class_xi_sqp_cs_set_i
class_xi_sqp_cs_set_i
Class: XI
Subject: Computer Science (083)
Maximum Marks:70 Time Allowed: 3hours
_
General Instructions:
1. This question paper contains two parts A and B. Each part is compulsory.
2. Both Part A and Part B have choices.
3. Part-A has 2sections:
a. Section – I is short answer questions, to be answered in one word or one line.
b. Section – II has two case studies questions. Each case study has 4 case-based sub-
parts. An examinee is to attempt any 4 out of the 5 subparts.
4. Part - B is Descriptive Paper.
5. Part- B has three sections
a. Section-I is short answer questions of 2 marks each in which two question
have internal options.
b. Section-II is long answer questions of 3 marks each in which two questions
have internal options.
c. Section-III is very long answer questions of 5 marks each in which one question
has internal option.
6. All programming questions are to be answered using Python Language only
Q.NO Section-I Marks
Select the most appropriate option out of the options given for each question. Attempt allocated
any 15 questions from question no 1 to 21.
1 Which of the following is not a valid identifier name in Python? Justify reason for it 1
not being a valid name.
1|Page
6 Which of the following statement create a dictionary?
a) X = { }
b) X = {“Sohan”:40, “Mohan”:45}
c) X = dict()
d) All of the above
7 tuple is declared as T =
(10,5,5,10,15)
What will be the output of
>>> print(T+(„a‟,‟b‟))?
8 These are the small text files for storing a small piece of information related to someone‟s
online habits.
i. Spyware ii. Virus iii. Cookies iv. Spam
9 Which function out of the following will return the data type of the object:
1. type() 2. id() 3. ord() 4. str()
10 Your friend Suresh is complaining that he is receiving useless back-to-back mails
regarding downloading a software from their site. Identify the type of cybercrime for such
situations
11 Which of the following falls under utilities?
i. Text Editor ii. Backup iii. Disk Defragmenter iv. All of these
12 term refers to a person who purposely posts opposing, sarcastic, demeaning or insulting
comments about something or someone.
a. Cyber Criminal b. Cyber Thief c. Cyber troll d. Cyber stalker
13 Unauthorized monitoring of other people‟s communication is called:
a. Spamming b. Malware c. Adware d. Eavesdropping
14 Which of the following are the example of system software:
a. Operating system b. MS Office c. Aarogya setu app d. Games
15 Ramesh wants to print all the key values of the dictionary(D) so which of the following
command he should use:
1. print(d.key())
2. print(D.keys())
3. print(D.keys)
4. print(d.key_values())
16Identify the valid declaration of L:
= [„JAN‟, „12‟, „NEW YEAR‟, ‟365‟]
dictionary b. string
tupled. list
17 Suppose list=[0,1,2,3] the statement print(list*2) will print
a) [0, 1, 2, 3, 0,1,2,3] b) [0, 1, 2, 3, 1,2,3]
c) [0,2,4,6] d) [0,1,2,3]
18
Write the output of the following code:
S=”Kendriya”
for i in range(len(S)):
print(S[i],end=‟@‟)
19
Write the output of the following code:
L=[1,2,3,4,5,6]
for I in L:
if i%2==0:
print(“even”)
else:
2|Page
print(“odd”)
20 State output produced by the following code statements?
(i) 87//5
(ii) 87//5.0
21 The binary number(11011)2 will be equal to the which of the following decimal number:
1. 25 2. 33 3. 27 4. 4
Section-II
Both the Case study based questions are compulsory. Attempt any 4 sub parts from each
question. Each question carries 1 mark
22 Ravi a student of class XI has created the following code , helped him by writing the correct
code in space given in the following coding:
(b) The activity of making false accusations or statements of fact, monitoring , making
threats, identity theft ,damage to data or gathering information that may be used to harass
someone by using internet or other electronic means. This may be referred as .
i. Cyber stalking ii. cyber bullying iii digital footprinting iv. Fishing
is the attempt to acquire sensitive information such as usernames, passwords and credit
card details by masquerading as a trustworthy entity in an electronic communication.
i. Pharming ii. Phishing iii. Attack iv. Malware
3|Page
i. Pharming ii. spyware iii. Addware iv. Malware
Part B
Section-I
24
Evaluate the following expressions:
a) 15*(4%4)//2+6
b) not 10> 5 and 2 < 11 or not 10 < 2
25 What is an ip address?
26
Expand the following terms:
a) EEPROM b)VDU c)LCD d) OMR
27 What is a module in Python? Define any two functions of Math module in python.
OR
Write any two difference between List and Tuple.
28 Observe the following Python code very carefully and rewrite it after removing
all errors with each correction underlined.
Str=‟Jagdalpur” L=
length(Str) For j
in range(L)
Print(j)
29 How many times „Hello KV‟ will be printed after the execution of the following code:
for x in range(0,20,2):
print(“Hello KV”)
print(“Hello KV”*2)
33
Write the output of following python code
Str=‟Kendriya Vidyalaya Sangathan‟
print(Str,sep=‟@‟, end=‟:‟)
print(“Raipur Region”,end=‟!!!‟)
Section -II
34 a) How is clear() function is different from del statement?
b) What is the output produced by the following code: D={„rno‟:
[1,2,3],‟name‟:[„ravi‟,‟kavi‟,‟chhavi‟],‟marks:[20,23,25]}
print(D.values())
4|Page
print(D.keys())
35 Write a program to check whether the given string is a palindrome or not.
OR
State and prove the Demorgan Theorem.
36 Define the following terms:
i. Application software ii. Cache Memory iii. Language processor
37
What is Social Media? Give examples of some social media platform with their usage.
OR
Define any 3 methods to prevent identity theft?
Section- III
38 Write the function name for the following task:
1. Function to add a list element at the end of the existing list.
2. Function to remove all the elements of the dictionary.
3. Function to count the number of characters in a string.
4. Function to find the ASCII code of given character.
5. Function to find the index value of an element of the list.
39
Write a program to create a dictionary „Student‟ to store the data of 10 students ,with the key as
„rollno‟,‟name‟, ‟marks‟ and do the following:
i. Accept the details of 10 students and display it.
ii. Search & Display the details of a student on the basis of its rollno.
iii. Display the details of topper student.
Write the program to find the sum of the geometric series given below: S = a +
40 ar + ar2+ ar3+ ar4+ ar5+ ar6+ ar7+ ar8
OR
Write a program that reads a line and prints its frequency chart like:
1. Number of uppercase letters
2. Number of lowercase letter
3. Number of alphabets
4. Number of digits
5|Page