CBSE Class 12 Computer Science Syllabus 2025-26

CBSE Class 12 Computer Science Syllabus 2025-26

The syllabus for CBSE Class 12 Computer Science is divided into theory and practical components. It aims to deepen students’ understanding of computational concepts, programming, database management, and societal impacts of computing. The syllabus builds on the knowledge gained in Class 11 and covers advanced topics such as data structures, object-oriented programming, database concepts, and network technologies.

The Central Board of Secondary Education (CBSE) has not yet released the official Class 12 Computer Science syllabus for the academic year 2025-26. The following information is based on the 2024-25 syllabus and is subject to change. Students are advised to consult the official CBSE website or their respective schools for the most current syllabus upon its release.

Unit 1: Computational Thinking and Programming – 2 (40 Marks)

This unit focuses on problem-solving techniques, advanced Python programming, working with data structures, file handling, and the basics of object-oriented programming (OOP).

1.1 Recursion

Recursion is an essential programming concept in which a function calls itself to solve a problem. Students will learn:

  • Recursion Basics: Understanding recursive functions, their structure, and when to use them.
  • Examples of Recursion: Problems like calculating the factorial of a number, generating Fibonacci series, and solving Tower of Hanoi will be used to demonstrate recursion.
  • Advantages of Recursion: Students will learn how recursion can simplify complex problems.
  • Drawbacks of Recursion: Recursion may lead to excessive memory usage and slower performance if not used properly.
1.2 Idea of Efficiency
  • Time Complexity and Space Complexity: Understanding how algorithms perform with different inputs and how to measure their efficiency in terms of time and space.
  • Big-O Notation: Students will learn to analyze algorithms using Big-O notation to express their worst-case time complexity.
1.3 Data Structures

A strong grasp of data structures is crucial for solving complex problems efficiently. This section covers essential data structures:

  • Stacks: A stack is a linear data structure that follows the Last In, First Out (LIFO) principle. Students will learn how to implement stacks using lists and use operations like push (insertion), pop (deletion), and peeking (viewing the top element).
  • Queues: A queue is a First In, First Out (FIFO) data structure. Students will implement queues using lists and work with operations like enqueue (adding elements) and dequeue (removing elements).
  • Operations on Data Structures:
    • Traversal: Going through the elements in a stack or queue.
    • Insertion and Deletion: Adding or removing elements.
    • Search: Finding an element in the data structure.
    • Sorting: Ordering elements.
1.4 Searching and Sorting Algorithms

Searching and sorting are fundamental operations on data structures. Students will learn:

  • Linear Search: A basic searching algorithm that checks each element in a list one by one.
  • Binary Search: A more efficient search algorithm that works on sorted lists by repeatedly dividing the list in half.
  • Sorting Algorithms:
    • Bubble Sort: A simple sorting algorithm that repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order.
    • Insertion Sort: A sorting algorithm that builds a sorted list one element at a time by picking unsorted elements and placing them in the correct position.
    • Selection Sort: A sorting algorithm that repeatedly selects the smallest element from the unsorted part of the list and places it in the sorted part.
1.5 File Handling

In Python, file handling is an important aspect that allows data to be stored and retrieved from files. Students will learn:

  • Text and Binary Files: Understanding the difference between text files (where data is stored in human-readable form) and binary files (where data is stored in a form that can be interpreted only by a computer program).
  • File Operations:
    • Opening Files: Using Python’s open() function to open text and binary files in various modes (read, write, append).
    • Reading and Writing: Using functions like read(), readline(), write(), and writelines() to read and write data from/to files.
    • Closing Files: The importance of closing files after operations using close().
    • File Handling with Exceptions: Understanding how to handle errors during file operations using try-except blocks.
1.6 Object-Oriented Programming (OOP) Concepts

This section introduces object-oriented programming, which is a paradigm based on the concept of “objects” that contain both data and methods.

  • Introduction to OOP: The advantages of OOP (such as code reusability, modularity, and scalability) will be introduced.
  • Class and Object:
    • Class: A blueprint for creating objects. It defines attributes (data) and methods (functions) that operate on the data.
    • Object: An instance of a class.
  • Constructor and Destructor:
    • Constructor: A special function called when an object is created (e.g., __init__() in Python).
    • Destructor: A special function called when an object is deleted (e.g., __del__() in Python).
  • Inheritance: A feature that allows a new class to inherit attributes and methods from an existing class.
  • Polymorphism: The ability of a function or method to behave differently based on the object that calls it.
  • Encapsulation: Bundling the data (variables) and the methods that operate on the data into a single unit (class), and controlling access to the data using access specifiers.
1.7 Advanced Programming Concepts
  • Iterators: Iterators in Python help in looping through sequences like lists, tuples, dictionaries, etc.
  • Generators: A function that returns an iterator that generates one value at a time as needed, allowing for memory-efficient looping.

Unit 2: Computer Networks (10 Marks)

This unit introduces students to networking concepts, protocols, and the Internet. Understanding networks is crucial for communication in modern computing environments.

2.1 Introduction to Computer Networks

A computer network is a system of interconnected computers that share resources and information. Students will learn:

  • Types of Networks:
    • LAN (Local Area Network): Covers a small geographic area like an office or a building.
    • WAN (Wide Area Network): Covers a large geographic area, often across cities or countries.
    • MAN (Metropolitan Area Network): Covers a city or a large campus.
    • PAN (Personal Area Network): Covers a small area, such as around an individual.
2.2 Network Devices
  • Modem: A device that modulates and demodulates data for transmission over telephone lines.
  • Router: A device that forwards data packets between networks.
  • Switch: A networking device that connects devices within a LAN and uses packet switching to forward data to the destination device.
  • Hub: A basic networking device that connects multiple computers in a network but doesn’t distinguish between devices.
  • Gateway: A node that acts as a bridge between two different networks.
2.3 Transmission Media
  • Wired Media:
    • Twisted Pair Cable: Used for telephone and computer networks.
    • Coaxial Cable: Used for cable television networks.
    • Optical Fiber: A high-speed medium used for long-distance communication.
  • Wireless Media:
    • Radio Waves: Used in wireless LANs and mobile communications.
    • Microwaves: Used for long-distance communication.
    • Infrared: Used for short-range communication like remote controls.
2.4 Network Topologies

The arrangement of devices in a network is called its topology. Different topologies include:

  • Bus Topology: All devices are connected to a single central cable.
  • Star Topology: All devices are connected to a central hub or switch.
  • Ring Topology: Devices are connected in a circular fashion.
  • Mesh Topology: Devices are interconnected, with each device connected to multiple other devices.
2.5 Internet and Its Uses

The Internet is the largest WAN in existence, connecting millions of computers worldwide. Students will learn about:

  • Internet Services: Email, file sharing, web browsing, etc.
  • Web Browsers: Software used to access information on the World Wide Web.
  • IP Address: A unique address that identifies a device on a network.
  • URL (Uniform Resource Locator): The address of a specific webpage or resource on the web.
2.6 Network Security

With the growing importance of networks, security is a crucial concern. Students will learn about:

  • Cyber Threats: Viruses, malware, phishing, and hacking.
  • Firewalls: Hardware or software that controls the incoming and outgoing network traffic.
  • Encryption: The process of encoding messages or information to prevent unauthorized access.
  • Digital Signatures: A way to verify the authenticity and integrity of a message or document.

Unit 3: Database Management Systems (20 Marks)

This unit focuses on relational databases, SQL (Structured Query Language), and database management systems. It provides students with the knowledge to design, manage, and query databases effectively.

3.1 Database Concepts
  • Introduction to Database: A structured collection of data stored electronically. Databases help in storing and retrieving large amounts of data efficiently.
  • DBMS (Database Management System): Software that interacts with end-users, applications, and the database to capture and analyze data. Examples include MySQL, Oracle, and SQL Server.
3.2 Relational Model
  • Tables (Relations): Data in relational databases is organized in tables. Each table consists of rows (Relations): Data in relational databases is organized in tables. Each table consists of rows (also called records or tuples) and columns (also known as attributes or fields).
  • Primary Key: A unique identifier for each record in a table. It ensures that no two rows have the same primary key value.
  • Foreign Key: An attribute in one table that links to the primary key of another table, establishing a relationship between two tables.
3.3 SQL (Structured Query Language)

SQL is the standard language used to interact with relational databases. In this syllabus, students will be introduced to:

  • DDL (Data Definition Language): Commands that define the structure of the database, such as:
    • CREATE: Used to create tables or databases.
    • ALTER: Used to modify the structure of an existing table.
    • DROP: Used to delete tables or databases.
  • DML (Data Manipulation Language): Commands used to manipulate data in the database, such as:
    • INSERT INTO: Adds new records to a table.
    • UPDATE: Modifies existing records.
    • DELETE: Removes records from a table.
  • DQL (Data Query Language): Commands used to retrieve data from the database, such as:
    • SELECT: Retrieves specific data from one or more tables.
    • WHERE Clause: Used to filter records based on conditions.
    • ORDER BY: Sorts the retrieved data in ascending or descending order.
    • GROUP BY: Groups rows that have the same values into summary rows.
    • HAVING Clause: Filters records in groups based on a condition.
    • JOIN Operations:
      • INNER JOIN: Returns records that have matching values in both tables.
      • LEFT JOIN: Returns all records from the left table, and the matched records from the right table.
      • RIGHT JOIN: Returns all records from the right table, and the matched records from the left table.
      • FULL JOIN: Returns records when there is a match in either table.
3.4 Database Transactions

A database transaction is a sequence of operations performed as a single logical unit of work. Students will learn:

  • ACID Properties: Transactions should satisfy the following properties:
    • Atomicity: Each transaction is treated as a single “all or nothing” unit.
    • Consistency: A transaction must maintain the integrity of the database.
    • Isolation: Transactions are isolated from each other until completed.
    • Durability: Once a transaction is committed, it remains in the system even in case of a system failure.
3.5 Database Normalization

Normalization is the process of organizing the data in a database to avoid redundancy and ensure data integrity. Students will learn about:

  • First Normal Form (1NF): Ensures that the values in a column are atomic (indivisible).
  • Second Normal Form (2NF): Eliminates partial dependency by ensuring that non-primary key attributes are fully dependent on the primary key.
  • Third Normal Form (3NF): Removes transitive dependency by ensuring that non-primary key attributes are not dependent on other non-primary key attributes.

Unit 4: Society, Law, and Ethics (10 Marks)

This unit introduces students to the social, legal, and ethical issues related to the use of computing technologies. It emphasizes the responsible use of technology and awareness of laws related to cybercrime.

4.1 Cyber Safety

Cyber safety involves practices that ensure the protection of users in the digital world. Students will learn:

  • Cyberbullying: Understanding the effects of cyberbullying and how to prevent it.
  • Data Privacy: The importance of protecting personal data from unauthorized access.
  • Cyber Stalking: How to identify and avoid situations where one might be stalked or harassed online.
4.2 Intellectual Property Rights (IPR), Plagiarism, and Licensing

Students will explore the concepts of intellectual property, which refer to the legal rights that individuals or organizations hold over creations of the mind. This section covers:

  • Copyright: Protects original works of authorship, including literary, artistic, and software creations.
  • Free and Open-Source Software (FOSS): Software that can be freely used, modified, and shared by anyone.
  • Plagiarism: The unethical practice of presenting someone else’s work or ideas as one’s own without proper acknowledgment.
4.3 Cyber Crime and Cyber Law

Cybercrime refers to illegal activities conducted via computers and the internet. This section covers:

  • Types of Cybercrimes:
    • Hacking: Unauthorized access to computer systems.
    • Phishing: Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
    • Identity Theft: Stealing personal information to commit fraud.
    • Ransomware: Malicious software that locks a user’s files, demanding payment to unlock them.
  • Indian IT Act: Legal frameworks like the Information Technology (IT) Act in India that define cybercrimes and prescribe punishments.
4.4 Online and Offline Security Measures

Security measures are critical to ensuring the safety of data and systems. Students will learn:

  • Firewalls: A system that prevents unauthorized access to or from a private network.
  • Antivirus Software: Programs designed to detect and remove malicious software.
  • Secure Passwords: The importance of creating strong passwords and using two-factor authentication for added security.

Practical (30 Marks)

The practical component involves working with Python and SQL, focusing on real-world applications. Students will also be assessed on their ability to manage databases and implement the theoretical concepts learned in class.

5.1 Python Programming

Students will write Python programs based on concepts like:

  • Functions: Creating and using custom functions.
  • Data Structures: Implementing stacks, queues, and linked lists using Python.
  • File Handling: Writing programs that read from and write to text and binary files.
  • OOP Concepts: Implementing classes and objects, and demonstrating inheritance and polymorphism.
5.2 SQL Programming

Students will practice writing SQL queries to create and manage databases, perform searches, and retrieve and manipulate data from relational databases.

5.3 Project Work

Students are required to complete a project that integrates Python and SQL concepts. The project should demonstrate problem-solving and database management skills. Suggested topics include creating web applications, management systems, or other real-world applications involving data processing and storage.

5.4 Viva Voce

The viva voce will assess the student’s understanding of Python programming and database management. Questions will focus on the logic and implementation behind their project, as well as their ability to explain the code they have written.


Internal Assessment (15 Marks)

The internal assessment will consist of:

  • Periodic Tests: Regular tests to evaluate the student’s understanding of theoretical and practical concepts.
  • Practical File Submission: Students will maintain a file documenting the Python and SQL programs written during practical sessions.
  • Project Evaluation: Projects will be graded based on their complexity, functionality, and adherence to programming standards.

Conclusion

The CBSE Class 12 Computer Science Syllabus for 2025-26 is designed to provide students with a comprehensive understanding of advanced programming concepts, data management, and network technologies. It emphasizes both theoretical and practical aspects, preparing students for higher studies in computer science and careers in software development, data science, and IT management. By the end of the course, students will have a strong foundation in Python programming, database management, and the ethical use of technology, equipping them with valuable skills for the digital world.