

UNIT - 3 Chapter : 12 sql commands

• • • • •

General structure: select, as, from, where Composition: in, between, like. Grouping: group by, having, count(). Display order: order by, desc Logical operator: and, or, not

• TCL commands: commit, rollback

• DML commands: insert, delete, update

• DDL commands: create, alter, drop

• DDL (Data Definition Language) command • DML (Data Manipulation Language) command • TCL (Transaction Control Language) command

Chapter : 12 sql cOMMANDS

12 ] Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

To know about more useful books for class-12 click here

Recycling of e-waste helps to conserve our earths pressure natural resources. Give you e-waste to a certified recycler. Sell off or donate your e-waste.

Use of Online Shopping Social media Chat rooms Online home delivery of food Digital Native

Resource depletion Increased population Increased pollution Lack of social skills Poor sleep habits Lonliness/ Isolation Addiction Obesity Depression

• The data that is freely available to everyone to use and republish according to their own requirement, without any restriction is called open data. • It is created by routing government institutions.

• • • • • • • • •

• Globalization • ICT Implementation • Cloud depositories

• • • • •

• It is created when an electronic product is discarded for reuse, recycle, resale or salvage. • It contains toxic pollutants like mercury, lead, cadmium

• • • •

It refers to any program whose source code is made avaliable for use or modification as user or other developers who see it features : • Flexible and Agile • Speed and Cost effectiveness • Attractiveness • Powerful Information Security

Intellectual Property Right

• IPR Awareness • Generations of IPR • Legal and Legislative framework • Administration and Management • Commercialization of IPR • Enforcement and Adjudication • Human Capital Development

• It is a document that provides legally binding guidelines for the use and distribution of software • It typically provides end user with the right one or more copies of the software without violating copyrights Types : 1) CCL (Creating Common License) 2) EULA (End User License Agreement) 3) GPL (General Public License) 4) Proprietary License

It is used to describe the processes by which the author or publisher of a work is entitled to do. It controls: • Preventing editing and saving • Preventing screen grabbing • Document recovation • Watermarking document with unique user information to establish an identity

• Direct Plagiarism • Mosaic Plagiarism • Self Plagiarism • Accidental Plagiarism

It is the unethical practice of presenting someone else’s work or idea as one’s own. It includes: • Stealing and Publication • Content Clone • Idea Theft • Re-Mix

IPR are the rights given to the persons over the creations of their mind. They usually give the creator an exclusive right over the use of his/her creation for a certain period of time. Types :• Patents • Trade Mark • Copyright • Design

Unit- IV Chapter : 13 society, law and ethics

Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

[ 13

To know about more useful books for class-12 click here

To know about more useful books for class-12 click here

• It refers to the Sexual abuse perpetrated against a child • It can be through any means including print or audio or video that is centered on sex act

• Stealing or using someone’s personal information to gain some financial advantage Types: 1) True name 2) Account takeover

• Aadhar card(UID), a 12 digit number • Digital Signature • Barcode • QR Code • Watermarks

• Don’t respond to email text, phone messages that ask for personal information • Create password that mix with letters, numbers, special characters • Use antivirus and anti-spyware software and a firewall on your computer

• It is a set of human psychological or behavioral characteristics used for identification of a person. These are Unique for an individual Types: • Retina Scanner • Finger Print Scanner • Facial biometric • Iris Scanning • Voice recognition • Key Stroke

• Many students can’t participate in regular educational programs because they have a disability • The gender disparity that is primarily attribute to complex and deeply embedded cultural values that tends to discourage women’s active participations.

• Digital certificates • Digital Signature

Technology and Society

• Physical • Informational • Decisional • Dispositional

• Developing indigenous cyber forensics tools. • Providing training to LEA( Law Enforcement Agencies) • Providing technical support to LEA for cyber-crime investigation • Support LEA for setting up of cyber forensics laboratories

• Disk forensics • Memory forensics • Network forensics • Mobile forensics • Multimedia forensics • Live forensics

• Hacking • Software Piracy • Network Intrusion • Child Pornography • Credit card theft • Cyber Terrorism • Internet Hacking • Phishing • Illegal Downloads • Electronic building or Stacking

It refers to the laws that deal with the regulating storing of personally identifiable information, individuals, which can be collected by government, public or private organization Types : • Appropriation of name or likeness • Intrusion upon seclusion • False light • Public disclose of private facts

• Cheque fraud • Website misdirection • Identity theft • Charities fraud • Credit card fraud • Pyramid Schemes • Internet sales • Work from home scams

Chapter : 13 sOCIETY, LAW AND EThics

14 ] Oswaal CBSE Chapterwise Mind Maps, computer science, Class – XII

Related Documents


More Documents from "psychposters"