Maharashtra State Board Syllabus For 11th Information Technology: Knowing the Syllabus is very important for the students of 11th. Shaalaa has also provided a list of topics that every student needs to understand.
The Maharashtra State Board 11th Information Technology syllabus for the academic year 2023-2024 is based on the Board's guidelines. Students should read the 11th Information Technology Syllabus to learn about the subject's subjects and subtopics.
Students will discover the unit names, chapters under each unit, and subtopics under each chapter in the Maharashtra State Board 11th Information Technology Syllabus pdf 2023-2024. They will also receive a complete practical syllabus for 11th Information Technology in addition to this.
Maharashtra State Board 11th Information Technology Revised Syllabus
Maharashtra State Board 11th Information Technology and their Unit wise marks distribution
Maharashtra State Board 11th Information Technology Course Structure 2023-2024 With Marking Scheme
# | Unit/Topic | Weightage |
---|---|---|
1 | Basics of Information Technology | |
2 | Introduction to DBMS | |
3 | Impressive Web Designing | |
4 | Cyber Law | |
Total | - |
Syllabus
- An Introduction to IT (Information Technology)
- Definition of Information Technology
- Data and Information
- Need of information
- Computer
- Components of a Computer
- Types of Computer Memory
- Primary Memory
- Cache Memory
- Secondary Memory
- Primary Memory
- Random Access Memory (RAM) :
(i) Static Random Access Memory (SRAM)
(ii) Dynamic Random Access Memory (DRAM) - Read-Only Memory (ROM) :
(i) PROM (Programmable read-only memory)
(ii) EPROM (Erasable Programmable read-only memory)
(iii) EEPROM (Electrically erasable programmable read-only memory)
(iv) MROM (Mask ROM)
- Random Access Memory (RAM) :
- Secondary Memory Unit (Secondary Storage Devices)
- Hard Disk
- Compact Disc (CD)
- Digital Versatile Disc (DVD)
- Pen/ Flash Memory Devices
- Blu-Ray Disc
- Memory Stick
- Computer Hardware
- Computer Software
- Categories of a Software
- Open source software
- Closed source software
- Application Software
- General Purpose Software
- Customised Software
- System Software and Its Types
- Operating System
- System Utilities
- Device Drivers
- Operating Systems for Personal Computers
- Operating Systems for Mobile Phones
- Introduction to GNU/Linux
- Graphical User Interface (GUI)
- Command Line Interface (CLI)
- The GNU/Linux File System Hierarchy Standard
- Advantages of GNU/Linux
- Types of Computer Networks
- Personal Area Network (PAN)
- Local Area Network (LAN)
- Metropolitan Area Network (MAN)
- Wide Area Network (WAN)
- Wired/ wireless communication, Wi-Fi, Bluetooth, cloud computers
- Local Area Network (LAN)
- Metropolitan Area Network (MAN)
- Wide Area Network (WAN)
- Peer-to-peer Architecture
- Client-server Architecture
- Internet
- History of Internet
- Protocols
- IT Enabled Services
- Popular IT Enabled Service Centers
- Careers in IT
- Recent Trends in IT
- Green Computing
- Internet of Things (IoT)
- Cloud Computing
- Data Analytics (DA)
- Artificial Intelligence (AI)
- Machine Learning (ML)
- Big Data
- Blockchain
An introduction to IT (Information Technology)
- Definition of Information Technology
Data and Information
- Need of information
Computer
Computer - Input unit
Computer - Central Processing Unit (CPU)
Computer - Types of memory
> Primary Memory
> Secondary Memory
Computer - Output Unit
Units of Memory
Computer Hardware
Computer Software
Categories of a software
- Open source software
- Closed source software
Application Software
System Software
Operating Systems for Personal Computers
Operating Systems for Mobile Phones
Introduction to GNU/Linux
Graphical User Interface (GUI)
Command Line Interface (CLI)
The GNU/Linux File System Hierarchy Standard
Advantages of GNU/Linux
Types of computer Networks
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
Peer-to-Peer Architecture
Client-Server Architecture
Internet
History of Internet
Protocols
IT Enabled Services
Careers in IT
Recent trends in IT
- Green Computing
- Internet of Things (IoT)
- Cloud Computing
- Data Analytics (DA)
- Artificial Intelligence (AI)
- Machine Learning (ML)
- Big Data
- Blockchain
- Definition of a Database
- Data Vs Information
- Database Management System (DBMS)
- Introduction to DBMS
- Evolution of DBMS
- DBMS Concepts
- Characteristics of Database Management System
- Advantages of DBMS
- Components of DBMS
- Applications of DBMS
- Advantages of DBMS
- Data Types in the DBMS
- Data Model
- Types of Data Model
- Hierarchical Model
- Relational Model
- Network Database Model
- Entity Relationship Model
- Object Model
- Types of DBMS Users
- Relational Model of DBMS
- Properties of Transactions (ACID)
- Atomicity
- Consistency
- Isolation
- Durability
- Introduction of RDBMS
- Basic Database Concepts
- Relationships in a Database
- Introduction to SQL
- Types of SQL Commands
- Data Definition Language (DDL)
- Data Manipulation Language (DML)
- Data Query Language (DQL)
- Transaction Control Language (TCL)
- Data Control Language (DCL)
- Data Definition Language (DDL) Commands
- Data Manipulation Language (DML) Commands
- Data Control Language (DCL) Commands
Definition of a Database
Data vs Information
Introduction to Database Management System (DBMS)
Applications of DBMS
Advantages of DBMS
> Reducing Data Redundancy
> Sharing of Data
> Data Integrity
> Data Security
> Privacy
> Backup and Recovery
> Development and Maintenance Time
Data types in the DBMS
Data model
Relational Model of DBMS
Properties of Transactions (ACID)
- Atomicity
- Consistency
- Isolation
- Durability
Introduction of RDBMS
Basic Database Concepts
> Table
> Field
> Record
> Key
> Primary key
> Foreign Key
Relationships in a database
> One-to-One
> One-to-Many (or Many-to-One)
> Many-to-Many
Introduction to SQL
Data Definition Language (DDL) Commands
Data Manipulation Language (DML) Commands
Data Control Language (DCL) Commands
- Common Terms Used on the Web
Webpage, Website, Web Browser, Web Server, URL(Uniform Resource Locator), HTTP, HTML
- Introduction to HTML5
- Basic structure
- An attribute
- HTML Text Formatting Element
- HTML Heading Levels
- HTML Image
- HTML Table
- Html Hyperlinks
- Text hyperlinks
- Image hyperlinks
- HTML Forms
- Basic HTML Form Controls
- PHP Basic Form Handling
- Basic PHP Form Validation
- HTML Input Tag
- Attributes of Input
- HTML Textarea Tag
- HTML Select Tag
- Insertion of Javascript in HTML
- JavaScript Variables
- Basic Data types and Declaring variables
- Rules for naming variable
- Scope of variables
- Assigning values to variables
- JavaScript Literals
- Type casting in JavaScript
- JavaScript Data Types
- JavaScript Arithmetic Operators
- "+" Operator in Javascript
- JavaScript Assignment Operators
- JavaScript Relational Operators
- Javascript Logical Operators
- JavaScript Increment and Decrement Operators
- JavaScript Comments
- JavaScript "If" Statement
- JavaScript "Else" Statement
- JavaScript Functions
- JavaScript Event Handling
Common terms used on the web
Webpage, Website, Web Browser, Web Server, URL(Uniform Resource Locator), HTTP, HTML
Introduction to HTML5
- Basic structure
- An attribute
HTML tags
HTML Text formatting element
HTML Heading Levels
HTML Image
HTML Table
> Tags
> Attributes
> rowspan
> colspan
HTML hyperlinks
- Text hyperlinks
- Image hyperlinks
HTML Forms
HTML Input tag
- Attributes of Input
HTML Textarea tag
HTML Select tag
Insertion of JavaScript in HTML
JavaScript variables
JavaScript data types
> Number
> String
> Boolean
> Infinity
> null
> undefined
JavaScript arithmetic operators
"+" operator in JavaScript
JavaScript assignment operators
JavaScript relational operators
JavaScript logical operators
JavaScript increment and decrement operators
JavaScript comments
JavaScript "if" statement
JavaScript "else" statement
JavaScript functions
JavaScript event handling
- Introduction to Cyberlaw
- Advantages of Cyber Law
- Cyber Crimes
- Cyber Crime
- Hacking
- Phishing and Fraud Emails
(A) Identity Theft - Ransomware
- Combatting and Preventing Cyber Crime
- Cyber Crime Examples
- Software Piracy
- Unauthorized access
- Copyright violation
- Cracking
- Cyberbully or Cyberstalking
- Phishing
- Plagarism
- Hacking
- Spam mails
- Fraudulent emails
- Cyber Safety and Security
- Identify threats and risk
- Protection of data
- Identity protection
- Proper usage of passwords
- Privacy
- Confidentiality of information
- Recovery from a cyber attack
- Do’s and Don’ts for Students in Cyber World
- Security Procedures
- Encryption
- SSL (Secure Socket Layer)
- Firewall
- Cyber Crime Parental Guidance
- IT Act of India 2000
- Salient Features of I.T. Act
- Cyber Crime Case Studies
Introduction to Cyberlaw
Advantages of Cyber Law
Cyber Crime
Cyber Crime examples
- Software Piracy
- Unauthorized access
- Copyright violation
- Cracking
- Cyberbully or Cyberstalking
- Phishing
- Plagarism
- Hacking
Cyber Safety and Security
- Identify threats and risk
- Protection of data
- Recovery from a cyber attack
Do’s and Don’ts for students in cyber world
Security Procedures
- Encryption
- SSL (Secure Socket Layer)
- Firewall
Cyber Crime Parental guidance
IT Act of India 2000
- Salient Features of I.T. Act
Cyber Crime Case studies