Maharashtra State Board 11th Standard Information Technology Syllabus - Free PDF Download
Maharashtra State Board Syllabus 2025-26 11th Standard: The Maharashtra State Board 11th Standard Information Technology Syllabus for the examination year 2025-26 has been released by the MSBSHSE, Maharashtra State Board. The board will hold the final examination at the end of the year following the annual assessment scheme, which has led to the release of the syllabus. The 2025-26 Maharashtra State Board 11th Standard Information Technology Board Exam will entirely be based on the most recent syllabus. Therefore, students must thoroughly understand the new Maharashtra State Board syllabus to prepare for their annual exam properly.
The detailed Maharashtra State Board 11th Standard Information Technology Syllabus for 2025-26 is below.
Maharashtra State Board 11th Standard Information Technology Revised Syllabus
Maharashtra State Board 11th Standard Information Technology and their Unit wise marks distribution
Maharashtra State Board 11th Standard Information Technology Course Structure 2025-26 With Marking Scheme
# | Unit/Topic | Weightage |
---|---|---|
1 | Basics of Information Technology | |
2 | Introduction to DBMS | |
3 | Impressive Web Designing | |
4 | Cyber Law | |
Total | - |
Advertisements
Advertisements
Advertisements
Syllabus
- An Introduction to IT (Information Technology)
- Definition of Information Technology
- Data and Information
- Data
- Information
- Computer
- Introduction
- Architecture of Computer
- Components of a Computer
- Central Processing Unit (CPU)
- Arithmetic and Logic Unit
- Control Unit
- Memory Unit
- Central Processing Unit (CPU)
- Types of Computer Memory
- Primary Memory
- Cache Memory
- Secondary Memory
- Primary Memory
- Random Access Memory (RAM) :
(i) Static Random Access Memory (SRAM)
(ii) Dynamic Random Access Memory (DRAM) - Read-Only Memory (ROM) :
(i) PROM (Programmable read-only memory)
(ii) EPROM (Erasable Programmable read-only memory)
(iii) EEPROM (Electrically erasable programmable read-only memory)
(iv) MROM (Mask ROM)
- Random Access Memory (RAM) :
- Secondary Memory Unit (Secondary Storage Devices)
- Hard Disk
- Compact Disc (CD)
- Digital Versatile Disc (DVD)
- Pen/ Flash Memory Devices
- Blu-Ray Disc
- Memory Stick
- Computer Hardware and Software
- Categories of a Software
- Open source software
- Closed source software
- Application Software
- System Software
- Introduction to Operating System (OS)
- Basics of Graphical User Interface (GUI)
- Introduction to Graphical User Interface (GUI)
- Components of a Window
- Advantages of GUI
- Command Line Interface (CLI)
- LINUX
- Introduction to LINUX
- Features of LINUX
- Components of LINUX
- Types of Networks
- Introduction
- Local Area Network (LAN)
- Metropolitan Area Network (MAN)
- Wide Area Network (WAN)
- Network Configurations
- Introduction
- Peer-to-Peer configuration
- Client-Server configuration
- Internet
- Introduction
- History Of Internet
- Network Protocol
- Need for Protocols
- IT Enabled Services
- Meaning
- Popular IT Enabled Service Centers
- Careers in IT
- Web Designer and Developer
- Software Developer
- Database Manager
- Information Security Analyst
- Professional Accountant
- Financial Advisor
- Cyber Advisor
- Animator
- Games developer
- Audio / Video Editor
- Recent Trends in IT
- Green Computing
- Internet of Things (IoT)
- Cloud Computing
- Data Analytics (DA)
- Artificial Intelligence (AI)
- Machine Learning (ML)
- Big Data
- Blockchain
- Database
- Database Management System Software (DBMS)
- Applications of DBMS
- Railway Reservation System
- Library Management System
- Banking
- Universities and Colleges
- Credit Card Transactions
- Social Media Sites
- Advantages of DBMS
- Reducing Data Redundancy
- Sharing of Data
- Data Integrity
- Data Security
- Privacy
- Backup and Recovery
- Development and Maintenance Time
- Data Types in the DBMS
- Introduction to Data Model
- Relational Model of DBMS
- Properties of Transactions (ACID)
- Atomicity
- Consistency
- Isolation
- Durability
- Introduction of RDBMS
- Basic Database Concepts
- Table
- Field
- Record
- Key
- Primary Key
- Foreign Key
- Relationships in a Database
- One to One
- One-to-Many (or Many-to-One)
- Many-to-Many
- Introduction to SQL
- Categories of SQL Commands
- Data Definition Language (DDL) Commands
- Data Manipulation Language (DML) Commands
- Data Control Language (DCL) Commands
- Introduction to Web Designing
- Components of web
- Webpage and Website
- Web Browser
- Web Server
- URL(Uniform Resource Locator)
- HTTP
- HTML
- Introduction to HTML
- Introduction
- Basic Structure
- An Attribute
- Types Of Tags
- Different Tags in HTML
- Tags defining basic structures of a tag
- Text formatting tags
- Heading level Tags
- Tags used for inserting an image
- Tags for a horizontal ruled line and paragraph
- HTML Table
- Tags used to create table
- Attributes of Table
- Attributes of <tr>,<th>, <td>
- HTML Hyperlinks
- Form and Form Controls in HTML
- Tags Used to Create Form in HTML
- <INPUT> Tag
- <TEXTAREA> Tag
- <Select> Tag
- Javascript in HTML
- Variables in Javascript
- Data Types in Java
- Arithmetic Operators
- '+' in Javascript
- Assignment Operators(=)
- Relational Operator
- Logical Operator
- Comments in Javascript
- Decision Making Statement in Javascript
- If statement
- If Else Statement
- JavaScript Functions
- JavaScript Event Handling
- Introduction to Cyberlaw
- Introduction
- Ethics and Morals
- Advantages of Cyber Law
- Cyber Crime
- Cyber Crime Examples
- Software Piracy
- Unauthorized access
- Copyright violation
- Cracking
- Cyberbully or Cyberstalking
- Phishing
- Plagarism
- Hacking
- Cyber Safety and Security
- Identify threats and risk
- Protection of data
- Recovery from a cyber attack
- Educate your stakeholders
- Do’s and Don’ts for Students in Cyber World
- Security Procedures
- Encryption
- SSL (Secure Socket Layer)
- Firewall
- Parental Guidance
- Indian Information Technology Act (IT Act)
- Salient features of IT Act