Class XI Practise Papers _pdf

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 41

RSS INTERNATIONAL SCHOOL ,NOIDA

UT-2 EXAMINATION 2024-25

SUBJECT: COMPUTER SCIENCE (083) M.M.: 40


CLASS: XI TIME: 1.5 Hours
SECTION A

1. MS-Office is a- 1
(a) Operating Software (b) Utility program
(c) Programming language (d) Application Software
2. State true or false: 1
Elements of a list can be changed in place.
3. Find the output of the following
i=0
sum=0
while i<9:
if i%4==0:
sum=sum+i
i=i+2
print(sum)
(a) 10 (b) 11 C) 12 D) 14

4. Find the invalid identifier(s) from the following: 1


a) MyName b) 2ndName
c) true d) My_Name
5. Suppose tuple T is T = (10, 12, 43, 39), Find incorrect? 1
a) print(T[1]) b) T[2] = -29
c) print(max(T)) d) print(len(T))
6. What will be the result of the following code? 1
>>>d1 = {“abc” : 5, “def” : 6, “ghi” : 7}
>>>print (d1[abc])
(a) abc (b) 5 (c) {“abc”:5} (d) Error
7. Suppose list L is declared as 1
L = [5 * i for i in range (0,4)], list L is
a) [0, 1, 2, 3,] b) [0, 1, 2, 3, 4]
c) [0, 5, 10, 15] d) [0, 5, 10, 15, 20]
8. Identify declaration of M = ‘Mon’,‘23’,‘Bye’, ’6.5’ 1
a) dictionary b) string c) tuple d) list
9. STR=”RGBCOLOR” 1
colors=list(STR)
How do we delete ‘B’ in given List colors?
(a) del colors[2] (b) colors.remove("B")
(c) colors.pop(2) (d) All of these
10. What is the value of x when this loop has been terminated: 1
x=45
while
x>0:
1
print(x)
x=x-10
(a) 25 (b) 45 (c) 5 (d) -5
11. What will be the output of the following Python Code? 1
tp=(5,)
tp1=tp * 2
print(len(tp1))
(a) 0 (b) 2
(c) 1 (d) error
12. day_name= ['Mon', 'Tues', 'Wednes', 'Thursday', 'Friday', 'Saturday','Sunday'] 1
print(day_name[7])
What will be the result?
(a) Sunday (b)Saturday
(c)Error (d) Mon
SECTION B
13 What will be the output of the following Python code? 2
x, y=4, 2
while(x>=y):
print(x, y)
x=x-1
y=y+1
a) 4, 2 b) Invalid syntax c) 2, 4 d) Nothing is printed
3, 3 3, 3
14 What is the result of this statement: 2
10>5 and 7>12 or not 18>3
a) 10 b) True c) False d) None
OR

What will be the output of the following Python code?


>>> 6 * 3 + 4 ** 2 // 5 - 8
a) 13 b) 14 c) Error d) None
15 Convert the following program into for loop without affecting the output. 2
count=0 while
count<10:
print(“Hello”) print(“Good
Bye!”) count=count+1

16 Can tuples be nested ? Support your answer giving suitable example 2


OR
Write a python program to print sum of numbers divisible by 7 between 1
to 50.
2
17 How many times will the following for loops execute and what’s the output of 2
this program?

for i in range(-1,-7,-2):
for j in range(3):
print(1, j)
OR What’s
the output of the following program.
fruits = { 'Apple': 100,
'Orange': 200,
'Banana': 400,
'pomegranate':600 }
if 'Apple' in fruits:
del fruits['Apple']
print('Dictionary after deleting key =',fruits)
18 Write a program to print the Fibonacci Series till n terms, where n is entered 2
by the user.
SECTION C
1 A string sub=”Computer Science” is defined. Write statements to perform 3
9 the following tasks:
i) Display last three characters of sub ii) Display starting
index of ‘ute’ iii) Check whether ‘enc’ is contained in sub or
not.
2 Rewrite the following code in Python after removing all syntax error(s). 3
0 30 = To
for K in range(0, To) If K
%4 == 0:
Print(K*4)
Else:
Print(K + 3)
2 Write a program to check whether the entered number is Armstrong or not. 3
1
2 Write a program to find the frequency of an element in a list of numbers. 3
2 (1 + 2)
OR

A list Divisibility contains the following elements:


9,35,4,19,55,12,55,36
Write a program to swap the element divisible by 5 with next elements so
that the list will become:
9,4,35,19,12,55,36,55

2 Predict the output of the Python code given below: 3


3 (1+1+
T1=(90,92,93,95,97,95, 1
100) print(T1[::-3]) )
print(max(T1))
print(T1.count(95))
print(T1.index(95))
print(sum(T1))
print(len(T1))

******************************
Class: XI Session: 2022-23 Computer Science (083) Answer
Key for Practice Paper-1
MaximumMarks:70 Time Allowed: 3 Hrs

SECTION A
1. (d) Application Software 1
2. (c) 89 1
3. (c)15A 1
4. (b) 2ndName 1
5. (b) T[2] = -29 1
6. (d) Error 1
7. (c) [0, 5, 10, 15] 1
8. c) tuple 1
9. (d) All of these 1
10. (d) -5 1
11. (b) 2 1
12. (c)Error 1
13. (c) AND 1
14. (a) A’.B’ 1
15. (d) E-Mail 1
16. (d) All of these 1
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct choice as:
(a)Both A and R are true and R is the correct explanation for A
(e) Both A and R are true and R is not the correct explanation for A
(f) A is True but R is False
(g) A is false but R is True
17. (b) Both A and R are true and R is not the correct explanation for A 1
18. (d) A is false but R is True 1
SECTION B
19. a) 4, 2 2
3, 3
20. c) False 2
OR

a) 13
21. for count in range(0,10,1): 2
print(“Hello”)
print(“Good Bye!”)
22. PC Intrusion - Computer Definition. To compromise a computer system by 2
breaking the security of such a system or causing it to enter into an insecure
state. The act of intruding—or gaining unauthorized access to a system—
typically leaves traces that can be discovered by intrusion detection systems.
23. Spam email is a form of commercial advertising which is economically viable 2
because email is a very cost-effective medium for the sender. If just a fraction
of the recipients of a spam message purchase the advertised product, the
spammers are making money and the spam problem is perpetuated.

24. Outer loop ( i based) run 3 times and Inner loop ( j based) will run 3 times for 2
each value of i.
Output:
101112 10 11 121011 12
OR
Dictionary after deleting key = {'Orange': 200, 'Banana': 400, 'pomegranate':
600}
25. n=int(input("How many numbers do you want to print in Fibonacci Series: ")) 2
first=0
second=1 i=3 print(first,
second, end=" ") while
i<=n:
third=first+second
print(third, end="
") first=second
second=third i=i+1

SECTION C
26. iii) (111111110101110.1101101111)2= (7FAE.DBC)16 iv) 3
Difference between Compiler and Interpreter:
1. Compiler converts whole source code of program into target
program (machine code) in one round and display all the errors
with their line numbers while Interpreter converts source code
into machine code program line by line and stop/ halt at the
error-prone line until that error has been debugged from that
line of code.
2. Compiler takes lesser time in conversion while Interpreter takes
more time in conversion.
27. Rewrite the following code in Python after removing all syntax error(s). 3
To=30 # Variable assignment statement
for K in range(0, To): #colon should be there before loop
body if K%4 == 0: # if is a keyword print(K*4) #print( ) is
a predefined method in python else: # else is a keyword
print(K + 3)

28. temp=n=int(input("enter a three digit 3


number:")) sum=0 while(n>0): r=n%10
sum=sum + (r*r*r)
n=n//10
if temp==sum:
print("armstrong") else:
print("not armstrong")

29. a) 20#25#25# 3
Option (a) is expected output. (1+2)
Maximum values that can be assigned to the variables second and third are 7
and 8 respectively.
30. (a) This is happening because third party cookies saved his search 3
preferences and now websites are posting advertisements based on his (1+1+1
preferences. (b) Umesh could have avoided this by privately browsing i.e. )
opening the web browser in incognito mode before searching for such things.
(c) Now Umesh can delete all the previous history and cookies stored on his
computer. This would stop websites posting advertisements.

SECTION D
31. L1=[2,5,11,13,18] list1=len(L1) 4
n=int(input("Enter element to be searched
for")) for j in range(0, list1,1):
if L1[j]==n: print(n,"found
at index",j)
break
else:
print(" Element Not found" )

32. iii) IPR- Intellectual Property Rights 4


GPL-General Purpose License (2+2)
Proprietary Software-The software which is purchased by paying
some amount of money.
URL-Unified Resource Locator iv) the Open
Source software(s) are: MySql, Python
SECTION E
33. (i) syntax error-These are produced by Python when it is translating the 5
source code into byte code. They usually indicate that there is something (1+2+2
wrong with the syntax of the program. Example: Omitting the colon at the end )
of a for statement yields the somewhat redundant message SyntaxError:
invalid syntax.
Example: print(“Hello” #syntax error due to right parenthesis is missing (ii)
Difference between ‘=’ and ‘==’operator:
‘=’ assignment operator while ‘==’ is equality operator.
Example: a=5 # value 5 assigned to variable a.
2==9 # checks the equality, gives False as result
(iii) The order in which the operators are executed in an expression is called
the operator precedence. The precedence of Arithmetic operator is as follows:
**
*, /, //, %
+, -
34. Write the solution for the following problem: 5
Output: H e l l o W o r (2+3)
OR
Output: {1: 4, '1': 2}
Justification/Reason: 1 and 1.0 are considered as same key of integer type
while ‘1’ is considered as string type key hence statement-4 overwrite the
value assigned in statement-2 by the compiler.

(b) md={ } n=int(input("How many capitals you


want to store")) for i in range(n): st=input("Enter
state:") cap=input("Enter Capital:") md[st]=cap
print("States and their capitals are:", md)
OR
d1={ 1:'one',2:'two', 3: 'three' }
d2={ 4:'four',5:'five',6:'six'}
d3=dict(d1)
d3.update(d2)
print(d1)
print(d2)
print(d3)
35. (a) Whenever you visit a website, your web browser may 5
reveal your location via your device‘s IP address. (3+2)
1. It can also provide your search and browsing history etc. which may be
used by third parties, like advertisers or criminals.
2. This way website track you. Tracking is generally used by advertising
networks to build up details profiles for pinpoint ad targeting.
3. This information is compiled through your web usage patterns, and
which websites generally use for tracking you.
This generally includes-
1. IP Address
2. Cookies and tracking scripts etc.
3. HTTP Referrer
4. Super Cookies
5. User Agent
(b) Cookies are small pieces of information websites can
store in your browser.
Cookies can be –
1. First Party Cookies- These are the cookies that store your own log in id,
password, and auto fill information etc.
2. Third Party Cookies: These are the cookies that websites store to know
about your search history and web browsing history so as to place
advertisements as per your interests.

******************************

hours
ss: XI Session: 2022-23 Computer Science (083)
Practice Paper-2 (Theory)

Maximum Marks: 70 Time Allowed: 3

C
l
a

General Instructions:

• This question paper contains five sections, Section A to E.


• All questions are compulsory.
• Section A have 18 questions carrying 01 mark each.
• Section B has 07 Very Short Answer type questions carrying 02 marks each.
• Section C has 05 Short Answer type questions carrying 03 marks each.
• Section D has 03 Long Answer type questions carrying 05 marks each.
• Section E has 02 questions carrying 04 marks each. One internal choice is given
in Q35 against part c only.
• All programming questions are to be answered using Python Language only.

SECTION A

1. Which of following is Which of the following is the smallest unit of data in a 1


computer?
(a) Bit (b) KB (c) Nibble (d) Byte
2. Which of the following is an example of primary memory? 1
(a)Hard Disk (b)RAM
(c)Floppy Disk (c)DVD
3. A gate gives the output as 1 only if the input signal is 0. 1
(a) NOR (b) OR
(c)NOT (d) XOR
4. Given A= “[ 22,4.88,”India”, “T”]” the datatype of A is 1
(a) List (b) String (c) Dictionary (d) Tuple
5. Which of the following is a keyword in Python language? 1
(a) if (b)for
(c) int (d) all above
6. Which of following is valid identifier- 1
(a) NUM (b) 1_Num
(c) F.No (d) False
7. Which of following datatype not supported by python- 1
(a) float (b) Complex
(c) List (D) Date
8. Which of the following is a valid statement in python? 1
(a) name = “bikaner’
(b) num = 1,000
(c) a+b =c
(d) x=”30” +5
9. Which of following can be used for making a comment in python- 1
(a) & (b) # (c) @ (d) None of these

10. You should never give out which of the following on the Internet? 1
(a) Your name (b) Your age (c) Your address. (d)All of the above.
Which of the following is the best description of an 'internet troll'? 1
11.
(a) Someone who goes trolling on the internet, moving from
place to place without settling anywhere in a chat room or on a
board.
(b) A funny emoticon made to look like a troll.
(c)Another name for a spammer.
(d) Someone who participates in a message board or chat with the intention to
disrupt it in some way.
12. In which of the following, a person is constantly followed/chased by another 1
person or group of several peoples?

(a) Phishing (b) Bulling (c) Stalking (d) Identity theft


13. Find the output of the following code- number= 1
[1,5,7,0,4]
print(number[2:3])
(a) [5]
(b) [7]
(c) [7,0]
(d) None of above

14. What is output of following code segment- 1


T= min(1,6,0,-3,100)
(a) 1 (b) -3 (c) 0 (d) None of above

15. Predict the output of the following code: 1


a=5 a+=100 if(a<100):
print(“false”)
else:
print(“true”)

(a) true ( b ) false (c) no output (d) none of these

16. Which of these is not a primitive or fundamental data ? 1


types

( a) integer ` (b) Boolean


( c) List (d) String
Q17 and 18 are ASSERTION AND REASONING based questions. Mark
the correct choice as
(a) Both A and R are true and R is the correct explanation for A
(h) Both A and R are true and R is not the correct explanation for A
(i) A is True but R is False
(j) A is false but R is True
17. Choose correct option : 1
T1=[3,9,0,1,7]
T2=[5,1,0,7,5.5]
Statement A: Output of print (len(T1)==len(T2) is True.
Statement R: method len() returns the number of elements in the list.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
18. Choose correct option: 1
S1=’CoMPuter SciENce’
S1[0] =S1[0].lower()
Statement A: Above code will generate error.
Statement R: String is mutable by nature.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
SECTION B
19. (a) What will be the output of the following Python code? > 2
>>> print(math.ceil(55.1))
(b) Which python module required to run above code successfully?
20. What is token ? Name various types of token. 2

OR

What will be the output of the following Python code?


>>> a=72.55
>>> b=10
>>> c=int(a+b )
>>> c
a) 72.55 b) 72 c) 82 d) None of these
21. (a) Write the output of following code 2
segment. str= “ CS and IP" a=str.split()
print(a)

(b) Write the output of the code given below:


dict = {"stname": "Ajay", "age": 17}
dict['age'] = 27
dict['address'] = "Bikaner"
print(dict)

22. Define the term: 2


(a) Digital Footprints
(b) Cookies
23. What measures should one take to avoid and maintain confidentiality of 2
personal information?
24. Predict the output of the Python code given below: 2

fruits = ["apple",”mango”, "banana",


"cherry"] for x in fruits:
if(len(x)>5):
print(x )
OR

Predict the output of the Python code given below:

i = 1
while i <
6:
print(i)
if i == 3:
break
i += 1

25. Write a program calculate and print total and average runs scored by a 2
cricketer in 3 matches.
SECTION C
26. State De Morgan’s laws / theorems and prove using truth table. 3

27. Rewrite following code after removing errors (if any): 3


N=100
A= “Number” +5
B= 2N +20
Print(B)
28. Write a program to print following series – 3
2,4,8,16, …………….
29. Write a program to input names of 5 employee and store them in a List. Now 3
enter name of an employee and find if this employee is present in the List or
not.
30. What are common gender and disability issues faced while teaching / using 3
computers in class rooms.

SECTION D
31. Write a python program to calculate factorial of a number. 4
32. Convert the following numbers. 4
(a) ( 100111101 )2 = ( ? )8
(b) ( 127 )10 = ( ? )2
SECTION E
33. (a) Differentiate between list and tuple with example ? 5
(b) Write a python program to input 3 students name and (3+2)
their marks using dictionary. Print the dictionary also.
34. Write the solution for the following problem: 5
(a) How is random.randint(10) different from random.randrange (10)? (3+2)
(b)Write a Python program to generate a random number between 0 to 8.
35. (a) What is E-waste management? Discuss proper disposal of 5
used electronic gadgets (3+2)
(b) Write short note on IPR (Intellectual Property Right).

******************************
Class: XI Session: 2022-23 Computer Science (083) Answer
Key Practice Paper 2 (Theory)
Maximum Marks: 70 Time Allowed: 3

SECTION A
1. (a) Bit
2. (b) RAM
3. (c) NOT
4. (b) String
5. (d) All Above
6. (a) NUM
7. (d) Date
8. (b) bum=1,000
9. (b) #
10. (d) All of the above.
11. (d) Someone who participates in a message board or chat with the intention to
disrupt it in some way.
12. (c) Stalking
13. (b) [7]
14. (b) -3
15. (a) true
16. (c) List
17. (a)
18. (a)
Section B
19 (a) 56
(b) import math
20 Smallest unit in a program is known as token. Examples – int, if , a, num, # etc
OR
c) 82
21 (a) ['CS', 'and', 'IP']
(b) {'stname': 'Ajay', 'age': 27, 'address': 'Bikaner'}
22 (a) Digital Footprints -Digital footprints are the records and
traces that we leave behind as we use the internet.
(b) Cookies are text files with small pieces of data — like a
username and password — that are used to identify your
computer as you use a computer network.
23 Use a firewall, install antivirus, create strong password , don’t share personal
information
24 Banana
cherry OR
1
2
3

25 run1= int (input ("Enter run scored in 1st inning="))


run2= int (input ("Enter run scored in 2nd
inning=")) run3= int (input ("Enter run scored in 3rd
inning=")) total= run1 +run2 + run2 avg= total/3
print("Total runs=",total) print("Average
Runs= ", avg)

26 3 Marks both theorem and truth table.


(i) (A+B)’ = A’.B’ (ii) (A.B)’ = A’+B’
27 N=100 (No Error)
A= “Number” +”5 “
B= 2*N +20
print(B)
28 #Series -----2,4,8,16, …………….
a=1 n= int (input ("Enter the
terms=")) for i in range(n): a=a*2
print(a, end=",")

29 L=[]
found=False for
i in range(5):
name=input("Enter Name =")
L.append(name) text=input("Enter
name to be searched=") for i in
range(len(L)):
if (text ==L[i]):
found=True if(found):
print("Name is in List")
else:
print("Name is not in List")

30 Preconceived notions, Lack of interest, Lack of motivation

Unavailability of teaching material / aids, Lack of special needs teachers, Lack


of supporting curriculum
31 n= int (input ("Enter the Number="))
f=1 for i in range(1,n+1): f=f*i
print("Factorial=",f)
32 (a) 475 (b)
1111111
33 (a)List is collection of items enclosed with[]. Tuple is collection of items
enclosed with(). List is mutable . Tuple is immutable.
L=[1,4,5,6,2] is a list T=(3,5,4,1,8)
is a tuple.
(b)student={}
n=3 i=1
while(i<=n):
a=input("enter student name=")
b=input("enter marks") student[a]=b
i=i+1 print(student)

34 (a) randint() when we want to generate a random


number from an inclusive range.
randrange() when we want to generate a random number within a range by
specifying the increment. It produces a random number from an exclusive
range.
(b) import random a=random.randint(0,8) print(a)

35 (a) Electronic waste or e-waste describes discarded electrical or electronic


devices. Used electronics which are destined for refurbishment, reuse, resale,
salvage recycling through material recovery, or disposal are also considered
ewaste. Informal processing of e-waste in developing countries can lead to
adverse human health effects and environmental pollution.
We should Recycle it.
(b) Intellectual property (IP) is a category of property that includes
intangible creations of the human intellect. There are many types of
intellectual property, The best-known types are copyrights, patents,
trademarks, and trade secrets.

Class: XI Session: 2022-23 Computer Science (083)


Practice Paper-3 (Theory)
Maximum Marks: 70 Time Allowed: 3 hours

General Instructions:
1. This question paper contains five sections, Section A to E.
2. All questions are compulsory.
3. Section A have 18 questions carrying 01 mark each.
4. Section B has 07 Very Short Answer type questions carrying 02 marks
each.
5. Section C has 05 Short Answer type questions carrying 03 marks
each.
6. Section D has 03 Long Answer type questions carrying 05 marks each.
7. Section E has 02 questions carrying 04 marks each. One internal
choice is given in
Q35 against part c only.
8. All programming questions are to be answered using Python
Language only.

SECTION: A
Q.No Question Marks

1. Components that provide internal storage to the CPU is: 1


(a) Registers (b) Program Counters
Controller (d) Internal Chips
2. The boolean expression of following logic circuit is : 1

(a) (A+B).C'+B (b) A'B'+C+B'A


(c) A.B.C+(B'+C').A (d) A+B+C'(A+B)

3. Full form of OMR is: 1


(a) Optical Mark Reading (b) Optical Mark Recognition
(c) Optical Mark Reader (d) Optical Mark Resolution
4. Which of the following is not valid string in Python? 1
(a) “Hello” (b) ‘Hello’
(c) “Hello’ (d) None of the Above
5. What shape represents a decision in a flow chart? 1
(a)Oval (b) Diamond (c) Rectangle (d) Arrow
6. What will be the output of above Python 1
code? abc="6/4" print("abc")

(a) 1 (b) 6/4 (c) 1.5 (d) abc


7. Which of the following will give "Simon" as output? 1
If str1="Hari,Simon,Vinod"
(a) print(str1[-7:-12]) (b) print(str1[-11:-7])
(c) print(str1[-11:-6]) (d) print(str1[-7:-11])
8. What is identity theft? 1
9. Accessing of data in a dictionary is done through : (a)Index 1
(b) value (c) key (d) cell number
10. Which of the following will be the output of the operation? L1=[1,2] 1
L2=[3,4]
(L1 + L2)*2
(a) [2,4,6,8] (b) [1,2,3,4,1,2,3,4] (c) [1,3,4,4] (d) [3,4,1,2]

11. Which of the following can add a list of elements to a list? 1


(a) append() (b) extend() (c) add() (d) none of these
12. Which of the following is not a type of cyber criminals? 1
(a) Unauthorized account access (b) Email spoofing and spamming
(c) Mass attack using Trojans as botnets (d) Report vulnerability in any system
13. Which of the following can be termed as Cyber Bullying: 1
a) Posting Rumors online
b) Posting hate speech
c) Posting sexual remarks
d) All the above
14. How many asterisks does the following code fragment 1
print?
a = 3 while a
< 20:
print('*')
a += 1
(a)16 (b) 17 (c) 18 (d) 20
15. What is the output of the following? >>>print('INDIA'.capitalize()) 1

16. ‘Python is an interpreted high level language’. What does it mean to you? 1
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct choice as
(a) Both A and R are true and R is the correct explanation for A
(k) Both A and R are true and R is not the correct explanation for A
(l) A is True but R is False
(m) A is false but R is True
17. Assertion (A) : Comments are non-executable statements that enable the users to 1
understand the program logic.
Reason (R) : They are basically statements used to put remarks. The comments
are used to explain the code and to make it more informative for the users.
Pick an appropriate statement from the given options:
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true and R is not the correct explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
18. Assertion (A) : In Python, the tuple is an immutable collection of data. 1
Reason (R) : It means that any change or alteration in data, is mentioned in the
same place. The updated collection will be use the same address for its storage.
Pick an appropriate statement from the given options:
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true and R is not the correct explanation of A. (c) A is
true but R is false.
(d) A is false but R is true.
SECTION : B
19. What is output from the following code : 2
(i)range(6) (iii)range(5,20,4)
(ii)range(7,10) (iv)range (12,1,-2)
20. How the pop ( ) function is different from remove( ) function working with list in 2
python ?
OR
What will be the output of the following python code:
(i) a = [12,14,16,18,10] print(a[-1:1:-
2])
(ii) d = {'Name':'Ravi', 'Marks':90} e =
{'Age':16, 'Marks':95} d.update(e)
print(d)

21. How the internet security is a major issue? Write any two solutions of internet 2
security threats.
22. What is mutable and immutable data objects in Python? Name any one of each 2
type.
23. Identify the valid and invalid identifiers 2
MyDiary, 1num, File123, _Clear, Mynameisking, while, Your.story, If
24. (i)Name the popular micro blogging social networking website ii)To protect a 2
computer from virus, you should install--------- in your computer.
A. backup wizard B. disk cleanup
C. antivirus D. disk defragmenter
25. What will be the output of the following Python code? 2
>>>x,y=5,10
>>>x,y=y,x
>>>x,y
a) 5,10 b) 10,10 c) 10,5 d) 5,5
OR
What will be the output of the following code
(i) List1=[13,18,16,16,13,18]
print(List1.index(16))
(ii) Strg=”computer”
print(Strg[ 0: 8 : 2]
SECTION: C
26. Convert the following numbers into their equivalent numbers. 3
(i) (29.75)10 = (………….)2 (ii) (A4B)16 = (… ............ )10
(iii) (1234)8 = (… ........ )16
27. Write a Python program to calculate bonus as the following criteria using if- elif 3
statement :
If salary between bonus
0 to 25000 25% of salary
25001 to 35000 15% of salary
35001 to 50000 10% of salary
50001 to 75000 05 % of salary
75001 and above nil
OR
What is difference between break and continue statement in Python explain with
example.

28. Go through the program of dictionary in python given below and predict the 3
output of program.
Student={"RollNo":10 , "Name":"Kuku" , "Class":11 , "Age":15}
T=len(Student)
Elm=Student.get("Name")
mylist=Student.items()
print("Length=",T)
print("Specific Element=",Elm)
print("My List=",mylist)
29. Find the output of the following code: 3
>>> L=["These", "are", "a", ["few", "words"], "that", "we", "will", "use"]
>>> print (L[3:4])
>>> print (L[1:4:-1])
>>> print ("few" in L)
>>> print (L[0::2])
>>> print (L[4:])
>>> print (L)
OR
te a program to check number of ‘H’ present in a
string: ALPS HEALS WITHOUT HURTING” output will
be displayed as: Total number of ‘H’ is: 4
30. Consider the Following conversation and answer the question 3
Person 1:- What’s your name?
Person 2:- Radha
Person 1:- What is the name of your first school?
Person 2 :- Army Public School
Person 1 :- What are your Father and Mother name?
Person 2 :- Krishna and Sarita
Person 1 :- Who is your favorite actor or actress?
Person 2 :- Amitabh
Person 1:- What is the name of your pet animal?
Person 2 :- Tommy
Person 1 :- Where were you born and when?
Person 2:- Ajmer on 15 March 2002
Person 1 :- May I use your Laptop for online banking for fees payment
Person 2 :- Sure
(i) Who may be Victim of Cyber Crime Person1, Person 2 or both? Justify
your answer
(ii) Who is doing Ethical Hacking person1 or person2? Justify your
Answer (iii) Person 2 was using Key Logger software in his
computer. What is it?
SECTION: D
31. Write a Python program to input 10 numbers to store in the list and print the 2+2
third largest number. For example, if the entered numbers in the list are List are
36, 25, 14, - 951, 75, - 85, 654, 88, 9521, 657, then output will be
The third largest number is : 654
32. What will be the output of the following code 4
i. type(34)
ii. a, b=10,20 a, b= b, a+b
print(a, b)
iii. a=20 + 4j print(a.real + a.imag)
iv. print(10,20,30,
sep=’*’,end=’@’)

SECTION: E
33. What will be the output of the following: 5
(a) [11, 14, 18, 10, 15]
(b) ['P', 'Y', 'T', 'H', 'O', 'N']
(c) L1.insert(0,12)
(d) L1.sort()
(e) L1.remove(14)
(f) L1.append(5)
(g) L2.pop()
(h) L1+L2
(i) L1.extend([12,16,18])
(j) L1*2
34. A code snippet using a dictionary is shown below and What will be the output of 5
the following :
dt={“Apple”:50, “Orange”:40, “Banana”:30 ,
“Mango”:80} print(len(dt)) #Statement 1
print(dt.keys()) #Statement 2 print(dt.items())
#Statement 3 print(dt.popitem()) #Statement
4 print(dt.get("Banana")) #Statement5 Evaluate
output of all statements.

35. a) What do you mean by Cyber safety? 1+2+2


b) What are different types of threats to computer security?
c) What is the need for secure password? How can one make a strong password?
Class: XI Session: 2022-23Computer Science (083)
Answer Key Practice Paper 3 (Theory)
SECTION A

1. (a) Registers 1
2. (c) A.B.C+(B'+C').A 1
3. (c) Optical Mark Reader 1
4. (c) “Hello’ 1
5. (b) Diamond 1
6. (d) abc 1
7. c) print(str1[-11:-6]) 1
8. Identity Theft is a type of fraud that involves using someone else’s identity to steal 1
money or gain other benefits.
9. (c) key 1
10. (b) [1,2,3,4,1,2,3,4] 1
11. (b) extend() 1
12. (d) Report vulnerability in any system 1
13. (d)All the above 1
14. (b) 17 1
15. India 1
16. Python is an interpreted language, which means the source code of a Python 1
program is converted into bytecode that is then executed by the Python virtual
machine.
17. Both A and R are true and R is the correct explanation of A. 1
18. (c)A is true but R is false. 1
SECTION : B
19. What is output from the following code : ½*4=2
(i)range(6) : 0,1,2,3,4,5
(ii)range(7,10) : 7,8,9
(iii)range(5,20,4) : 5,9,13,17
(iv)range (12,1,-2): 12,10,8,6,4,2
20. Pop() will delete last item from a list. Also displaying the deleted item. 1+1=2
Remove() function will delete given item from list. OR
[10,16]
{'Name': 'Ravi', 'Marks': 95, 'Age': 16}

21. Definition of internet security: 1 Mark two solutions of 2


internet security threats : ½ Marks each
22. Mutable :- That can be modified . example List 1+1=2
Immutable :- That can not be modified . example Tuple, String
23. Valid : MyDiary, File123, _Clear, Mynameisking, If Invalid=1num, 1+1=2
while, Your.story
24. (i) 1. Twitter · 2. Tumblr · 3. Pinterest · 4. Instagram · 5. Facebook · 6. LinkedIn. 1+1=2
ii) C. antivirus

25. c) 10,5 1+1=2


OR
2
Cmue
SECTION : C
26. (29.75)10 = 11101.11 1+1+1=
(A4B)16 = 2635 3
(1234)8 = 29C
27. sal=int(input("enter the salary of employee:")) #1/2 mark 3
if (sal <=25000): #1/2 mark b=sal*.25
elif (sal>25000 and sal <= 35000): #1/2 mark b=sal*.15
elif (sal>35000 and sal <= 50000): #1/2 mark b=sal*.10
elif (sal>50000 and sal <= 75000): #1/2 mark b=sal*.05
else:
b=0
print("Bonus will be: ",b) #1/2 mark

OR
1 mark for break+1/2 mark for example
- Break: it’s a jump statement which forces to skip the remaining statements/
iterations of the loop and exit the loop.
Example : while(True) : n=int(input(“enter a number and
zero to terminate”)) if(n==0): break print(n*n)
1 mark for continue+1/2 mark for example
- Continue: it is just opposite to the break statement. As soon as continue is
invoked, the control will return for the next iteration of the loop. example :
for i in range(1,5):
a= int(input(“enter first number”))
b= int(input(“enter second number”))
c=a+b if(c<0):
print(“ program continues”)
continue print(“sum of two
numbers:”,c)

28. Length= 4 1+1+1=


Specific Element= Kuku 3
My List= dict_items([('RollNo', 10), ('Name', 'Kuku'), ('Class', 11), ('Age', 15)])
29. [['few', 'words']] ½*6=3
[]
False
['These', 'a', 'that', 'will']
['that', 'we', 'will', 'use']
['These', 'are', 'a', ['few', 'words'], 'that', 'we', 'will', 'use']
OR

"HEALPS HEALS WITHOUT HURTING"


0
i in s:
f i=="H":
n=n+1 nt(n)

30. (iv) Both may be the victim of Cyber Crime because these are the common security 1+1+1=
answers a normal user sets and your system can be hacked by person 2 3
We should not do financial transaction using other’s computer because your
personal information may be revealed to person 1
Person 2 is doing Ethical Hacking by asking personal information
Key Logger is a software/Hardware that records you key strokes.
SECTION : D
31. #students may use their own logic 4
also. L=list() for i in range (10):
k=int(input("Enter a number :"))
L.append(k) L.sort() print ("List is ", L)
print ("The third largest number is :", L[-3])
- 1M for inputting 10 numbers to store in
list
- 2M for method for finding third largest
- 1M for printing third largest

32. Int 1*4=4


20,30
24.0
10*20*30@
SECTION : E
33. (k) [11,14,18,10,15] ½ x10
(l) [‘P’, ‘Y’, ‘T’, ‘H’, ‘O’, ‘N’] =5
(m) [12,11,14,18,10,15]
(n) [10, 11, 12, 14, 15, 18]
(o) [10, 11, 12, 15, 18]
(p) [10, 11, 12, 15, 18, 5]
(q) 'N'
(r) [10, 11, 12, 15, 18, 5, 'P', 'Y', 'T', 'H', 'O']
(s) [10, 11, 12, 15, 18, 5, 12, 16, 18]
(t) [10, 11, 12, 15, 18, 5, 12, 16, 18, 10, 11, 12, 15, 18, 5, 12, 16, 18]
34. dt={“Apple”:50, “Orange”:40, “Banana”:30 , “Mango”:80} 1*5=5
Statement 1= 4
Statement 2 = dict_keys(['Apple', 'Orange', 'Banana', 'Mango'])
Statement 3= dict_items([('Apple', 50), ('Orange', 40), ('Banana', 30), ('Mango', 80)])
Statement 4= ('Mango', 80)
Statement5=30
35. a) Cyber Safety refers to the safe and responsible use of Internet to ensure safety and 1+2+2=
security of personal information and not posing threat to anyone else’s information. 5

b) Some common threats are:


Viruses, Spyware, Adware, Spamming, PC Intrusion (Denial of service, Sweeping,
Password guessing), Phishing
c) A strong password may be created mixing an upper-case letter, a lower-case
letter, a digit and a special symbol and the password may be changed at a frequent
time. A good combination of these mixed letters makes a strong password and makes
difficult to crack it. A strong password makes our system safe and secure.
Class: XI Session: 2022-23 Computer Science (083)
Practice Paper-4 (Theory)
Maximum Marks: 70 Time Allowed: 3
hours

General Instructions:

• This question paper contains five sections, Section A to E.


• All questions are compulsory.
• Section A have 18 questions carrying 01 mark each.
• Section B has 07 Very Short Answer type questions carrying 02 marks each.
• Section C has 05 Short Answer type questions carrying 03 marks each. 
Section D has 03 Long Answer type questions carrying 05 marks each.
• Section E has 02 questions carrying 04 marks each. One internal choice is
given in Q35 against part c only.
• All programming questions are to be answered using Python Language only.

SECTION A
Q.1 MICR stands for?
(a)Maganetic Ink Character Reader (b) Maganetic Ink Code Reader
(c) Maganetic Ink Caser Reader (d) Maganetic Ink Computer Reader

Q.2 Which of the following is not an example of system software?


(a) Language Translator (b)Utility Software
(c) Communication Software (d)Word Processors

Q.3 A gate gives the output as 1 only if all the inputs signals are 1.
(a) AND (b) OR
(c)EXOR (d) NOR

Q.4 Which one of the following is the correct extension of the Python file?
(a) .py (b) .python
(c) .p (d) None of these

Q.5 Which of the following is not a keyword in Python language?


(a) for (b)if
(c) try (d) sum

Q.6 Which of the following operators is the correct option for calculating ab ?
(a) a ^ b (b) a**b
(c) a ^ ^ b (d) a ^ * b

Q.7 What is data type of L if L= [ 1,’Python’,2.5]


(a) List (b) String
(c)Dictionary (d) Tuple

Q.8 Which of the following is an invalid statement?


(a) a,b,c = 1000 (b) a,b,c = 1000 2000 3000
(c) a,b,c = 1000, 2000, 3000 (d) a_b_c = 1000

Q.9 Operators with the same precedence (except power operator) are evaluated
inwhich manner?
(a) Left to Right (b) Right to Left
(d) Can’t say (d) None of the mentioned

Q.10 IT Act of the Indian Parliament notified on


(i) 17 January 2001 (ii) 25 October 2002 (iii)17 October 2000
(iv) 25 April 2000

Q.11 What can happen when you give your personal data (email, address, photos
you post…) in exchange for free apps and services?

(i) Nothing can happen. Your data is not allowed to be passed on to anyone
(ii) It isn’t really used, it’s just compulsory to ask for that information
(iii) When giving your email you’re automatically entered in a lottery where you
can win something
(iv) Everything you do online is of value and is used by companies looking to
target their advertising

Q.12 What is the most important activity in system hacking?


(i) Information gathering (ii) Cracking passwords
(iii) Escalating privileges (iv) Covering tracks

Q.13 Find the output of the following


word=”green vegetables”
print(word.find(‘veg’,2)
(a) 8 (b) 6 (c)10 (d) 12

Q.14 Does Python supports Exit-Controlled Loop?


(a) Yes (b) No
(c) May be (d) Don’t Know

Q.15 Predict the output of the following


code: x,y=2,4 if(x+y= =10):
print(“true”)
else: print(“false”)
(a) true (b)false (c) no output (d)none

Q.16 What keyword you use to add an alternative condition to an if statement?


(a) else if (b) false (c) elif (d) None of the above

Q17 and 18 are ASSERTION AND REASONING based questions. Mark the correct
choice as
(a) Both A and R are true and R is the correct explanation for A
(b)Both A and R are true and R is not the correct explanation for A (c) A is
True but R is False
(d) A is false but R is True
Q.17 Choose correct option:
D1= {’ A’:’CS’, ‘B’:’IP’}
D2= { ’B’:’IP’, ‘A’:’CS’}
A: Output of print (D1==D2) is True.
R: Dictionary is a collection of key-value pairs. It is not a sequence. (a)
Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True

Q.18 Choose correct option:


S1=’python’
S1[0] =S1[0].upper( )
A: Above code will generate error.
R: String is mutable by nature.
(a) Both A and R are true and R is the correct explanation for A
(b)Both A and R are true and R is not the correct explanation for A (c) A is
True but R is False
(d) A is false but R is True

SECTION B

Q.19 What will be the output of the following Python code? >
>>>a,b=6,7
>>>a,b=b,a
>>>a,b
a) (6,7) b) Invalid syntax c) (7,6) d) Nothing is printed

Q.20 What is the data type of (1)?

a) Tuple b) Integer c) List d) Both tuple and integer

OR

What will be the output of the following Python code?


>> a=(1,2)
>>> b=(3,4)
>>> c=a+b
>>> c

(a) (4,6) (b) (1,2,3,4 )


(c) Error as tuples are immutable (d) None

Q.21 Given is a Python string declaration:


(a) myexam="@@CBSE Examination 2022@@"

Write the output of: print(myexam[6:12])


(b) Write the output of the code given below:
my_dict = {"name": "Aman", "age": 26}
my_dict['age'] = 27 my_dict['address']
= "Delhi" print(my_dict.items())
Q.22 Define the term:
(a) Cyber bullying
(b) Cyber Stalking

Q.23 What measures should one take to avoid and maintain confidentiality of
personal information?

Q.24 Predict the output of the Python code given below:


def Vari(C1,C2):
if C1>C2: return C1-
C2 else:
return C2-C1

NUMBER= [15,12,19,26,18]
for CNT in range (3,0,-1):
A=NUMBER[CNT]
B=NUMBER[CNT-1]
print(Vari(A,B),'#', end=' ')

OR

Predict the output of the Python code given below:

KV = (11, 22, 33, 44,


55 ,66) NVS
=list(KV)new_list = [] for i
in KV:
if i%2==0:
new_list.append(i)
new_tuple = tuple(new_list)
print(new_tuple)

Q.25 Write a program to check a number whether it is even or odd. ?

SECTION C
Q.26 Write the truth table for given Boolean expression:
𝐸 = 𝐸. 𝐸(𝐸. 𝐸 + 𝐸¯)

Q.27 Find the error in the following code:


(a) y = x +5 (b) a=input(“Value: “) (c) print(x = y = 5) print(x, y)
b = a/2
print( a, b)
Q.28 Write a program to input temperature in Celsius and convert it into
Fahrenheit using the formula: F = C * 9 / 5 + 32

Q.29 Write a program to input names of n students and store them in a tuple.
Also, input a name from the user and find if this student is present in the
tuple or not.
Q.30 What are common gender and disability issues faced while teaching / using
computers in class rooms.
SECTION D

Q.31 Write a program to calculate digits and letters in a string.


Q.32 Convert the following number system.
( 10011111 )2 = ( ? )16 = ( ? )10 = ( ? )8

SECTION E
Q.33 Mr. Rajesh Kumar is a teacher in a school. He is doing his work manually. As
a python learner solve the problems of Rajesh Kumar by python programs:

(i) Create a dictionary student which ask Student roll number, Name and Marks
of students and display them in tabular format.
(ii) Display the names of those students who have secured marks more than 75.
(iii) Delete those students who have secured less than 50 marks

Q.34 Write the solution for the following problem:


(a) How is math. ceil (89.7) different from math. floor (89.7)?
(b)Write a Python program to generate random number between 0 and 9.

Q.35 Explain the following:

(a)What are cookies? How are they used by websites to track you?
(b)What is confidentiality of information? How do you ensure it
(c)What procedure can be carried out for proper E-Waste disposal.

******************************
Practice Paper 4 Answer Key (2022-23)
Computer Science (083) Class: XI
Q No. Section-A (attempt 8 out of 10) Mark
s
1. Magnetic Ink Character Reader (1)
2. Word Processors (1)
3. AND (1)
4. .py (1)
5. Sum (1)
6. a**b (1)
7. List (1)
8. a,b,c= 1000 2000 3000 (1)
9. Left to Right (1)
10. 17 October 2000 (1)
11. Everything you do online is of value and is used by companies looking to (1)
target their advertising
12. Cracking passwords (1)
13. 8 (1)
14. Yes (1)
15. False (1)
16. Elif (1)
17. Both A and R are true and R is the correct explanation for A (1)
18. A is True but R is False (1)
19. (7,6) (2)
20. Integer (2)
Or
(1,2,3,4 )
21. Exami (2)
Or
dict_items([('name', 'Aman'), ('age', 27), ('address', 'Delhi')])
22. Cyber Bullying: use of internet to harm or frighten another person, (2)
especially by sending them unpleasant messages.
Cyber Stalking: Follow the target online by joining the same groups and
forums. Send threatening, controlling, or lewd messages or emails to the
target
23. Restrict access to data. ...Encrypt your data. ... Implement a confidentiality (2)
policy. ...Implement a data retention policy. ...
Develop and implement a cybersecurity program .... Take physical security
measures.....Non-disclosure agreements.

24. 7#7#3# (2)

Or

(22,44,66)
25. num=int(input(“Enter a Number”)) (2)
if ( num% 2)==0:
print(“Even Number”)
else:
print(“Odd Number”)
26. X Y Z X YZ (YZ+Z XY(YZ+ (3)
Y ) Z)
0 0 0 0 0 0 0
0 0 1 0 0 1 0
0 1 0 0 0 0 0
0 1 1 0 1 1 0
1 0 0 0 0 0 0
1 0 1 0 0 1 0
1 1 0 1 0 0 0
1 1 1 1 1 1 1
27. (a) x is not defined (3)

(b) unsupported operand type(s) for /: 'str' and 'int'

(c) invalid syntax


28. celsius = float(input("Enter temperature in celsius: ")) (3)
fahrenheit = (celsius * 9/5) + 32
print('%.2f Celsius is: %0.2f Fahrenheit' %(celsius,
fahrenheit))
29. n = int(input("Enter the number of students: (3)
")) list1 = [ ] for i in range(n): name = input()
list1.append(name)
tuple1 = tuple(list1)
findName = input("Enter name to find: ")
for item in tuple1:
if item==findName:
print("Name found")
else:
print("Name not found")

30. there can be one or more disabilities: (3)


(i) Locomotor disabilities – Severe deformities, polio,
leprosy, cerebral palsy.
(ii) Hearing and speech disabilities – Hearing impairment,
speech aphasia.
(iii) Cognitive impairment – Specific learning deficits
(Dyslexia, Dyscalculia). Down’s syndrome, Autism.
(iv) Vision impairment. low vision, blindness.
31. String =”python1234” (4)
total_digits = 0
total_letters = 0 for
s in string:
if s.isnumeric():
total_digits += 1
else: total_letters
+= 1
print(“Total Letters found :-“,total_letters)
print(“total digits found:-“,total_digits)
32. 9F16=15910=2378 (4)
33. (i) (5)
n = int(input("Enter number of students:
")) result = {} for i in range(n):
print("Enter Details of student No.",
i+1) rno = int(input("Roll No: ")) name
= input("Name: ") marks =
int(input("Marks: ")) result[rno] =
[name, marks]
print(result)
(ii)
for student in result:
if result[student][1] > 75:
print(result[student][0])
(iii)
for student in result:
if result[student][1] < 50: del
result[student][0])

34. (a) math. ceil(89.7)' will return 90 whereas (5)


'math. floor(89.7)' will return 89.

(b) import random for i in range(10):

print(random.randrange(10))

35. (a) Cookies are text files with small pieces of data that are used to (5)
identify your computer as you use a computer network. Specific cookies
known as HTTP cookies are used to identify specific users and improve
your web browsing experience.

(b) Data confidentiality is about protecting data against unintentional,


unlawful, or unauthorized access, disclosure, or theft.We can ensure it by
Shared documents in a secure way,Use anti-virus software, Install a firewall,
Password-protect important files and systems. ...
(c)
Recycling: complete segregation of parts and materials that is then used to
build new electronic products.
Refurbishing: reuse of the working, good quality products to replace parts and
extend the life of other electronic equipment.
Land filling. This is the most common method of electronic waste
disposal. ...
Incineration. A controlled combustion process wherein e-waste is burned
in an incinerator unit.

Class: XI Session: 2022-23 Computer Science (083)


Practice Paper-5 (Theory)
Maximum Marks: 70 Time : 3 hours

General Instructions:

• This question paper contains five sections, Section A to E.


• All questions are compulsory.
• Section A have 18 questions carrying 01 mark each.
• Section B has 07 Very Short Answer type questions carrying 02 marks each.
• Section C has 05 Short Answer type questions carrying 03 marks each. 
Section D has 03 Long Answer type questions carrying 05 marks each.
• Section E has 02 questions carrying 04 marks each. One internal choice isgiven
in Q35 against part c only.
• All programming questions are to be answered using Python Language only.

SECTION A

1. OCR stands for? 1


(a) Optical Character Reader (b) Optical Code Reader
(c) Optical Character Recognition (d) Optical Computer Reader
2. Which one of the following is not input device? 1
b) Keyboard (b) Mouse
c) Speaker (d) Scanner
3. Which gate returns true if both inputs are similar otherwise false 1
(a) AND (b) OR
(c) EXOR (d) NOR
4. What is the output of the expression , 5*1**5 1
(a) 125 (b) 25
(c) 5 (d) 1
5. Which character is used in Python to make a single line comment? 1
(a) / (b) // (c) * (d) #

6. Which of the following is an invalid identifier? 1


(a) my_file (b) myfile13
c) My.File (d) Myfile
7. if L= [ ‘My Score’,95.2, 2022], which data type in Python is used? a. 1
List
b. String
c. Dictionary
d. Tuple
8. Which statement is true from following- 1
a. List is immutable & Tuple is mutable
b. List is mutable & Tuple is immutable
c. Both are mutable
d. Both are immutable
9. Which type of value is returned by the input() function. 1
a. integer
b. float
c. string
d. no value
10. OSI stands for 1
a) Open Source Index
b) Open Source Image
c) Open Source Instant
d) Open Source Initiative
11. Pooja’s classmate sent her a message on Facebook “You are a Loser”. Pooja is 1
victim of :-
a) Phishing
b) Trolling
c) Cyber-bullying
d) Criticis
12. Which is not a cyber crime? 1
(i) Tracking
(ii)Phishing
(iii) Ransomware
(iv) Hacking
13. Find the output of the following str=”My 1
School”
print(str.find(‘School’,2)
(d) 4
(e) 3
(f) 7
(d) 9
14. Does Python support any empty or null statement? 1

a. Yes
b. No
c. May be
d. Don’t Know
15. Predict the output of the following code: 1
Var=5 if Var>4 OR VAR<6 AND
Var==10 print(“Good”) else:
print(“Not Good”)

a. Good b . Not Good c. no output d. none

16. Which statement is used for checking multiple conditions in Python? 1

a. else if b. if…elif c. switch d. None of the above

Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct choice as
(a) Both A and R are true and R is the correct explanation for A
(n) Both A and R are true and R is not the correct explanation for A
(o) A is True but R is False
(p) A is false but R is True

17. Choose correct option : 1


Dic1={ ’A’:’CS’, ‘B’:’IP’}
Dic2={ ’B’:’IP’, ‘A’:’CS’}
Statement 1: Output of print (Dic1==Dic2) is True.
Statement 2: Dictionary is a collection of key-value pairs. It is not a sequence.
18. Choose correct option: Str1=’python’ 1
Str1[0] =Str1[0].upper()
Statement 1: Above code will generate error.
Statement 2: String is mutable by nature.

SECTION B
19. What will be the output of the following Python code? 2
>>>x,y=5,10
>>>x,y=y,x
>>>x,y
20. What will be the output of the following Python code? 2
>>> a=’OK-BYE’
>>> a*=2
>>> a
21. (a) Given is a Python string declaration: 2
exam="##KVS Examination 2022##"
Write the output of: print(exam[2:6]) (b)
Write the output of the code given below:
Dict1 = {"name": "RAM", "age": 26}
Dict1['age'] = 27
Dict1['address'] = "JAIPUR" print(Dict1.items())

22. Define the term : 2


(a) Hackers
(b) Crackers
23. Name the online activities which would help you detect that your friend is 2
being cyber bulled.
24. Predict the output of the Python code given below: 2

(a) X=range(1,10,2)
for i in X:
print(i)

(b) X,Y=17,4 print


(X//Y)
print(X/Y)
25. Write a Python program to input a number print its Square if it is odd, 2
otherwise print its square root. (use import math function)
SECTION C
26. Draw logic circuit for given Boolean expression: F(A,B,C) 3
= A’B+AB+B’C
27. Find the error in the following code and rewrite corrected code: 3
25=Val for I in the
range(0,Val)
if I%2==0:
print( I+1)
Else:
print (I‐1
28. Write a python program to print a sum of series up to 10 integers using for 3
loop.
29. Write a program to input a list of numbers and find the smallest and largest 3
number from the list.
30. What are the benefits of e-waste recycling? 3
SECTION D
31. Write a python program to accept a string and replace all space by ‘$’ symbol. 4
32. Convert the following number system. 4
(a) (11011.10 )2 into ()10
(b) (11100.1010)2 in to ()16
(c) (10AF)16 into ()2
(d) (A42)16 into ()8
SECTION E
33. Write a program to create a dictionary to input total number of sections and 5
class teacher’s name of a class 11 and display all information on the output
screen.
34. Which string method is used to implement the following: 5
a. To count the number of characters in the string
b. To change the first character of the string in capital letter
c. To change lowercase to uppercase letter
d. To check whether the given character is letter or a number
e. To replace all the occurrences of the old string with the new string.
35. Explain the following: 5
Open-Source Software and Proprietary Software
OR Active
and Passive digital footprint

******************************

Class: XI Session: 2022-23 Computer Science (083) Answer


Key Practice Paper-5 (Theory)

SECTION A
1. (c) Optical Character Recognition 1
2. c) Speaker 1
3. (d) NOR 1
4. (c) 5 1
5. (d) # 1
6. (c) My.File 1
7. List 1
8. b. List is mutable & Tuple is immutable 1
9. String 1
10. d) Open Source Initiative 1
11. Cyber-bullying 1
12. (i) Tracking 1
13. b) 3 1
14. Yes 1
15. A. Good 1
16. b. if…elif 1
17. (a) Both A and R are true and R is the correct explanation for A 1
18. ( C) A is True but R is False 1
SECTION B

19. c) (10,5) 2
20. c) OK-BYEOK-BYE 2
21. a) KVS 2
B)
dict_items([('name', 'RAM'), ('age', 27), ('address', JAIPUR')])
22. Hackers and Crackers : Hackers are most often programmers. Hackers are 2
people who hack devices and systems with good intentions. They might hack
a system for a specified purpose or for obtaining more knowledge out of it.
Crackers: Crackers are people who hack a system by breaking into it and
violating it with some bad intentions. They may hack a system remotely for
stealing the contained data or for harming it permanently. Crackers can easily
be identified because their actions are malicious. 1 mark each for explain the
terms
23. Cyberbullying can include: 2
Sending mean texts or IMs to someone
Pranking someone’s cell phone
Hacking into someone’s gaming or social networking profile
Being rude or mean to someone in an online game
Spreading secrets or rumours about people online
Pretending to be someone else to spread hurtful messages online 1
mark each for at least two activities

24. Predict the output of the Python code given below: 2


1,3,5,7,9
4
4.25
1 mark for each correct output
25. #program to input a number print its square if it is odd otherwise print its 2
square root.

import math num=int(input("enter a number : ")) if (num%2!=0):


print("The given number",num, "is odd so its square is :",num*num)
else:
print ("The given number",num, "is even so its square root is :", math.sqrt (num))
2 mark for correct python code

SECTION C
26. Logic circuit for given Boolean expression: 3

3 mark for correct logic circuit

27. Find the error in the following code and rewrite corrected code: 3
Val = 25 #Error 1 for I in
range(0,Val): #Error 2 if I
%2==0:
print( I+1)
else: #Error 3 print (I‐1)
1 mark for each corrected error

28. #program to print a series and sum of series upto 10 integers using for loop. 3
sum=0 for i in
range (1,11):
print (i)
sum=sum+i
print("sum of series is " ,sum)
3 mark for correct python code
29. mylist=[] num=int(input("how many elements to be 3
entered: ")) for i in range(num):
item=int(input("enter elements : "))
mylist.append(item)
print("Largest element in the list is ", max(mylist)) print("Smallest
element in the list is ", min(mylist))
output: how many elements to be
entered: 5
enter elements :
1 enter
elements : 2
enter elements :
5 enter
elements : 4
enter elements :
3
Largest element in the list is 5 Smallest
element in the list is 1

3 mark for correct python code


30. (i) Protects public health and water quality 3
(ii) Allow for recovery of valuable precious metals.
(iii) Save landfill space
(or any other relevant point 1 mark for each correct line)

SECTION D
31. # python program to accept a string and replace all space by ‘$’ symbol. 4

str=input("enter a
string :") str1=" " for i in
str:
if i.isspace():
str1=str1+'$'
else:
str1=str1+i
print("The replaced string is:", str1)

output: enter a string :I love


my india
The replaced string is: I$love$my$india
3 mark for correct python code and 1 mark for output
32. 27.50 4
1C.A
0001000010101111
5102

1 mark for each correct conversion


SECTION E
33. classxi = dict () 5
n = int(input("Enter total number of section in xi
class")) i = 1 while i <= n : a = input ("enter section :")
b = input ("enter class teacher
name :") classxi[a]= b i = i+1
print ("Class", "\t", "Section","\t", "Teacher Name") for
i in classxi :
print ("XI", "\t", i, "\t", classxi[i])

output:

Enter total number of section in xi


class2 enter section :Science enter class
teacher name :Sunil enter
section :Humanities enter class teacher
name :Jyoti
Class Section Teacher Name
XI Science Sunil XI
Huminities Jyoti

3 mark for correct python code and 2 mark for output and documentation.
34. a. len(str) 5
b. str.capitalize( )
c. str.upper( )
d. ch.isalnum( )
e. str.replace()

1 mark for each correct string function


35. Open Software and Proprietary Software 5
Open source software (OSS) is software that is distributed with its source code,
making it available for use, modification, and distribution with its original rights.

Proprietary software is any software that is copyrighted and bears limits against
use, distribution and modification that are imposed by its publisher, vendor or
developer. Proprietary software remains the property of its owner/creator and is
used by end-users/organizations under predefined conditions.

OR

Active and Passive Digital Footprint


Active digital footprints are created when a user, for the purpose of sharing
information about oneself by means of websites or social media, deliberately. An
"active digital footprint" includes data that you intentionally submit online. Sending
an email contributes to your active digital footprint, since you expect the data be
seen and/or saved by another person. The more email you send, the more your
digital footprint grows.

A passive digital footprint is created when data is collected without the owner
knowing. A more personal aspect of your passive digital footprint is your search
history, which is saved by some search engines while you are logged in.

21/2 mark for each correct definition


******************************

You might also like