0% found this document useful (0 votes)
74 views

Xi CS QP

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views

Xi CS QP

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

KENDRIYA VIDYALAYA SANGATHAN LUCKNOW REGION

SESSION ENDING EXAMINATION (2022 – 23)


COMPUTER SCIENCE (083)
CLASS: XI
M.M.: 70 TIME: 3 HRS
General Instructions:
1. This question paper contains five sections, Sections A to E.
2. All questions are compulsory.
3. Section A have 18 questions carrying 01 mark each.
4. Section B has 07 Very Short Answer type questions carrying 02 marks each. 5.
Section C has 05 Short Answer type questions carrying 03 marks each. 6. Section D
has 03 Long Answer type questions carrying 05 marks each. 7. Section E has 02
questions carrying 04 marks each. One internal choice is given in Q35 against part c
only.
8. All programming questions are to be answered using Python Language only.

Section – A
Each question carries 1 mark

1. Give one example of software for the following categories:


1
a) Utility Software
b) Language Processor

2. Name the Python Library modules which need to be imported to invoke the 1
following functions:
a) randrange()
b) mean()

3. Which of the following is not done by cybercriminals?


1
a) Unauthorized account access
b) Mass attack using Trojans as botnets.
c) Email spooling and spamming
d) Report vulnerabilities in any system.
Page 1 of 6
4. ____________ are the records and traces individuals leave behind as they use 1
the Internet.
5. What will be the output for following Code?
1
a=[1,2,(3,4)]
a[2][1]=5
print(a)
a) [1,2,(3,4)]
b) [1,2,(3,5)]
c) [1,2,5]
d) None of the above
6. Which of the following is/are not legal python string?
1
a) ‘abc’+‘abc’
b) ‘abc’*3
c) ‘abc’+3
d) ‘abc’*‘abc’

7. Which of the following are the best security measures that should be taken
1
against phishing attacks?
a) Never open unknown or suspicious email attachments.
b) Never share your personal information such as email, credit card number, etc
on unknown sites.
c) Both a and b
d) None of these
8. Answer in True or False:
1
a) Like ‘+’, all other arithmetic operators are also supported by strings.
b) A=[ ] and A=list() will produce the same result.

9. What will be the output for following Code?


1
p=7*8/5//2**1**3
print(a)

10. Give brief description of ASCII encoding scheme. 1


11. Use functions from math module to write python expression for the mathematical 1
expression: |e2- x|

12. When do we need to use break statement in python programs? 1 Page 2 of 6

13. Write two advantages of Python Programming Language. 1

14. Arrange the following in ascending order of memory capacity:


1
TB, Byte, KB, Nibble, PB, MB, GB
15. Sunil got an assignment to write a python program which receives an integer and 1

prints the number after doubling it. He is not getting desired results, help Sunil to
find and correct the errors in his code given below:
Number=input(“Enter Number”)
DoubleTheNumber = Number*2
Print(DoubleTheNumber)

16. Things like online email account, social media account or handle, online shopping 1
account, online photo sharing account, trademarks, own registered domain name
etc. are collectively called _______________.
(a) Online Identity
(b) Online estate
(c) Digital identity
(d) Digital property

Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct choice as
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is False but R is True

17. Assertion (A): Strings in Python are mutable.


1
Reason (R): The first character has the index 0 and the last character has the
index n-1 where n is the length of the string.
18. Assertion(A): clear() method removes all elements from the dictionary 1

Reason(R): len() function cannot be used to find the length of a


dictionary. Section – B

Each question carries 2 marks


19. Define Intellectual Property Rights. Give the name of any two types of Intellectual 2

Property Rights.

Page 3 of 6
20. Predict the output of the Python code given below:
2
T=(1,2,3,4,5,6,7,8)
a) print (T [0])
b) print (T [3:4])
c) print (T [4:1])
d) print (T [2:6:2])

21. Differentiate between System Software and Application Software. 2 22. What are
mutable and immutable data types in Python? Give examples for each. 2

23. Draw the logic circuit diagram for the boolean expression: X=AB'+A’B+AB 2

Also, make a truth table to find the value of X

24. Write a short note on the Act which enforces cyber laws in India. 2 25. Draw a flowchart

to accept 3 numbers and display the largest number. 2

Section – C
Each question carries 3 marks

26. Discuss the following functions of Dictionary with suitable example: 3


a) pop()
b) popitem()
c) items()
27. Write a program to display and count the frequency of the characters of a given 3

string using a dictionary


For example:
inputstring= “banana”
The dictionary will be {‘b’:1, ‘a’: 3, ‘n’:2}
Output: frequency of b is: 1
frequency of a is: 3
frequency of n is: 2
28. Fill in the blanks:
3
a) 10 KB is equivalent to ___________ bytes.
b) Complete the DeMorgan’s Law, A’+B’=____________.
c) (125)10 = ( ________ )16 = ( __________ )8

Page 4 of 6
29. Shantanu wanted to gift his brother a football or a wrist watch. So, he searched 3
them online. But after that every time he goes online, his web browser shows him
advertisements about sports items and wrist watches.
(a) Why is this happening?
(b) How could have Shantanu avoided them?
(c) How can Shantanu get rid of this now?
30. Write a python program to print the following pattern:
3
1
23
345
4567
56789
Section – D
Each question carries 5 marks
31. Write python statements using the most appropriate list method/function to 5

perform the following tasks:


Given a list L having some elements.
(a) Add a new element 100 as 4th element in the given list L
(b) Add a new element 100 at the last position of the list L
(c) Delete 2nd element from the given list L
(d) Delete the element 100 from the given list
(e) Add elements of another given list L2 in given list L

32. Given a list p= [89, 22, 31, 56, 20].


5
a) Write python program for bubble sort.
b) Sort list p in ascending order using bubble sort, show the updated list after
each iteration.
OR

Given a list p= [89, 22, 31, 56, 20].


a) Write python program for insertion sort.
b) Sort list p in ascending order using insertion sort, show the updated list
after each iteration.

Page 5 of 6
33. The record of a student (Name, Roll No., Marks in five subjects, percentage of 5
marks) is stored in the following:
Record = ['Raman','A-36’, [56,98,99,72,69], 78.8]
Write Python statements to retrieve the following information from the list Record.
a) Percentage of the student
b) Marks in the fifth subject
c) Maximum marks of the student
d) Roll no. of the student
e) Change the name of the student from ‘Raman’ to ‘Raghav’

Section – E
Each question carries 4 marks
34. a) Write a Python program to input start and stop range from user and print all 4
Prime number in that range.
35. a) What can be done to reduce risk of identity theft? Write any two ways. 4

b) Suggest any two practices to ensure confidentiality of information. c)


Differentiate between General Public License (GPL) and Creative Commons
(CC) for licensing digital Properties.
OR (Option for part c only)
c) What are common gender and disability issues faced while teaching / using
computers in classrooms?

----:O:----

Page 6 of 6

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy