0% found this document useful (0 votes)
19 views

class_xi_sqp_cs_set_i

This document is a sample question paper for Class XI in Computer Science, comprising two parts: Part A with short answer questions and case studies, and Part B with descriptive questions. The paper includes a variety of questions related to Python programming, cybercrime, and computer science concepts. It is structured to assess students' understanding and application of the subject matter within a 3-hour timeframe.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

class_xi_sqp_cs_set_i

This document is a sample question paper for Class XI in Computer Science, comprising two parts: Part A with short answer questions and case studies, and Part B with descriptive questions. The paper includes a variety of questions related to Python programming, cybercrime, and computer science concepts. It is structured to assess students' understanding and application of the subject matter within a 3-hour timeframe.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

SAMPLE PAPER -I

Class: XI
Subject: Computer Science (083)
Maximum Marks:70 Time Allowed: 3hours

_
General Instructions:
1. This question paper contains two parts A and B. Each part is compulsory.
2. Both Part A and Part B have choices.
3. Part-A has 2sections:
a. Section – I is short answer questions, to be answered in one word or one line.
b. Section – II has two case studies questions. Each case study has 4 case-based sub-
parts. An examinee is to attempt any 4 out of the 5 subparts.
4. Part - B is Descriptive Paper.
5. Part- B has three sections
a. Section-I is short answer questions of 2 marks each in which two question
have internal options.
b. Section-II is long answer questions of 3 marks each in which two questions
have internal options.
c. Section-III is very long answer questions of 5 marks each in which one question
has internal option.
6. All programming questions are to be answered using Python Language only
Q.NO Section-I Marks
Select the most appropriate option out of the options given for each question. Attempt allocated
any 15 questions from question no 1 to 21.
1 Which of the following is not a valid identifier name in Python? Justify reason for it 1
not being a valid name.

a) 5Total b) _Radius c) pie d)While

2 What is the output when following code is executed? 1


>>>str="kendriya"
>>>str[::-1]

3 Write the full form of RAM & ROM. 1

4 Which of the following is a relational operator in Python? 1


a) ? b) < c) = d) and e) //
5 Suppose a tuple T1 is declared as 1
T = (10, 20, 30, 40, 50,‟(1,‟a‟,3),‟b‟)
which of the following statement will print „a‟ ?
a) print(T[6][2])
b) print(T[6])
c) print(T[5][1])
d) print(t[5][1])

1|Page
6 Which of the following statement create a dictionary?
a) X = { }
b) X = {“Sohan”:40, “Mohan”:45}
c) X = dict()
d) All of the above
7 tuple is declared as T =
(10,5,5,10,15)
What will be the output of
>>> print(T+(„a‟,‟b‟))?
8 These are the small text files for storing a small piece of information related to someone‟s
online habits.
i. Spyware ii. Virus iii. Cookies iv. Spam
9 Which function out of the following will return the data type of the object:
1. type() 2. id() 3. ord() 4. str()
10 Your friend Suresh is complaining that he is receiving useless back-to-back mails
regarding downloading a software from their site. Identify the type of cybercrime for such
situations
11 Which of the following falls under utilities?
i. Text Editor ii. Backup iii. Disk Defragmenter iv. All of these
12 term refers to a person who purposely posts opposing, sarcastic, demeaning or insulting
comments about something or someone.
a. Cyber Criminal b. Cyber Thief c. Cyber troll d. Cyber stalker
13 Unauthorized monitoring of other people‟s communication is called:
a. Spamming b. Malware c. Adware d. Eavesdropping
14 Which of the following are the example of system software:
a. Operating system b. MS Office c. Aarogya setu app d. Games

15 Ramesh wants to print all the key values of the dictionary(D) so which of the following
command he should use:
1. print(d.key())
2. print(D.keys())
3. print(D.keys)
4. print(d.key_values())
16Identify the valid declaration of L:
= [„JAN‟, „12‟, „NEW YEAR‟, ‟365‟]
dictionary b. string
tupled. list
17 Suppose list=[0,1,2,3] the statement print(list*2) will print
a) [0, 1, 2, 3, 0,1,2,3] b) [0, 1, 2, 3, 1,2,3]
c) [0,2,4,6] d) [0,1,2,3]
18
Write the output of the following code:
S=”Kendriya”
for i in range(len(S)):
print(S[i],end=‟@‟)

19
Write the output of the following code:
L=[1,2,3,4,5,6]
for I in L:
if i%2==0:
print(“even”)
else:

2|Page
print(“odd”)
20 State output produced by the following code statements?
(i) 87//5
(ii) 87//5.0
21 The binary number(11011)2 will be equal to the which of the following decimal number:
1. 25 2. 33 3. 27 4. 4
Section-II
Both the Case study based questions are compulsory. Attempt any 4 sub parts from each
question. Each question carries 1 mark
22 Ravi a student of class XI has created the following code , helped him by writing the correct
code in space given in the following coding:

Line=”Kendriya Vidyalaya Jagdalpur:1564”


Length=______________# code for line1
print(“Total no of characters are :”,Length) cnt=0
for j in Line:
if j. : # code for line2
cnt +=1
print(“Total no of digits in given Line are”,_______) #code for line3
print(Line. ) # code for line4
print(“KV Code : ”,Line[ ]) # code for line5

Line 1 : Ravi wants to count the number characters in a string „Line‟.


Line 2 : Ravi wants to check whether the element in loop variable j is a digit or not.
Line 3 : Ravi wants to print the total number of digits in a string „Line‟
Line 4 : Ravi wants to change all the uppercase letters into lowercase and lowercase letters
into uppercase.
Line 5 : Ravi want to print the kv code i.e. 1564 which is given at the end of the string Line.
23 Identify the type of cyber crime/activity from the following Situations:
(a) A person who starts quarrels or upsets people on the internet to distract and sow
discord by posting inflammatory and digressive, extraneous or off-topic messages to
an online community. This person will be referred as in cyber world.
i. cyber troll ii. cyber stalker iii. Spyware iv. Hacker

(b) The activity of making false accusations or statements of fact, monitoring , making
threats, identity theft ,damage to data or gathering information that may be used to harass
someone by using internet or other electronic means. This may be referred as .
i. Cyber stalking ii. cyber bullying iii digital footprinting iv. Fishing

is the attempt to acquire sensitive information such as usernames, passwords and credit
card details by masquerading as a trustworthy entity in an electronic communication.
i. Pharming ii. Phishing iii. Attack iv. Malware

is an attack in which a hacker attempts to redirect a website‟s traffic to another fake or


bogus website.
i. Pharming ii. Phishing iii. Addware iv. Malware

refers to a type of malware that displays unwanted advertisement on your computer or


device.

3|Page
i. Pharming ii. spyware iii. Addware iv. Malware
Part B

Section-I
24
Evaluate the following expressions:
a) 15*(4%4)//2+6
b) not 10> 5 and 2 < 11 or not 10 < 2
25 What is an ip address?
26
Expand the following terms:
a) EEPROM b)VDU c)LCD d) OMR
27 What is a module in Python? Define any two functions of Math module in python.
OR
Write any two difference between List and Tuple.
28 Observe the following Python code very carefully and rewrite it after removing
all errors with each correction underlined.
Str=‟Jagdalpur” L=
length(Str) For j
in range(L)
Print(j)

29 How many times „Hello KV‟ will be printed after the execution of the following code:
for x in range(0,20,2):
print(“Hello KV”)
print(“Hello KV”*2)

30 Write any two difference between Virus and Worms.


31 Convert (2C9)16 into Octal number system.
32 Find out the errors in the code given below , underline each correction and write its correct
version:
Val = int(input("Value:"))
Adder = 0
for C in range(1,Val,3):
Adder =+ C if C%2
= 0;
print(C*10)
Else:
print(C*)
print(Adder)

33
Write the output of following python code
Str=‟Kendriya Vidyalaya Sangathan‟
print(Str,sep=‟@‟, end=‟:‟)
print(“Raipur Region”,end=‟!!!‟)
Section -II
34 a) How is clear() function is different from del statement?
b) What is the output produced by the following code: D={„rno‟:
[1,2,3],‟name‟:[„ravi‟,‟kavi‟,‟chhavi‟],‟marks:[20,23,25]}
print(D.values())

4|Page
print(D.keys())
35 Write a program to check whether the given string is a palindrome or not.
OR
State and prove the Demorgan Theorem.
36 Define the following terms:
i. Application software ii. Cache Memory iii. Language processor

37
What is Social Media? Give examples of some social media platform with their usage.
OR
Define any 3 methods to prevent identity theft?

Section- III
38 Write the function name for the following task:
1. Function to add a list element at the end of the existing list.
2. Function to remove all the elements of the dictionary.
3. Function to count the number of characters in a string.
4. Function to find the ASCII code of given character.
5. Function to find the index value of an element of the list.
39
Write a program to create a dictionary „Student‟ to store the data of 10 students ,with the key as
„rollno‟,‟name‟, ‟marks‟ and do the following:
i. Accept the details of 10 students and display it.
ii. Search & Display the details of a student on the basis of its rollno.
iii. Display the details of topper student.

Write the program to find the sum of the geometric series given below: S = a +
40 ar + ar2+ ar3+ ar4+ ar5+ ar6+ ar7+ ar8
OR
Write a program that reads a line and prints its frequency chart like:
1. Number of uppercase letters
2. Number of lowercase letter
3. Number of alphabets
4. Number of digits

5|Page

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy