Class 11 Computer Science Detailed Notes
Chapter 1: Computer System Overview
1.1 Introduction
A computer system is an integrated set of hardware and software components that process
data to generate useful information. It follows the Input-Process-Output cycle, where data is
entered, processed, and displayed as an output.
1.2 Components of a Computer System
1. Hardware – Physical components like CPU, RAM, storage devices, input and output
devices.
2. Software – Programs that run on hardware and perform tasks. Divided into:
o System Software (e.g., Operating System, Utilities)
o Application Software (e.g., MS Word, Web Browsers)
3. Firmware – Software embedded in hardware (BIOS, embedded systems).
4. Humanware – Users and IT professionals who interact with the system.
1.3 Types of Memory & Storage
Primary Memory: RAM (volatile) and ROM (non-volatile).
Secondary Storage: HDDs, SSDs, optical discs.
Cache Memory & Registers: High-speed memory close to the CPU for fast data
access.
1.4 Types of Computer Systems
Supercomputers – High-performance machines for complex calculations.
Mainframes – Large computers used in banking and finance.
Personal Computers (PCs) – Used for everyday tasks.
Embedded Systems – Specialized computers in devices like washing machines and
ATMs.
Chapter 2: Data Representation
2.1 Number Systems
Computers use different numbering systems to store and process data.
Binary (Base-2): Uses digits 0 & 1, fundamental to computer logic.
Octal (Base-8): Uses digits 0-7, sometimes used in computing.
Decimal (Base-10): Regular number system used by humans.
Hexadecimal (Base-16): Uses digits 0-9 and A-F, common in computer memory
addressing.
2.2 Data Encoding
ASCII (American Standard Code for Information Interchange) – Uses 7-bit
codes for characters.
Unicode – Supports multiple languages with a 16-bit encoding scheme.
BCD (Binary Coded Decimal) – Represents decimal numbers in binary form.
Gray Code – Used in error correction and digital circuits.
2.3 Conversion Between Number Systems
Decimal to Binary, Octal, Hexadecimal (and vice versa).
Binary Arithmetic (Addition, Subtraction, Multiplication, Division).
Chapter 3: Boolean Logic
3.1 Introduction
Boolean Logic is fundamental to digital circuits and programming, dealing with True (1) and
False (0).
3.2 Logic Gates
1. AND Gate – Output is 1 if both inputs are 1 (A·B).
2. OR Gate – Output is 1 if at least one input is 1 (A+B).
3. NOT Gate – Inverts input (1 becomes 0, and vice versa) (~A).
4. NAND, NOR, XOR, XNOR – Derived gates for complex operations.
3.3 Boolean Algebra
Boolean Expressions – Algebraic expressions using logic variables.
Truth Tables – Represent the outputs of logic gates.
Karnaugh Maps (K-Maps) – Used for simplification of Boolean expressions.
Chapter 14: Cyber Safety
14.1 Introduction
Cyber safety refers to protecting users and systems from cyber threats and maintaining online
privacy.
14.2 Common Cyber Threats
1. Phishing – Fake emails/websites trick users into revealing personal details.
2. Malware – Malicious software including viruses, worms, trojans, and ransomware.
3. Identity Theft – Stealing personal data to commit fraud.
4. Cyberbullying – Harassment or threats over digital platforms.
14.3 Best Practices for Cyber Safety
Use strong passwords and enable two-factor authentication.
Avoid suspicious links and emails.
Keep software and antivirus programs updated.
Educate yourself on privacy settings on social media.
Chapter 15: Online Access & Computer Security
15.1 Introduction
Computer security ensures the protection of data and systems from unauthorized access and
cyber threats.
15.2 Security Threats
1. Hacking – Gaining unauthorized access to systems.
2. Spyware – Secretly collects user data.
3. Trojan Horse – Malicious software disguised as useful applications.
4. Denial of Service (DoS) Attacks – Overloading systems to disrupt services.
15.3 Security Measures
Firewalls – Prevent unauthorized network access.
Antivirus software – Detects and removes malware.
Encryption – Converts data into a secure format to prevent hacking.
Multi-Factor Authentication (MFA) – Adds extra security layers for logins.
Chapter 16: Society, Law & Ethics
16.1 Introduction
This chapter covers the legal and ethical responsibilities of using technology in society.
16.2 Intellectual Property Rights (IPR)
1. Copyright – Legal right protecting original works (books, music, software).
2. Patents – Protects inventions from being copied.
3. Trademarks – Protects brand identity (logos, names).
16.3 Cyber Laws
IT Act 2000 (India) – Defines cybercrimes and legal frameworks for digital
transactions.
GDPR (General Data Protection Regulation) – Global regulation for protecting
user data and privacy.
16.4 Ethical Issues in Technology
Privacy Concerns – Misuse of personal data by companies and hackers.
Digital Piracy – Unauthorized distribution of copyrighted content.
AI Ethics – Issues related to bias and fairness in artificial intelligence.
End of Detailed Notes