Computer Science XI QP SEE Set 1
Computer Science XI QP SEE Set 1
General Instructions:
● This question paper contains 37 questions.
● All questions are compulsory. However, internal choices have been provided in some questions.
Attempt only one of the choices in such questions
● The paper is divided into 5 Sections- A, B, C, D and E.
● Section A consists of 21 questions (1 to 21). Each question carries 1 Mark.
● Section B consists of 7 questions (22 to 28). Each question carries 2 Marks.
● Section C consists of 3 questions (29 to 31). Each question carries 3 Marks.
● Section D consists of 4 questions (32 to 35). Each question carries 4 Marks.
● Section E consists of 2 questions (36 to 37). Each question carries 5 Marks.
● All programming questions are to be answered using Python Language only.
● In case of MCQ, text of the correct answer should also be written.
4. Which among the following operators has the highest precedence in python 1
expression:
A) == B) +
C) and D) <=
14. The IT Act 2000 aims to provide legal recognition to electronic transactions 1
and defines the offense of ________ under Section 66, which involves
unauthorized access to computer systems or networks.
A) Hacking B) eavesdropping
C) Phishing D) Cyberbullying
Page 2 of 9
>>> R=3,4+8,9
>>> R
A) (3,12,9) B) (3,4,8,9)
C) (11,13) D) Error
16. Consider a dictionary given below and write the output of given python 1
code:
Sports={“baseball”:9, “cricket”:11, “carrom”:2}
print(sorted(Sports))
A) {“carrom”:2, “baseball”:9, “cricket”:11}
B) ['baseball', 'carrom', 'cricket']
C) {“baseball”:9, “carrom”:2, “cricket”:11}
D) [2,9,11]
19. If someone infects your computer using malicious software and display 1
message demanding a fee to be paid in order to access the computer, is
known as ___________ cybercrime.
Q.20 and Q.21 are Assertion(A) and Reason(R) based questions. Mark
the correct choice as:
A. Both A and R are true and R is the correct explanation for A
B. Both A and R are true and R is not the correct explanation for A
C. A is True but R is False
D. A is False but R is True
20. Assertion (A): Strong passwords and two-factor authentication are critical 1
components of cyber safety.
Reason (R): Strong passwords make it significantly harder for
cybercriminals to gain unauthorized access to sensitive accounts and
systems.
21. Assertion (A): In Python, lists can contain elements of different data 1
types.
Reason (R): Lists are homogeneous, meaning they can only store
elements of the same data type.
Page 3 of 9
SECTION-B ( 7 x 2=14 Marks)
23. Write the equivalent Boolean expression for the given logic circuit: 2
output=?
A. not 1+2//3+4
OR
B. print(int(3.5)+6//5**0)
25. The code provided below is intended to find the factorial of an integer 2
number. However, there are syntax and logical errors in the code.
Rewrite the code in python after removing all error(s). Underline each
correction done in the code.
num=int(input("Enter a number: "))
if num<0
print("Factorial not defined for negative numbers")
Elif num==0:
fact=1
print(fact)
else:
fact=1
for i in range(1,num):
fact=*i
print(fact)
Page 4 of 9
26. Write a python program to print the following pattern using loops: 2
*
* *
* * *
* * * *
27. i. 2
A. Define the term “Intellectual Property”.
OR
B. Define the term ‘Plagiarism’ under data protection.
ii.
A. Write name of any two Intellectual Property.
OR
B. Write name of any two open source software.
28. Write any two common gender issues while teaching and using computers. 2
OR
What is e-waste? Describe any two harmful effects of improper disposal of
e-waste.
SECTION-C ( 3 x 3 = 9 Marks)
Page 5 of 9
Name of vegetable is working as key and their quantity in stock is
working as value.
vegetable = {"potato":5, "onion":2, "tomato":7, "carrot":3}
Help him to perform the following operations with given dictionary
using Built-in functions only:
a) Create a DEEP/TRUE copy of dictionary vegetable in a new
dictionary named as D.
b) Display all values of the dictionary vegetable.
c) Remove key-value pair for the key “onion”.
SECTION-D ( 4 x 4 = 16 Marks)
32. i. 4
A. Write a python program to take a string from user and count and
display the occurrence of the word “science” in the given string.
B. Write a python program to take a string from user and display
number of digits present in the given string.
OR
ii.
Page 6 of 9
A. Write a python program to take a string from user and display
those words which start with the letter ‘m’.
B. Write a python program to take a string from user and count
number of vowels present in the string.
33. Ms. Sujata wants to store the marks of N number of students in a list. Help 4
her to perform the following functions with the list:
i. Create a list named as “Marks” to store the marks of N students by
taking the marks from user and display the list.
ii. After creating the list, add the marks of one more student with value
78 in the end of the list.
iii. Delete the marks of a student which is present at index 4.
iv. Display marks of student in decreasing order of marks.
Page 7 of 9
her of using pirated software. Identify the cybercrime/malware
discussed in this scenario.
SECTION-E (2 X 5 = 10 Marks)
Page 8 of 9
37. Ms. Sneha works as a programmer in a tech company. Her job is to manage 3+2
the records of all employees. She wants to create a list of dictionaries
named Employee. Each dictionary will contain the record of an individual
employee. There are n records in the list and each record will have the
employee code as the key with the employee name, salary and gender as
the corresponding values.
Help Ms. Sneha by writing a Python program to perform the following
operations:
i. Take n records of employees and add them to the list named
Employee and display the list.
ii. Display the name of male employees whose salary is greater than
30000.
OR
Display the count of female employees working in the tech company.
Page 9 of 9