BPSC Teacher Recruitment Exam
Syllabus for BPSC TRE 3.0
Computer science (NCERT)
Introduction to computer and computing: evolution of computing devices, data and information, types of data, functional components of a computer system and their interconnections, I/O devices, data transfer through system bus.
Computer Memory: Units of memory, types of memory – primary and secondary; data deletion, its recovery and related security concerns.
Microprocessor: Evolution, features of microprocessor including memory size, word size , clock speed, introduction to microcontrollers.
Software: purpose and types – system and application software, operating system, language translators, device drivers, programming tools, generic and specific purpose software, classification of programming languages (high level language, machine language).
Operating System (OS): Need for operating system, brief introduction to functions of OS, user interface.
Encoding Schemes and Number System
Encoding schemes: American Standard Code for Information Interchange (ASCII), UNICODE, Indian Script Code for Information Interchange (ISCII)
Number system: Decimal, Binary, Octal and Hexadecimal number system and converting a number from a number system to another, including its fractional part.
Brief understanding of the following emerging trends:
Artificial Intelligence, Machine learning, Natural Language Processing, Immersive experience, Robotics, Big data and its characteristics, Internet of Things (IoT), Sensors, Smart cities, Cloud Computing and Cloud Services (SaaS, IaaS, PaaS); Grid Computing, Blockchain technology.
Introduction to Problem Solving: problem solving cycle – analyzing a problem, designing algorithm, implementation through coding, testing the solution
Algorithms : what is an algorithm, need of algorithm in problem solving, characteristics of algorithm, representation of algorithm using flowchart and pseudo-code
Programming: concept of a program, need for writing programs, process of conceptualizing a solution to a problem and moving from algorithm to programming.
Programming Constructs: Sequence, Selection and Iteration; Simulation (dry run) of program for better understanding of algorithm; Comparison and Analysis of Algorithms through simulations.
Decomposition: concept, need for decomposing a problem, examples of problem solving using decomposition.
Basics of Python programming, working with Python interpreter in interactive mode and script mode, structure of a program, debugging-errors and exceptions, identifiers, keywords, constants, variables, types of operators, precedence of operators, data types, mutable and immutable data types, statements, expressions, evaluation and comments, input and output statements, data type conversion, debugging
Control structures: Sequence, selection (decision) and repetition (iteration) Selection: if, if-else, and nested if statement, indentation
Repetition: for, while, and nested loops, break, continue;
Introduction to functions, need of functions
User defined functions: passing arguments to a function, returning values from functions, scope of variables,
Standard library:, using built-in functions, importing modules-math, random, statistics, creating and importing user defined module
Strings: initializing strings and accessing strings, string operations, built-in functions for string manipulation, string traversal, string as argument to function
Lists: list operations – creating, initializing, traversing and manipulating lists, list methods and built-in functions, nested lists, list as argument to a function.
Tuples: Creating, initializing, accessing elements, tuple assignment, operations on tuples, tuple methods and built-in functions, nested tuples.
Dictionary: concept of key-value pair, mutability, creating, initializing, traversing, updating and deleting elements; dictionary methods and built-in functions.
Digital footprint, Etiquettes for Net surfing and for communicating through social medias, data protection, Intellectual Property Rights (IPR) and their violation, plagiarism and copyrights, Free and Open Source Software (FOSS), Cyber crime and cyber laws, hacking, phishing, cyber bullying, Indian IT Act, preventing cyber crime.
Awareness about health concerns related to usage of technology like effect on eyesight, physiological issues and ergonomic aspects
Exception and File Handling in Python
Exception Handling: syntax errors, exceptions, need of exception handling, user-defined exceptions, raising exceptions, handling exceptions, catching exceptions, Try – except – else clause, Try – finally clause, recovering and continuing with finally, built-in exception classes.
File Handling: text file and binary file, file types, open and close files, reading and writing text files, reading and writing binary files using pickle module, file access modes.
Stack (List Implementation): Introduction to stack (LIFO Operations), operations on stack (PUSH and POP) and its implementation in python. Expressions in Prefix, Infix and postfix notations, evaluating arithmetic expressions using stack, conversion of Infix expression to postfix expression
Queue (List Implementation): Introduction to Queue (FIFO), Operations on Queue (INSERT and DELETE) and its implementation in Python.
Introduction to DQueue and its implementation in Python.
Searching: Sequential search, Binary search, Analysis of Sequential and Binary Search. Dry run to identify best, worst and average cases. Implementation of searching techniques in Python.
Overview of sorting techniques, Bubble Sort, Selection Sort and Insertion Sort. Dry run to identify best, worst and average cases. Implementation of sorting techniques in Python.
Hashing: Hash Functions, Collision Resolution, Implementing the Map Abstract Data Type.
Data and its purpose, collection and organization; understanding data using statistical methods: mean, median, standard deviation, variance; data interpretation; visualization of data.
Introduction to database concepts, difference between database and file system, relational data model: concept of domain, tuple, relation, keys – candidate key, primary key, alternate key, foreign key;
Relational algebra: selection, projection, union, set difference and cartesian product;
Advantages of using Structured Query Language, Data Definition Language, Data Query Language and Data Manipulation Language, Introduction to MySQL, Creating a database using MySQL, Data Types
Data Definition: CREATE TABLE, DROP TABLE, ALTER TABLE, Data Query: SELECT, FROM, WHERE
Data Manipulation: INSERT, UPDATE, DELETE Math functions: POWER (), ROUND (), MOD ().
Text functions: UCASE ()/UPPER (), LCASE ()/LOWER (), MID ()/SUBSTRING ()/SUBSTR (), LENGTH (), LEFT (), RIGHT (), INSTR (), LTRIM (), RTRIM (), TRIM ().
Date Functions: NOW (), DATE (), MONTH (), MONTHNAME (), YEAR (), DAY (), DAYNAME ().
Aggregate Functions: MAX (), MIN (), AVG (), SUM (), COUNT (); using COUNT (*). Querying and manipulating data using Group by, Having, Order by.
Operations on Relations – Union, Intersection, Minus, Cartesian Product, JOIN
Introduction to computer networks, Evolution of networking,
Network types: LAN, WAN, MAN
Network devices: Modem, Ethernet Card, Repeater, Hub, Switch, Router, Gateway. Network Topologies: Mesh, Ring, Bus, Star, and Tree topologies
Basic concept of MAC and IP Address Difference between Internet and web
Concept of communication, Types of Data Communication, switching techniques
Communication Media: Wired Technologies – Twisted pair cable, Co-axial cable, Ethernet Cable, Optical Fibre;
Introduction to mobile telecommunication technologies Wireless Technologies – Bluetooth, WLAN, Infrared, Microwave
Network Protocol: Need for Protocol, Categorization and Examples of protocol, HTTP, FTP, IP, PPP; electronic mail protocol
Concept of Channel, Bandwidth (Hz, KHz, MHz) and Data Transfer rate (bps, Kbps, Mbps, Gbps, Tbps)
Threats and prevention: Viruses, Worms, Trojan horse, Spam, Cookies, Adware, Firewall, http vs https
Network Security Concepts: Firewall, Cookies, Hackers and Crackers Antivirus and their workings
Network security threats: Denial of service, Intrusion problems, Snooping, Eavesdropping
Computer science (SCERT)
Unit I: Computer Systems and Organisation
● Basic computer organisation: description of a computer system and mobile system, CPU, memory, hard disk, I/O, battery.
● Types of software: Application software, System software and Utility software.
● Memory Units: bit, byte, MB, GB, TB, and PB.
● Boolean logic: NOT, AND, OR, NAND, NOR, XOR, NOT, truth tables and De Morgan’s laws, Logic circuits
● Number System: numbers in base 2, 8, 16 and binary addition.
● Encoding Schemes : ASCII, ISCII and Unicode
● Concept of Compiler and Interpreter
● Operating System (OS) – need for an operating system, brief introduction to functions of OS, user interface
Unit II: Computational Thinking and Programming – 1
Introduction to Problem solving: Problem solving cycle – Analysing a problem, designing algorithms and representation of algorithm using flowchart and pseudo-code. Familiarization with the basics of Python programming: a simple “hello world” program, the process of writing a program (Interactive & Script mode), running it and print statements; simple data-types: integer, float and string.
● Features of Python, Python Character Set, Token & Identifiers, Keywords, Literals, Delimiters, Operators.
● Comments: (Single line & Multiline/ Continuation statements), Clarity & Simplification of expression
● Introduce the notion of a variable and methods to manipulate it (concept of L-value and R-value even if not taught explicitly).
● Knowledge of data types and operators: accepting input from the console, assignment statement, expressions, operators and their precedence.
● Operators & types: Binary operators-Arithmetic, Relational Operators, Logical Operators, Augmented Assignment Operators.
● Execution of a program, errors- syntax error, run-time error and logical error.
● Conditional statements: if, if-else, if-elif-else; simple programs: e.g.: absolute value, sort 3 numbers and divisibility of a number.
● Notion of iterative computation and control flow: for(range(),len()), while, using flowcharts, suggested programs: calculation of simple and compound interests, finding the factorial of a positive number etc.
● Strings: Traversal, operations – concatenation, repetition, membership; functions/methods–len(), capitalize(), title(), upper(), lower(), count(), find(), index(), isalnum(), islower(), isupper(), isspace(), isalpha(), isdigit(), split(), partition(), strip(), lstrip(), rstrip(), replace(); String slicing.
● Lists: Definition, Creation of a list, Traversal of a list. Operations on a list – concatenation, repetition, membership; functions/methods–len(), list(), append(), extend(), insert(), count(), index(), remove(), pop(), reverse(), sort(), min(), max(), sum(); Lists Slicing; Nested lists; finding the maximum, minimum, mean of numeric values stored in a list; linear search on list of numbers and counting the frequency of elements in a list.
● Tuples: Definition, Creation of a Tuple, Traversal of a tuple. Operations on a tuple – concatenation, repetition, membership; functions/methods – len(), tuple(), count(), index(), sorted(), min(), max(), sum(); Nested tuple; Tuple slicing; finding the minimum, maximum, mean of values stored in a tuple; linear search on a tuple of numbers, counting the frequency of elements in a tuple.
● Dictionary: Definition, Creation, Accessing elements of a dictionary, add an item, modify an item in a dictionary; Traversal, functions/methods – len(), dict(), keys(), values(), items(), get(), update(), del(), del, clear(), fromkeys(), copy(), pop(), popitem(), setdefault(), max(), min(), count(), sorted() copy(); Suggested programs : count the number of times a character appears in a given string using a dictionary, create a dictionary with names of employees, their salary and access them.
● Introduction to Python modules: Importing math module (pi, e, sqrt, ceil, floor, pow, fabs, sin, cos, tan); random module (random, randint, randrange), statistics module (mean, median, mode).
Unit III: Society, Law and Ethics
● Cyber safety: safely browsing the web, identity protection, confidentiality, social networks, cyber trolls and bullying.
● Appropriate usage of social networks: spread of rumours, and common social networking sites (Twitter, LinkedIn, and Facebook) and specific usage rules.
● Safely accessing web sites: adware, malware, viruses, trojans
● Safely communicating data: secure connections, eavesdropping, phishing and identity verification.
● Intellectual property rights, plagiarism, digital rights management, and licensing (Creative Commons, GPL and Apache), open source, open data, privacy.
● Privacy laws, fraud; cyber-crime- phishing, illegal downloads, child pornography, scams; cyber forensics, IT Act, 2000.
● Technology and society:
● understanding of societal issues and cultural changes induced by technology.
● E-waste management: proper disposal of used electronic gadgets.
● Identity theft, unique ids and biometrics.
● Gender and disability issues while teaching and using computers.