100% found this document useful (1 vote)
522 views

Class XI Sample Exam Paper CS

The document details an examination for Class XI Computer Science students. It contains 35 questions divided into 5 sections - Section A contains 18 one mark questions, Section B contains 7 two mark questions, Section C contains 5 three mark questions, Section D contains 2 four mark questions and Section E contains 3 five mark questions. The questions cover topics related to Python programming, cyber security, data structures and algorithms.

Uploaded by

arangaming246
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
522 views

Class XI Sample Exam Paper CS

The document details an examination for Class XI Computer Science students. It contains 35 questions divided into 5 sections - Section A contains 18 one mark questions, Section B contains 7 two mark questions, Section C contains 5 three mark questions, Section D contains 2 four mark questions and Section E contains 3 five mark questions. The questions cover topics related to Python programming, cyber security, data structures and algorithms.

Uploaded by

arangaming246
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Annual Examination

Class: XI
Session: 2023-24
Computer Science (083)

Time allowed: 3 Hours Maximum Marks: 70

General Instructions:
 Please check this question paper contains 35 questions.
 The paper is divided into 5 Sections- A, B, C, D and E.
 Section A, consists of 18 questions (1 to 18). Each question carries 1 Mark.
 Section B, consists of 7 questions (19 to 25). Each question carries 2 Marks.
 Section C, consists of 5 questions (26 to 30). Each question carries 3 Marks.
 Section D, consists of 2 questions (31 to 32). Each question carries 4 Marks.
 Section E, consists of 3 questions (33 to 35). Each question carries 5 Marks.
 All programming questions are to be answered using Python Language only.

Q No. Questions Marks


Section-A (18 Marks)
1 Which of the following is an invalid string operation to be used in 1
Python?
a. „Wel‟ + „come‟ b. „Welcome‟ * 2
c. „Welcome‟ +2 d. 2* „Welcome‟
2 What is the correct way to add an element to the end of a list in 1
Python?
a. list.add(element) b. list.append(element)
c. list.insert(element) d. list.extend(element)

3 What will be the output of 1


print("Welcome To My Blog"[2:6] + "Welcome
To My Blog"[5:9])

a. Lcomme b. lcomme T c. lcomme To d. lcomme

4 Consider a declaration L = (1, 'Python', '3.14') Which of the following 1


represents the data type of L?
a. list b. tuple c. dictionary d. string
5 Which of the following is not an example of cybercrime? 1
a. Cyber trolling b. Identity Theft c. Net banking d. Phishing

6 Given a Tuple tup1= (10, 20, 30, 40, 50, 60, 70, 80, 90). 1
What will be the output of print (tup1 [3:7:2])?
a. (40,50,60,70,80) b. (40,50,60,70) c. [40,60] d. (40,60)

7 The full form of virus is – 1


a. Vital Resources Under Seize
b. Virtual Resources Under Seize
c. Virtual Information Under Seize
d. Vital Information Under Seize

1
8 Which of the following operator cannot be used with string data 1
type?
a. + b. in c. * d. /

9 Which of the following is not a component of the math module in 1


Python?

a. ceil() b. mean() c. fabs() d. pi

10 What will be the output of the following code? 1


L=["One , Two", "Three", "Four"]
print(len(L)/2*len(L[0]))

a. 6.5 b. 13 c. 13.5 d. 6.0


11 Consider a tuple tup1 = (10, 15, 25, 30). Identify the statement that 1
will result in an error.
a. print(tup1[2]) b. tup1[2] = 20
c. print(min(tup1)) d. print(len(tup1))
12 Which of these about a dictionary is false? 1

a) The values of a dictionary can be accessed using keys


b) The keys of a dictionary can be accessed using values
c) Dictionaries aren‟t ordered
d) Dictionaries are mutable

13 Which of the following statement(s) would give an error during


execution of the following code?

tup = (20,30,40,50,80,79)
print(tup) #Statement 1
print(tup[3]+50) #Statement 2
print(max(tup)) #Statement 3
tup[4]=80 #Statement 4

a. Statement 1 b. Statement 2 c. Statement 3 d. Statement 4


14 Which of the following will delete key-value pair for key = “Red”
from a dictionary D1?
a. delete D1("Red")
b. del D1["Red"]
c. del.D1["Red"]
d. D1.del["Red"]

15 It is a type of extortion virus that locks your computer and refuses to let 1
you access information unless you pay some amount.
a. Trojan Horse b. Spyware c. Ransom ware d. Adware
16 Select the correct output of the code: 1
s="Python is fun"
l=s.split()
s_new="-“.join([l[0].upper(),l[1],l[2].capitalize()])
print(s_new)

a. PYTHON-IS-Fun b. PYTHON-is-Fun
c. Python-is-fun d. PYTHON-Is -Fun
Q17 and 18 are ASSERTION AND REASONING based questions.
Mark the correct choice as
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
17 Assertion (A): Disposal of e-waste is an emerging global 1
environmental and public health issue, as this waste has become the
most rapidly growing segment.
Reasoning (R): The emission of fumes, gases and particulate matter in
to the air, the discharge of liquid waste in to water and drainage system,
and the disposal of hazardous waste contribute to environmental
degradation.
18 Assertion(A): List is an immutable data type 1
Reasoning(R): When an attempt is made to update the value of an
Immutable variable, the old variable is destroyed and a new variable is
created by the same name in memory.
Q No. Questions Marks
Section-B (14 Marks)
19 List any two guidelines to avoid plagiarism. 2
OR
Explain the need of protecting intellectual rights.

20 Rewrite the following code in Python after removing all the syntax 2
errors. Underline each correction done in the code.
num1, num2 = 10, 45
While num1 % num2 ==0
num1+= 20
num2+= 30
Else:
print('hello')

OR
Write a Python program to accept a number from the user
and calculate its square root. Also find the ceil and floor
value of the result.
21 Study the following program and select the possible output(s) from the 2
options (i) to (iv) following it. Also, write the maximum and the
minimum values that can be assigned to the variable Y.
import random
X=random.random( )
Y=random.randint(0,4)
print(int(X), “:”, Y+int(X))

a. 0:0 b. 1:6 c. 2:4 d. 0:3


OR
Write few strategies to keep your data confidential
22 Why the right of Privacy of individuals so important in today‟s world? 2
OR
Write a Python Program to merge two dictionaries

23 Write a suitable Python statement for each of the following tasks using 2
built-in functions/methods only:
i. To delete an element “Mumbai: 50” from Dictionary D.
ii. To display words in a string S in the form of a list
OR
Write a Python Program to display alternate characters of a string my_str.
For example, if my_str = "Computer Science" The output should be
Cmue cec

24 Write the Python statement for each of the following tasks using 2
BUILT-IN functions/methods only:
(i) To insert an element 200 at the third position, in the list L1.
(ii) To check whether a string named, message ends with a full stop /
period or not.
OR
A list named StudentAge stores age of students of a class. Write the
Python command to import the required module and (using built-in
function) to display the most average age value from the given list.
25 Write a Program in Python that traverse the dictionary, PLACES and 2
displays the names in uppercase of the places whose names are longer
than 5 characters.

For example, Consider the following dictionary


PLACES={1:"Delhi",2:"London",3:"Paris",4:"New York",5:"Doha"}

The output should be:


LONDON
NEW YORK
OR
Write two differences between VIRUS and WORM
Q No Questions Marks
Section-C (15 Marks)
26 What is digital society and who are netizens? Mention some netiquettes 3
that you must follow while you are online.
OR
Write a short note on Information Technology Act 2000
27 Define the following terms 3
a) Phishingh
b) Evesdroping
c) Plagiarism

28 Find the output of following Python code 3


Name= “WondeR@1"
R= “ ”
for x in range(len(Name)):
if Name[x].isupper( ):
R=R+Name[x].lower( )
elif Name[x].islower( ):
R=R+Name[x].upper( )
elif Name[x].isdigit( ):
R=R+Name[x-1]
else:
R=R+ “#”
print(R)

29 Write the output of the following Python program code: 3


L=[ ]
L1=[ ]
L2=[ ]
for i in range(1,10):
L.append(i)
for i in range(10,1,–2):
L1.append(i)
for i in range(len(L1)):
L2.append(L1[i]+L[i])
print(L)
print(L1)
print(L2)

30 Define Digital Footprints. What are the two types of Digital Footprints? 3
Write two positive and two negative implications of Digital Footprints.
Q No Questions (Case Study Based) Marks
Section-D (8 Marks)

31 ICT has the ability to empower both teachers and students. Teacher can 4
create groups and teams for assignment and project work so that every
girl and boy student has equal opportunity, access to resources and a
common platform to collaborate and share their work. In the context of
ICT, gender is a significant issue. Girls and boys use computing
technology in different ways depending on their confidence levels,
preferences, and attitudes. According to certain studies, boys utilize ICT
for educational purposes more than girls in senior secondary school.
When it comes to boy‟s and girl‟s opinions regarding ICT in primary
school, girls value their ability to work but boys are more concerned with
plying games or having limited access to machine.

Read above paragraph carefully and answer the following questions

a) What are the various gender related issues, faced by a teacher while
teaching computer?
b) Why boys utilize ICT for educational purposes more than girls in
senior secondary school?
c) “In primary school, girls value their ability to work but boys are
more concerned with plying games or having limited access to
machine”. What is your opinion about this statement?
d) According to you, what should be the various strategies to solve
gender related issues while teaching computer?

32 Consider the following code and answer the questions that follow: 4
Book={1:'Thriller', 2:'Mystery', 3:'Crime', 4:'Children Stories'}
Library ={'5':'Madras Diaries','6':'Malgudi Days'}

a) Ramesh needs to change the title in the dictionary book from


„Crime‟ to „Crime Thriller‟. But he doesn‟t know the command.
Help him write the correct command.
b) The Python command to merge the dictionary Book with Library.
c) What will be the output of the following line of code:
>>>Book.items()
d) What will be the output of the following line of code:
Library=Book
Library.pop(2)
print(Library)
print(Book)
Q No Questions Marks
Section-E (15 Marks)
a) Age of 10 students of class XI is stored in a list as 3+2
33 age=[14, 15, 16, 14, 16, 15, 16, 15, 14, 15]
Write a Python program to calculate the mean, median and mode of age
of students.
b) What is Identity Theft? Write few ways to prevent identity theft.
34 Consider the following string: 5
str="Never complain and Never explain"
What will be the output of following string operations?
a. print(str.split(' '))
b. print(str.partition('ain'))
c. print(str[::-2])
d. print(str.swapcase())
e. print(str[:5]+” “+str[-13:24])
f. print(str[19:24]*3)
g. print('-'.join(str[6:14]))
h. print(str.replace('Never','Always'))
i. print(str.title())
j. print(str.upper())
35 a) Write any two differences between Free Software and Open Source 2+3
Software.

b) What do mean by Intellectual Property Rights (IPR)? Explain the


following terms
 Copyright
 Patent
 Trademark

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy