0% found this document useful (0 votes)
9 views9 pages

Computer Science XI QP SEE Set 1

The document is an examination paper for Class XI Computer Science, issued by Kendriya Vidyalaya Sangathan for the session 2024-25. It consists of 37 compulsory questions divided into five sections, covering various topics in computer science and programming, specifically using Python. The paper includes multiple-choice questions, programming tasks, and theoretical questions, with a total maximum score of 70 marks.

Uploaded by

gamingshreyan405
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views9 pages

Computer Science XI QP SEE Set 1

The document is an examination paper for Class XI Computer Science, issued by Kendriya Vidyalaya Sangathan for the session 2024-25. It consists of 37 compulsory questions divided into five sections, covering various topics in computer science and programming, specifically using Python. The paper includes multiple-choice questions, programming tasks, and theoretical questions, with a total maximum score of 70 marks.

Uploaded by

gamingshreyan405
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Subject Code 0 8 3 Roll No.

KENDRIYA VIDYALAYA SANGATHAN, MUMBAI REGION


SESSION ENDING EXAMINATION (SESSION 2024-25)
(SET-I)
Subject: Computer Science (Theory) Class: XI
Time Allowed: 3:00 Hours Max. Marks - 70

General Instructions:
● This question paper contains 37 questions.
● All questions are compulsory. However, internal choices have been provided in some questions.
Attempt only one of the choices in such questions
● The paper is divided into 5 Sections- A, B, C, D and E.
● Section A consists of 21 questions (1 to 21). Each question carries 1 Mark.
● Section B consists of 7 questions (22 to 28). Each question carries 2 Marks.
● Section C consists of 3 questions (29 to 31). Each question carries 3 Marks.
● Section D consists of 4 questions (32 to 35). Each question carries 4 Marks.
● Section E consists of 2 questions (36 to 37). Each question carries 5 Marks.
● All programming questions are to be answered using Python Language only.
● In case of MCQ, text of the correct answer should also be written.

Q. No. SECTION-A (21 x 1 = 21 Marks) Marks

1. State True or False: 1


“The primary function of the input unit is to process data and instructions.”

2. Which of the following is used for permanent storage of data? 1


A) RAM B) ROM
C) Cache Memory D) Register

3. Which of the following is an example of application software? 1


A) Compiler B) Antivirus
C) Microsoft Excel D) Device Driver

4. Which among the following operators has the highest precedence in python 1
expression:
A) == B) +
C) and D) <=

5. Which among the following is valid identifier: 1


A) value B) with
C) sum+val D) 5avg

6. Which of the following expressions evaluates to zero (0) value: 1


A) 8 and 2**0
B) 6<7 and 5 or 4
C) 3==False and 4
D) 5 and 2//4
Page 1 of 9
7. Which of the following is true about pseudocode? 1
A) It is a programming language used to write code.
B) It is a formal language with strict syntax rules.
C) It is used to describe algorithms using simple English-like language.
D) It is only used for debugging programs.

8. Which among the followings is the first step of problem solving? 1


A) coding
B) Analyzing the problem
C) Developing an algorithm
D) testing and debugging

9. Which of the following is the correct way to convert a float to an integer in 1


Python?
A) int(3.14) B) float(3)
C) str(3.14) D) round(3.14)

10. Fill in the blank: 1


The ______ statement is used to skip the current iteration of a loop and
move to the next iteration.
A) break B) pass
C) else D) continue

11. State True or False: 1


“The replace() method in strings in python creates a new string with the
specified replacements.”

12. What will be the output of the following code? 1


Bparts=['ear','nose','eye']
print('2'.join(Bparts))
A) ear2nose2eye B) ear2nose2eye2
C) ['ear','nose','eye', 'ear','nose','eye'] D) 2ear2nose2eye2

13. Identify the output of the following code snippet: 1


>>>H=[45, 60, ["news", "paper"], [50,20]]
>>>H[-1:1:-1][0]
A) [“news”, “paper”] B) [[“news”, “paper”]]
C) [50,20] D) [[50,20]]

14. The IT Act 2000 aims to provide legal recognition to electronic transactions 1
and defines the offense of ________ under Section 66, which involves
unauthorized access to computer systems or networks.
A) Hacking B) eavesdropping
C) Phishing D) Cyberbullying

15. What will be the output of the following python code? 1

Page 2 of 9
>>> R=3,4+8,9
>>> R
A) (3,12,9) B) (3,4,8,9)
C) (11,13) D) Error

16. Consider a dictionary given below and write the output of given python 1
code:
Sports={“baseball”:9, “cricket”:11, “carrom”:2}
print(sorted(Sports))
A) {“carrom”:2, “baseball”:9, “cricket”:11}
B) ['baseball', 'carrom', 'cricket']
C) {“baseball”:9, “carrom”:2, “cricket”:11}
D) [2,9,11]

17. Given the following dictionaries 1


exam={"Exam":"SEE", "Year":2025}
result={"Total":500, "Pass_Marks":165}
Which statement will merge the contents of both dictionaries?
A) exam.update(result)
B) exam + result
C) exam.add(result)
D) exam.merge(result)

18. Write name of python module which is to be imported in program to use 1


the following functions:
i. ceil( )
ii. median( )

19. If someone infects your computer using malicious software and display 1
message demanding a fee to be paid in order to access the computer, is
known as ___________ cybercrime.

Q.20 and Q.21 are Assertion(A) and Reason(R) based questions. Mark
the correct choice as:
A. Both A and R are true and R is the correct explanation for A
B. Both A and R are true and R is not the correct explanation for A
C. A is True but R is False
D. A is False but R is True

20. Assertion (A): Strong passwords and two-factor authentication are critical 1
components of cyber safety.
Reason (R): Strong passwords make it significantly harder for
cybercriminals to gain unauthorized access to sensitive accounts and
systems.

21. Assertion (A): In Python, lists can contain elements of different data 1
types.
Reason (R): Lists are homogeneous, meaning they can only store
elements of the same data type.

Page 3 of 9
SECTION-B ( 7 x 2=14 Marks)

22. i. Name the types of software for the following: 2


a) Adobe Photoshop
b) Linux

ii. Define Operating System.

23. Write the equivalent Boolean expression for the given logic circuit: 2

output=?

24. i. Write python expression equivalent to the following 2


arithmetic/algebraic expression:
A. 𝑎 = 𝜋𝑟√𝑟 2 + ℎ2
OR
4
B. 𝑣 = 3 𝜋𝑟 3

ii. Evaluate the given expression and write output:

A. not 1+2//3+4
OR
B. print(int(3.5)+6//5**0)

25. The code provided below is intended to find the factorial of an integer 2
number. However, there are syntax and logical errors in the code.
Rewrite the code in python after removing all error(s). Underline each
correction done in the code.
num=int(input("Enter a number: "))
if num<0
print("Factorial not defined for negative numbers")
Elif num==0:
fact=1
print(fact)
else:
fact=1
for i in range(1,num):
fact=*i
print(fact)

Page 4 of 9
26. Write a python program to print the following pattern using loops: 2
*
* *
* * *
* * * *

27. i. 2
A. Define the term “Intellectual Property”.
OR
B. Define the term ‘Plagiarism’ under data protection.

ii.
A. Write name of any two Intellectual Property.
OR
B. Write name of any two open source software.

28. Write any two common gender issues while teaching and using computers. 2
OR
What is e-waste? Describe any two harmful effects of improper disposal of
e-waste.

SECTION-C ( 3 x 3 = 9 Marks)

29. Convert the following number system: 3


i. (312)10 = ( ? )2
ii. (11101.101)2 = ( ? )10
iii. (752)8 = ( ? )16
OR
i. Write equivalent ASCII binary encoding for the following:
1. C
2. a
3. T
ii. Define the term Unicode?
iii. Expand the following term: ISCII

30. i. Ms. Madhuri is a Python programmer working with dictionaries in 3


Python. She has created a dictionary named bike, where the names of
bikes are used as keys and their quantities in stock are used as values.
bike={"Yamaha":10, "KTM":5, "Honda":20, "TVS":15}
Help her to perform the following operations with given dictionary
using Built-in functions only:
a) Delete the last key-value pair from the dictionary.
b) Display the value of “Honda” key.
c) Display all keys of the dictionary bike.
OR
ii. Mr. Punit is a python programmer and he is working with dictionary in
python. He has created the following dictionary named as Vegetable.

Page 5 of 9
Name of vegetable is working as key and their quantity in stock is
working as value.
vegetable = {"potato":5, "onion":2, "tomato":7, "carrot":3}
Help him to perform the following operations with given dictionary
using Built-in functions only:
a) Create a DEEP/TRUE copy of dictionary vegetable in a new
dictionary named as D.
b) Display all values of the dictionary vegetable.
c) Remove key-value pair for the key “onion”.

31. Predict the output of the following code 3


s="3tree"
while len(s)<=6:
if s[-1]=='e':
s=s[0:3]+'w'
elif 'k' in s:
s=s[0]+'dd'
elif not int(s[0]):
s='2'+s[1:]+'h'
else:
s=s+'@'
print(s)
OR
Write the output of the code given below:
mystr="MH@25y"
newstr="" #empty string
count=0
for i in mystr:
if i not in 'My':
newstr=newstr+i
else:
if i.islower():
newstr=newstr+i.upper()
else:
newstr=str(count)+newstr
count+=1
print(newstr)

SECTION-D ( 4 x 4 = 16 Marks)

32. i. 4
A. Write a python program to take a string from user and count and
display the occurrence of the word “science” in the given string.
B. Write a python program to take a string from user and display
number of digits present in the given string.
OR
ii.

Page 6 of 9
A. Write a python program to take a string from user and display
those words which start with the letter ‘m’.
B. Write a python program to take a string from user and count
number of vowels present in the string.

33. Ms. Sujata wants to store the marks of N number of students in a list. Help 4
her to perform the following functions with the list:
i. Create a list named as “Marks” to store the marks of N students by
taking the marks from user and display the list.
ii. After creating the list, add the marks of one more student with value
78 in the end of the list.
iii. Delete the marks of a student which is present at index 4.
iv. Display marks of student in decreasing order of marks.

34. i. Define digital footprints. 4


ii. Write any two etiquettes which to be followed by a person while using
social media.
iii. What is cyber bullying?
iv.
A. What is role of encryption in identity protection?
OR
B. What is cyber troll?

35. Write type of cybercrime/malware for the following cases: 4


i. Riya received an e-mail stating that her account would be suspended
unless she verified her details immediately. The message included a
link labeled “verify now”, which directed her to a website resembling
her bank's official site. Trusting it, Riya entered her account
credentials and personal information. Identify the
cybercrime/malware discussed in this scenario.

ii. Aman received an email with an attachment titled “Important Tax


Document” from an address that appeared to be from the Income
Tax Department. Trusting the sender, Aman downloaded and opened
the attachment. Shortly after, his computer started abnormal
functioning and sometimes it would stop functioning totally. Identify
the cybercrime/malware discussed in this scenario.

iii. Ankita downloaded a free movie editing software from an unofficial


website that promised premium features without payment. After
using the software, she discovered it was an unauthorized copy of a
licensed product. The original company later contacted her, accusing

Page 7 of 9
her of using pirated software. Identify the cybercrime/malware
discussed in this scenario.

iv. Mayank downloaded a free software from an unofficial website that


promised enhanced features. After installing it, he noticed his
browser was constantly redirected to various advertisements and
pop-up windows that he couldn't close. The software was also
tracking his online activity and displaying unwanted ads. Identify the
cybercrime/malware discussed in this scenario.

SECTION-E (2 X 5 = 10 Marks)

36. Mr. Rajesh is working as a librarian in a college. He wants to keep record of 5


the number of books borrowed by each student during the month. Each
student’s number of borrowed books are stored in a list named as
Borrowed_Books. Now Mr. Rajesh wants to write a python program to
perform the following tasks with the list named as Borrowed_Books:

i. Create a list of integers named as Borrowed_Books where each


element represents the number of books borrowed by a student (for
7 students).
ii. Add the number of books borrowed by a new student at the end of
the list by taking the value from user.
iii. Find and display the total number of books borrowed by all students
combined.
iv. Sort the list in ascending order of values and display it.
v. Delete the existing records from the list.

Page 8 of 9
37. Ms. Sneha works as a programmer in a tech company. Her job is to manage 3+2
the records of all employees. She wants to create a list of dictionaries
named Employee. Each dictionary will contain the record of an individual
employee. There are n records in the list and each record will have the
employee code as the key with the employee name, salary and gender as
the corresponding values.
Help Ms. Sneha by writing a Python program to perform the following
operations:
i. Take n records of employees and add them to the list named
Employee and display the list.

ii. Display the name of male employees whose salary is greater than
30000.
OR
Display the count of female employees working in the tech company.

Page 9 of 9

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy