100% found this document useful (2 votes)
3K views

CS - Practise Papers - Xi

The document provides instructions and questions for a practice exam on computer science. It has multiple choice and long answer questions covering topics like operators, loops, functions, classes, and programming concepts. The exam has 5 sections with a mix of 1, 2, 3, 4 and 5 mark questions to test students' understanding of programming and computer science fundamentals.

Uploaded by

Ansh Rajput
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
3K views

CS - Practise Papers - Xi

The document provides instructions and questions for a practice exam on computer science. It has multiple choice and long answer questions covering topics like operators, loops, functions, classes, and programming concepts. The exam has 5 sections with a mix of 1, 2, 3, 4 and 5 mark questions to test students' understanding of programming and computer science fundamentals.

Uploaded by

Ansh Rajput
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

Class: XI Session: 2022-23 Computer Science (083)

Practice Paper-1(Theory)
MaximumMarks:70 Time Allowed: 3 Hrs

General Instructions:
1. This question paper contains fives sections, Section A to E.
2. All questions are compulsory.
3. Section A have18 questions carrying 01 mark each.
4. Section B has 07 Very Short Answer type questions carrying 02 marks each.
5. Section C has 05 Short Answer type questions carrying 03 marks each.
6. Section D has 03 Long Answer type questions carrying 05 marks each.
7. Section E has 02 questions carrying 04 marks each. One internal choice
is given in Q35 against part C only.
8. All programming questions are to be answered using Python Language only.
SECTION A
1. MS-Office is a- 1
(a) Operating Software (b) Utility program
(c) Programming language (d) Application Software
2. What is the ASCII equivalent decimal no. for ‘Y’ ? 1
a) 87 (b)88 (c) 89 (d)90
3. Hexa-Decimal of (346)10= (?)16(Show calculation) 1
(a) 14B (b) 1A5 (c)15A (d) 5A1
4. Find the invalid identifier(s) from the following: 1
a) MyName b) 2ndName
c) true d) My_Name
5. Suppose tuple T is T = (10, 12, 43, 39), Find incorrect? 1
a) print(T[1]) b) T[2] = -29
c) print(max(T)) d) print(len(T))
6. What will be the result of the following code? 1
>>>d1 = {“abc” : 5, “def” : 6, “ghi” : 7}
>>>print (d1[abc])
(a) abc (b) 5 (c) {“abc”:5} (d) Error
7. Suppose list L is declared as 1
L = [5 * i for i in range (0,4)], list L is
a) [0, 1, 2, 3,] b) [0, 1, 2, 3, 4]
c) [0, 5, 10, 15] d) [0, 5, 10, 15, 20]
8. Identify declaration of M = ‘Mon’,‘23’,‘Bye’, ’6.5’ 1
a) dictionary b) string c) tuple d) list
9. STR=”RGBCOLOR” 1
colors=list(STR)
How do we delete ‘B’ in given List colors?
(a) del colors[2] (b) colors.remove("B")
(c) colors.pop(2) (d) All of these
10. What is the value of x when this loop has been terminated: 1
x=45
while x>0:

1
print(x)
x=x-10
(a) 25 (b) 45 (c) 5 (d) -5
11. What will be the output of the following Python Code? 1
tp=(5,)
tp1=tp * 2
print(len(tp1))
(a) 0 (b) 2
(c) 1 (d) error
12. day_name= ['Mon', 'Tues', 'Wednes', 'Thursday', 'Friday', 'Saturday','Sunday'] 1
print(day_name[7])
What will be the result?
(a) Sunday (b)Saturday
(c)Error (d) Mon
13. It is a Logical Gate 1

(a) XOR (b) NAND


(c) AND (d) OR
14. Which is equivalent of (A+B)’ 1
(a) A’.B’
(b) A’+B’
(c) A.B’
(d) A’.B
15. Which is not a threat? 1
(a) Worm (b) Trojan
(c)Virus (d) E-Mail
16. What type damages can be caused by viruses to your computer? 1
(a) Damage or Delete files
(b) Slow down your computer
(c) Invade all Programmes in your Computer
(d) All of these
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct choice as:
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
17. Choose correct option: 1
A: Viruses are the malicious program.
R: Worm means Write Once Read Many.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
18. Choose correct option: 1
Statement 1: t1=tuple(’python’)
Statement 2: t1[4]=’z’
A: Above code will generate error Statement2:
R: Tuple is immutable by nature.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
SECTION B
19. What will be the output of the following Python code? 2
x, y=4, 2
while(x>=y):
print(x, y)
x=x-1
y=y+1
a) 4, 2 b) Invalid syntax c) 2, 4 d) Nothing is printed
3, 3 3, 3
20. What is the result of this statement: 2
10>5 and 7>12 or not 18>3
a) 10 b) True c) False d) None
OR

What will be the output of the following Python code?


>>> 6 * 3 + 4 ** 2 // 5 - 8
a) 13 b) 14 c) Error d) None
21. Convert the following program into for loop without affecting the output. 2
count=0
while count<10:
print(“Hello”)
print(“Good Bye!”)
count=count+1
22. What do you understand by PC intrusion? 2
23. What is a spam? Why has it become a big Internet issue? 2
24. How many times will the following for loops execute and what’s the output of 2
this program?

for i in range(-1,-7,-2):
for j in range(3):
print(1, j)
OR
What’s the output of the following program.
fruits = { 'Apple': 100,
'Orange': 200,
'Banana': 400,
'pomegranate':600 }
if 'Apple' in fruits:
del fruits['Apple']
print('Dictionary after deleting key =',fruits)
25. Write a program to print the Fibonacci Series till n terms, where n is entered 2
by the user.
SECTION C
26. Answer the following: 3
i) Convert: (111111110101110.1101101111)2= (?)16 (1+2)
ii) Differentiate between Compiler and Interpreter.
27. Rewrite the following code in Python after removing all syntax error(s). 3
30 = To
for K in range(0, To)
If K%4 == 0:
Print(K*4)
Else:
Print(K + 3)
28. Write a program to check whether the entered number is Armstrong or not. 3
29. What possible output(s) are expected to be displayed on screen at the time of 3
execution of the program from following code? (1 + 2)
from random import randint
LST=[5,10,15,20,25,30,35,40,45,50,60,70]
first = random.randint(3,8) -1
second = random.randint(4,9) -2
third = random.randint(6,11) -3
print(LST[first],"#", LST[second],"#", LST[third],"#")
a) 20#25#25# b) 30#40#70#
c) 15#60#70# d) 35#40#60#
Specify the maximum values that can be assigned to each of the variables
second and third in the code given.
30. Umesh wanted to gift his brother a football or a wrist watch. So he searched 3
for many sports items and wrist watches online. But after that every time he(1+1+1
goes online, his web browser shows him advertisements about sports items)
and wrist watches.
(a) Why is this happening?
(b) How could have Umesh avoided them?
(c) How can Umesh get rid of this now?
SECTION D
31. Write a program to search for an element in a given list of numbers. 4
32. Expand the following: - 4
i) Write the full forms of following: IPR, GPL, Proprietary Software, (2+2)
URL
ii) Identify the Open Source software(s) from the following: -
MySql, Quick Heal Antivirus, Python, Microsoft Office
SECTION E
33. Explain the following : 5
(i) What is syntax error? Give one example. (1+2
(ii) What is the difference between ‘=’ and ‘==’? Explain with the help of +2)
an example.
(iii) What do you understand by precedence of operators? What is the
precedence of arithmetic operators?
34. Write the solution for the following problem: 5
(a) Write the output of this program : (2+3)
s1='Hello World!'
index=0
while index< (len(s1)-3):
print(s1[index], end=' ')
index =index+ 1
OR
Write the output of this program. Justify your answer also.
my_dict={ }
my_dict[1]=1
my_dict[‘1’]=2
my_dict[1.0]=4
print(my_dict)
(b) Write a Python program to create a dictionary to store names of states and
their capitals.
OR
Write a Python program to create a third dictionary from two dictionaries in
the way so that the values are shown in third dictionary.
35. Explain the following : 5
(a) How do websites track you online? (3+2)
(b) What are cookies? How are they used by websites to track you?
******************************
Class: XI Session: 2022-23 Computer Science (083)
Answer Key for Practice Paper-1
MaximumMarks:70 Time Allowed: 3 Hrs
SECTION A
1. (d) Application Software 1
2. (c) 89 1
3. (c)15A 1
4. (b) 2ndName 1
5. (b) T[2] = -29 1
6. (d) Error 1
7. (c) [0, 5, 10, 15] 1
8. c) tuple 1
9. (d) All of these 1
10. (d) -5 1
11. (b) 2 1
12. (c)Error 1
13. (c) AND 1
14. (a) A’.B’ 1
15. (d) E-Mail 1
16. (d) All of these 1
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct choice as:
(a)Both A and R are true and R is the correct explanation for A
(e) Both A and R are true and R is not the correct explanation for A
(f) A is True but R is False
(g) A is false but R is True
17. (b) Both A and R are true and R is not the correct explanation for A 1
18. (d) A is false but R is True 1
SECTION B
19. a) 4, 2 2
3, 3
20. c) False 2
OR

a) 13
21. for count in range(0,10,1): 2
print(“Hello”)
print(“Good Bye!”)
22. PC Intrusion - Computer Definition. To compromise a computer system by 2
breaking the security of such a system or causing it to enter into an insecure
state. The act of intruding—or gaining unauthorized access to a system—
typically leaves traces that can be discovered by intrusion detection systems.
23. Spam email is a form of commercial advertising which is economically viable 2
because email is a very cost-effective medium for the sender. If just a fraction
of the recipients of a spam message purchase the advertised product, the
spammers are making money and the spam problem is perpetuated.

24. Outer loop ( i based) run 3 times and Inner loop ( j based) will run 3 times for 2
each value of i.
Output:
10 11 12 10 11 12 10 11 12
OR
Dictionary after deleting key = {'Orange': 200, 'Banana': 400, 'pomegranate':
600}
25. n=int(input("How many numbers do you want to print in Fibonacci Series: ")) 2
first=0
second=1
i=3
print(first, second, end=" ")
while i<=n:
third=first+second
print(third, end=" ")
first=second
second=third
i=i+1
SECTION C
26. iii) (111111110101110.1101101111)2= (7FAE.DBC)16 3
iv) Difference between Compiler and Interpreter:
1. Compiler converts whole source code of program into target
program (machine code) in one round and display all the errors
with their line numbers while Interpreter converts source code
into machine code program line by line and stop/ halt at the
error-prone line until that error has been debugged from that
line of code.
2. Compiler takes lesser time in conversion while Interpreter takes
more time in conversion.
27. Rewrite the following code in Python after removing all syntax error(s). 3
To=30 # Variable assignment statement
for K in range(0, To): #colon should be there before loop body
if K%4 == 0: # if is a keyword
print(K*4) #print( ) is a predefined method in python
else: # else is a keyword
print(K + 3)
28. temp=n=int(input("enter a three digit number:")) 3
sum=0
while(n>0):
r=n%10
sum=sum + (r*r*r)
n=n//10
if temp==sum:
print("armstrong")
else:
print("not armstrong")
29. a) 20#25#25# 3
Option (a) is expected output. (1+2)
Maximum values that can be assigned to the variables second and third are 7
and 8 respectively.
30. (a) This is happening because third party cookies saved his search preferences 3
and now websites are posting advertisements based on his preferences. (1+1+1
(b) Umesh could have avoided this by privately browsing i.e. opening the web )
browser in incognito mode before searching for such things.
(c) Now Umesh can delete all the previous history and cookies stored on his
computer. This would stop websites posting advertisements.

SECTION D
31. L1=[2,5,11,13,18] 4
list1=len(L1)
n=int(input("Enter element to be searched for"))
for j in range(0, list1,1):
if L1[j]==n:
print(n,"found at index",j)
break
else:
print(" Element Not found" )
32. iii) IPR- Intellectual Property Rights 4
GPL-General Purpose License (2+2)
Proprietary Software-The software which is purchased by paying
some amount of money.
URL-Unified Resource Locator
iv) the Open Source software(s) are: MySql, Python
SECTION E
33. (i) syntax error-These are produced by Python when it is translating the 5
source code into byte code. They usually indicate that there is something(1+2+2
wrong with the syntax of the program. Example: Omitting the colon at the end)
of a for statement yields the somewhat redundant message SyntaxError:
invalid syntax.
Example: print(“Hello” #syntax error due to right parenthesis is missing
(ii) Difference between ‘=’ and ‘==’operator:
‘=’ assignment operator while ‘==’ is equality operator.
Example: a=5 # value 5 assigned to variable a.
2==9 # checks the equality, gives False as result
(iii) The order in which the operators are executed in an expression is called
the operator precedence. The precedence of Arithmetic operator is as follows:
**
*, /, //, %
+, -
34. Write the solution for the following problem: 5
Output: H e l l o W o r (2+3)
OR
Output: {1: 4, '1': 2}
Justification/Reason: 1 and 1.0 are considered as same key of integer type
while ‘1’ is considered as string type key hence statement-4 overwrite the
value assigned in statement-2 by the compiler.

(b)
md={ }
n=int(input("How many capitals you want to store"))
for i in range(n):
st=input("Enter state:")
cap=input("Enter Capital:")
md[st]=cap
print("States and their capitals are:", md)
OR
d1={ 1:'one',2:'two', 3: 'three' }
d2={ 4:'four',5:'five',6:'six'}
d3=dict(d1)
d3.update(d2)
print(d1)
print(d2)
print(d3)
35. (a) Whenever you visit a website, your web browser may reveal your 5
location via your device‘s IP address. (3+2)
1. It can also provide your search and browsing history etc. which may be
used by third parties, like advertisers or criminals.
2. This way website track you. Tracking is generally used by advertising
networks to build up details profiles for pinpoint ad targeting.
3. This information is compiled through your web usage patterns, and
which websites generally use for tracking you.
This generally includes-
1. IP Address
2. Cookies and tracking scripts etc.
3. HTTP Referrer
4. Super Cookies
5. User Agent
(b) Cookies are small pieces of information websites can store in your
browser.
Cookies can be –
1. First Party Cookies- These are the cookies that store your own log in id,
password, and auto fill information etc.
2. Third Party Cookies: These are the cookies that websites store to know
about your search history and web browsing history so as to place
advertisements as per your interests.

******************************

hours
ss: XI Session: 2022-23 Computer Science (083)
Practice Paper-2 (Theory)
Maximum Marks: 70 Time Allowed: 3

C
l
a

General Instructions:

 This question paper contains five sections, Section A to E.


 All questions are compulsory.
 Section A have 18 questions carrying 01 mark each.
 Section B has 07 Very Short Answer type questions carrying 02 marks each.
 Section C has 05 Short Answer type questions carrying 03 marks each.
 Section D has 03 Long Answer type questions carrying 05 marks each.
 Section E has 02 questions carrying 04 marks each. One internal choice is
given in Q35 against part c only.
 All programming questions are to be answered using Python Language only.
SECTION A
1. Which of following is Which of the following is the smallest unit of data in a 1
computer?
(a) Bit (b) KB (c) Nibble (d) Byte
2. Which of the following is an example of primary memory? 1
(a)Hard Disk (b)RAM
(c)Floppy Disk (c)DVD
3. A gate gives the output as 1 only if the input signal is 0. 1
(a) NOR (b) OR
(c)NOT (d) XOR
4. Given A= “[ 22,4.88,”India”, “T”]” the datatype of A is 1
(a) List (b) String (c) Dictionary (d) Tuple
5. Which of the following is a keyword in Python language? 1
(a) if (b)for
(c) int (d) all above
6. Which of following is valid identifier- 1
(a) NUM (b) 1_Num
(c) F.No (d) False
7. Which of following datatype not supported by python- 1
(a) float (b) Complex
(c) List (D) Date
8. Which of the following is a valid statement in python? 1
(a) name = “bikaner’
(b) num = 1,000
(c) a+b =c
(d) x=”30” +5
9. Which of following can be used for making a comment in python- 1
(a) & (b) # (c) @ (d) None of these

10. You should never give out which of the following on the Internet? 1
(a) Your name (b) Your age (c) Your address. (d)All of the above.
Which of the following is the best description of an 'internet troll'? 1
11.
(a) Someone who goes trolling on the internet, moving from place to place
without settling anywhere in a chat room or on a board.
(b) A funny emoticon made to look like a troll.
(c)Another name for a spammer.
(d) Someone who participates in a message board or chat with the intention to
disrupt it in some way.

12. In which of the following, a person is constantly followed/chased by another 1


person or group of several peoples?

(a) Phishing (b) Bulling (c) Stalking (d) Identity theft


13. Find the output of the following code- 1
number= [1,5,7,0,4]
print(number[2:3])
(a) [5]
(b) [7]
(c) [7,0]
(d) None of above
14. What is output of following code segment- 1
T= min(1,6,0,-3,100)
(a) 1 (b) -3 (c) 0 (d) None of above

15. Predict the output of the following code: 1


a=5
a+=100
if(a<100):
print(“false”)
else:
print(“true”)

(a) true ( b ) false (c) no output (d) none of these


16. Which of these is not a primitive or fundamental data types? 1
(a) integer ` (b) Boolean
(c) List (d) String
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct
choice as
(a) Both A and R are true and R is the correct explanation for A
(h) Both A and R are true and R is not the correct explanation for A
(i) A is True but R is False
(j) A is false but R is True
17. Choose correct option : 1
T1=[3,9,0,1,7]
T2=[5,1,0,7,5.5]
Statement A: Output of print (len(T1)==len(T2) is True.
Statement R: method len() returns the number of elements in the list.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
18. Choose correct option: 1
S1=’CoMPuter SciENce’
S1[0] =S1[0].lower()
Statement A: Above code will generate error.
Statement R: String is mutable by nature.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
SECTION B
19. (a) What will be the output of the following Python code? > 2
>>> print(math.ceil(55.1))
(b) Which python module required to run above code successfully?

20. What is token ? Name various types of token. 2

OR

What will be the output of the following Python code?


>>> a=72.55
>>> b=10
>>> c=int(a+b )
>>> c
a) 72.55 b) 72 c) 82 d) None of these

21. (a) Write the output of following code segment. 2


str= “ CS and IP"
a=str.split()
print(a)

(b) Write the output of the code given below:


dict = {"stname": "Ajay", "age": 17}
dict['age'] = 27
dict['address'] = "Bikaner"
print(dict)

22. Define the term: 2


(a) Digital Footprints
(b) Cookies
23. What measures should one take to avoid and maintain confidentiality of 2
personal information?
24. Predict the output of the Python code given below: 2

fruits = ["apple",”mango”, "banana", "cherry"]


for x in fruits:
if(len(x)>5):
print(x )
OR

Predict the output of the Python code given below:

i = 1
while i < 6:
print(i)
if i == 3:
break
i += 1

25. Write a program calculate and print total and average runs scored by a 2
cricketer in 3 matches.
SECTION C
26. State De Morgan’s laws / theorems and prove using truth table. 3

27. Rewrite following code after removing errors (if any): 3


N=100
A= “Number” +5
B= 2N +20
Print(B)
28. Write a program to print following series – 3
2,4,8,16, …………….
29. Write a program to input names of 5 employee and store them in a List. Now 3
enter name of an employee and find if this employee is present in the List or
not.

30. What are common gender and disability issues faced while teaching / using 3
computers in class rooms.

SECTION D
31. Write a python program to calculate factorial of a number. 4
32. Convert the following numbers. 4
(a) ( 100111101 )2 = ( ? )8
(b) ( 127 )10 = ( ? )2
SECTION E
33. (a) Differentiate between list and tuple with example ? 5
(b) Write a python program to input 3 students name and their marks using (3+2)
dictionary. Print the dictionary also.
34. Write the solution for the following problem: 5
(a) How is random.randint(10) different from random.randrange (10)? (3+2)
(b)Write a Python program to generate a random number between 0 to 8.
35. (a) What is E-waste management? Discuss proper disposal of used electronic 5
gadgets (3+2)
(b) Write short note on IPR (Intellectual Property Right).

******************************
Class: XI Session: 2022-23 Computer Science (083)
Answer Key Practice Paper 2 (Theory)
Maximum Marks: 70 Time Allowed: 3

SECTION A
1. (a) Bit
2. (b) RAM
3. (c) NOT
4. (b) String
5. (d) All Above
6. (a) NUM
7. (d) Date
8. (b) bum=1,000
9. (b) #
10. (d) All of the above.
11. (d) Someone who participates in a message board or chat with the intention to
disrupt it in some way.

12. (c) Stalking


13. (b) [7]
14. (b) -3
15. (a) true
16. (c) List
17. (a)
18. (a)
Section B
19 (a) 56
(b) import math
20 Smallest unit in a program is known as token. Examples – int, if , a, num, # etc
OR
c) 82
21 (a) ['CS', 'and', 'IP']
(b) {'stname': 'Ajay', 'age': 27, 'address': 'Bikaner'}
22 (a) Digital Footprints -Digital footprints are the records and traces that we
leave behind as we use the internet.
(b) Cookies are text files with small pieces of data — like a username and
password — that are used to identify your computer as you use a computer
network.
23 Use a firewall, install antivirus, create strong password , don’t share personal
information
24 Banana
cherry
OR
1
2
3
25 run1= int (input ("Enter run scored in 1st inning="))
run2= int (input ("Enter run scored in 2nd inning="))
run3= int (input ("Enter run scored in 3rd inning="))
total= run1 +run2 + run2
avg= total/3
print("Total runs=",total)
print("Average Runs= ", avg)
26 3 Marks both theorem and truth table.
(i) (A+B)’ = A’.B’ (ii) (A.B)’ = A’+B’
27 N=100 (No Error)
A= “Number” +”5 “
B= 2*N +20
print(B)
28 #Series -----2,4,8,16, …………….
a=1
n= int (input ("Enter the terms="))
for i in range(n):
a=a*2
print(a, end=",")
29 L=[]
found=False
for i in range(5):
name=input("Enter Name =")
L.append(name)
text=input("Enter name to be searched=")
for i in range(len(L)):
if (text ==L[i]):
found=True
if(found):
print("Name is in List")
else:
print("Name is not in List")
30 Preconceived notions, Lack of interest, Lack of motivation

Unavailability of teaching material / aids, Lack of special needs teachers, Lack


of supporting curriculum
31 n= int (input ("Enter the Number="))
f=1
for i in range(1,n+1):
f=f*i
print("Factorial=",f)
32 (a) 475
(b) 1111111
33 (a)List is collection of items enclosed with[]. Tuple is collection of items
enclosed with(). List is mutable . Tuple is immutable.
L=[1,4,5,6,2] is a list
T=(3,5,4,1,8) is a tuple.
(b)student={}
n=3
i=1
while(i<=n):
a=input("enter student name=")
b=input("enter marks")
student[a]=b
i=i+1
print(student)
34 (a) randint() when we want to generate a random number from an inclusive
range.
randrange() when we want to generate a random number within a range by
specifying the increment. It produces a random number from an exclusive
range.
(b) import random
a=random.randint(0,8)
print(a)
35 (a) Electronic waste or e-waste describes discarded electrical or electronic
devices. Used electronics which are destined for refurbishment, reuse, resale,
salvage recycling through material recovery, or disposal are also considered e-
waste. Informal processing of e-waste in developing countries can lead to
adverse human health effects and environmental pollution.
We should Recycle it.
(b) Intellectual property (IP) is a category of property that includes intangible
creations of the human intellect. There are many types of intellectual property,
The best-known types are copyrights, patents, trademarks, and trade secrets.
Class: XI Session: 2022-23 Computer Science (083)
Practice Paper-3 (Theory)
Maximum Marks: 70 Time Allowed: 3 hours

General Instructions:
1. This question paper contains five sections, Section A to E.
2. All questions are compulsory.
3. Section A have 18 questions carrying 01 mark each.
4. Section B has 07 Very Short Answer type questions carrying 02
marks each.
5. Section C has 05 Short Answer type questions carrying 03 marks
each.
6. Section D has 03 Long Answer type questions carrying 05 marks
each.
7. Section E has 02 questions carrying 04 marks each. One internal
choice is given in
Q35 against part c only.
8. All programming questions are to be answered using Python
Language only.

SECTION: A
Q.No Question Marks

1. Components that provide internal storage to the CPU is: 1


(a) Registers (b) Program Counters
Controller (d) Internal Chips
2. The boolean expression of following logic circuit is : 1

(a) (A+B).C'+B (b) A'B'+C+B'A


(c) A.B.C+(B'+C').A (d) A+B+C'(A+B)
3. Full form of OMR is: 1
(a) Optical Mark Reading (b) Optical Mark Recognition
(c) Optical Mark Reader (d) Optical Mark Resolution
4. Which of the following is not valid string in Python? 1
(a) “Hello” (b) ‘Hello’
(c) “Hello’ (d) None of the Above
5. What shape represents a decision in a flow chart? 1
(a)Oval (b) Diamond (c) Rectangle (d) Arrow
6. What will be the output of above Python code? 1
abc="6/4"
print("abc")
(a) 1 (b) 6/4 (c) 1.5 (d) abc
7. Which of the following will give "Simon" as output? 1
If str1="Hari,Simon,Vinod"
(a) print(str1[-7:-12]) (b) print(str1[-11:-7])
(c) print(str1[-11:-6]) (d) print(str1[-7:-11])
8. What is identity theft? 1
9. Accessing of data in a dictionary is done through : 1
(a)Index (b) value (c) key (d) cell number
10. Which of the following will be the output of the operation? 1
L1=[1,2]
L2=[3,4]
(L1 + L2)*2
(a) [2,4,6,8] (b) [1,2,3,4,1,2,3,4] (c) [1,3,4,4] (d) [3,4,1,2]
11. Which of the following can add a list of elements to a list? 1
(a) append() (b) extend() (c) add() (d) none of these
12. Which of the following is not a type of cyber criminals? 1
(a) Unauthorized account access (b) Email spoofing and spamming
(c) Mass attack using Trojans as botnets (d) Report vulnerability in any system

13. Which of the following can be termed as Cyber Bullying: 1


a) Posting Rumors online
b) Posting hate speech
c) Posting sexual remarks
d) All the above
14. How many asterisks does the following code 1
fragment print?
a=3
while a < 20:
print('*')
a += 1
(a)16 (b) 17 (c) 18 (d) 20
15. What is the output of the following? 1
>>>print('INDIA'.capitalize())
16. ‘Python is an interpreted high level language’. What does it mean to you? 1
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct
choice as
(a) Both A and R are true and R is the correct explanation for A
(k) Both A and R are true and R is not the correct explanation for A
(l) A is True but R is False
(m) A is false but R is True
17. Assertion (A) : Comments are non-executable statements that enable the users to 1
understand the program logic.
Reason (R) : They are basically statements used to put remarks. The comments
are used to explain the code and to make it more informative for the users.
Pick an appropriate statement from the given options:
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true and R is not the correct explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
18. Assertion (A) : In Python, the tuple is an immutable collection of data. 1
Reason (R) : It means that any change or alteration in data, is mentioned in the
same place. The updated collection will be use the same address for its storage.
Pick an appropriate statement from the given options:
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true and R is not the correct explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
SECTION : B
19. What is output from the following code : 2
(i)range(6) (iii)range(5,20,4)
(ii)range(7,10) (iv)range (12,1,-2)
20. How the pop ( ) function is different from remove( ) function working with list in 2
python ?
OR
What will be the output of the following python code:
(i) a = [12,14,16,18,10]
print(a[-1:1:-2])
(ii) d = {'Name':'Ravi', 'Marks':90}
e = {'Age':16, 'Marks':95}
d.update(e)
print(d)
21. How the internet security is a major issue? Write any two solutions of internet 2
security threats.
22. What is mutable and immutable data objects in Python? Name any one of each 2
type.
23. Identify the valid and invalid identifiers 2
MyDiary, 1num, File123, _Clear, Mynameisking, while, Your.story, If
24. (i)Name the popular micro blogging social networking website 2
ii)To protect a computer from virus, you should install --------- in your computer.
A. backup wizard B. disk cleanup
C. antivirus D. disk defragmenter
25. What will be the output of the following Python code? 2
>>>x,y=5,10
>>>x,y=y,x
>>>x,y
a) 5,10 b) 10,10 c) 10,5 d) 5,5
OR
What will be the output of the following code
(i) List1=[13,18,16,16,13,18]
print(List1.index(16))
(ii) Strg=”computer”
print(Strg[ 0: 8 : 2]
SECTION: C
26. Convert the following numbers into their equivalent numbers. 3
(i) (29.75)10 = (………….)2 (ii) (A4B)16 = (… ............. )10
(iii) (1234)8 = (… ........ )16
27. Write a Python program to calculate bonus as the following criteria using if- elif 3
statement :
If salary between bonus
0 to 25000 25% of salary
25001 to 35000 15% of salary
35001 to 50000 10% of salary
50001 to 75000 05 % of salary
75001 and above nil
OR
What is difference between break and continue statement in Python explain with
example.

28. Go through the program of dictionary in python given below and predict the 3
output of program.
Student={"RollNo":10 , "Name":"Kuku" , "Class":11 , "Age":15}
T=len(Student)
Elm=Student.get("Name")
mylist=Student.items()
print("Length=",T)
print("Specific Element=",Elm)
print("My List=",mylist)
29. Find the output of the following code: 3
>>> L=["These", "are", "a", ["few", "words"], "that", "we", "will", "use"]
>>> print (L[3:4])
>>> print (L[1:4:-1])
>>> print ("few" in L)
>>> print (L[0::2])
>>> print (L[4:])
>>> print (L)
OR
te a program to check number of ‘H’ present in a string:
ALPS HEALS WITHOUT HURTING”
output will be displayed as:
Total number of ‘H’ is: 4
30. Consider the Following conversation and answer the question 3
Person 1:- What’s your name?
Person 2:- Radha
Person 1:- What is the name of your first school?
Person 2 :- Army Public School
Person 1 :- What are your Father and Mother name?
Person 2 :- Krishna and Sarita
Person 1 :- Who is your favorite actor or actress?
Person 2 :- Amitabh
Person 1:- What is the name of your pet animal?
Person 2 :- Tommy
Person 1 :- Where were you born and when?
Person 2:- Ajmer on 15 March 2002
Person 1 :- May I use your Laptop for online banking for fees payment
Person 2 :- Sure
(i) Who may be Victim of Cyber Crime Person1, Person 2 or both?
Justifyyour answer
(ii) Who is doing Ethical Hacking person1 or person2? Justify your Answer
(iii) Person 2 was using Key Logger software in his computer. What is it?
SECTION: D
31. Write a Python program to input 10 numbers to store in the list and print the 2+2
third largest number. For example, if the entered numbers in the list are List are
36, 25, 14, - 951, 75, - 85, 654, 88, 9521, 657, then output will be
The third largest number is : 654
32. What will be the output of the following code 4
i. type(34)
ii. a, b=10,20
a, b= b, a+b
print(a, b)
iii. a=20 + 4j
print(a.real + a.imag)
iv. print(10,20,30, sep=’*’,end=’@’)
SECTION: E
33. What will be the output of the following: 5
(a) [11, 14, 18, 10, 15]
(b) ['P', 'Y', 'T', 'H', 'O', 'N']
(c) L1.insert(0,12)
(d) L1.sort()
(e) L1.remove(14)
(f) L1.append(5)
(g) L2.pop()
(h) L1+L2
(i) L1.extend([12,16,18])
(j) L1*2
34. A code snippet using a dictionary is shown below and What will be the output of 5
the following :
dt={“Apple”:50, “Orange”:40, “Banana”:30 , “Mango”:80}
print(len(dt)) #Statement 1
print(dt.keys()) #Statement 2
print(dt.items()) #Statement 3
print(dt.popitem()) #Statement 4
print(dt.get("Banana")) #Statement5
Evaluate output of all statements.

35. a) What do you mean by Cyber safety? 1+2+2


b) What are different types of threats to computer security?
c) What is the need for secure password? How can one make a strong password?
Class: XI Session: 2022-23Computer Science (083)
Answer Key Practice Paper 3 (Theory)
SECTION A

1. (a) Registers 1
2. (c) A.B.C+(B'+C').A 1
3. (c) Optical Mark Reader 1
4. (c) “Hello’ 1
5. (b) Diamond 1
6. (d) abc 1
7. c) print(str1[-11:-6]) 1
8. Identity Theft is a type of fraud that involves using someone else’s identity to steal 1
money or gain other benefits.
9. (c) key 1
10. (b) [1,2,3,4,1,2,3,4] 1
11. (b) extend() 1
12. (d) Report vulnerability in any system 1
13. (d)All the above 1
14. (b) 17 1
15. India 1
16. Python is an interpreted language, which means the source code of a Python 1
program is converted into bytecode that is then executed by the Python virtual
machine.
17. Both A and R are true and R is the correct explanation of A. 1
18. (c)A is true but R is false. 1
SECTION : B
19. What is output from the following code : ½*4=2
(i)range(6) : 0,1,2,3,4,5
(ii)range(7,10) : 7,8,9
(iii)range(5,20,4) : 5,9,13,17
(iv)range (12,1,-2): 12,10,8,6,4,2
20. Pop() will delete last item from a list. Also displaying the deleted item. 1+1=2
Remove() function will delete given item from list.
OR
[10,16]
{'Name': 'Ravi', 'Marks': 95, 'Age': 16}
21. Definition of internet security: 1 Mark 2
two solutions of internet security threats : ½ Marks each
22. Mutable :- That can be modified . example List 1+1=2
Immutable :- That can not be modified . example Tuple, String
23. Valid : MyDiary, File123, _Clear, Mynameisking, If 1+1=2
Invalid=1num, while, Your.story
24. (i) 1. Twitter · 2. Tumblr · 3. Pinterest · 4. Instagram · 5. Facebook · 6. LinkedIn. 1+1=2
ii) C. antivirus
25. c) 10,5 1+1=2
OR
2
Cmue
SECTION : C
26. (29.75)10 = 11101.11 1+1+1=
(A4B)16 = 2635 3
(1234)8 = 29C
27. sal=int(input("enter the salary of employee:")) #1/2 mark 3
if (sal <=25000): #1/2 mark
b=sal*.25
elif (sal>25000 and sal <= 35000): #1/2 mark
b=sal*.15
elif (sal>35000 and sal <= 50000): #1/2 mark
b=sal*.10
elif (sal>50000 and sal <= 75000): #1/2 mark
b=sal*.05
else:
b=0
print("Bonus will be: ",b) #1/2 mark

OR
1 mark for break+1/2 mark for example
- Break: it’s a jump statement which forces to skip the remaining statements/
iterations of the loop and exit the loop.
Example : while(True) :
n=int(input(“enter a number and zero to terminate”))
if(n==0):
break
print(n*n)
1 mark for continue+1/2 mark for example
- Continue: it is just opposite to the break statement. As soon as continue is invoked,
the control will return for the next iteration of the loop.
example :
for i in range(1,5):
a= int(input(“enter first number”))
b= int(input(“enter second number”))
c=a+b
if(c<0):
print(“ program continues”)
continue
print(“sum of two numbers:”,c)

28. Length= 4 1+1+1=


Specific Element= Kuku 3
My List= dict_items([('RollNo', 10), ('Name', 'Kuku'), ('Class', 11), ('Age', 15)])
29. [['few', 'words']] ½*6=3
[]
False
['These', 'a', 'that', 'will']
['that', 'we', 'will', 'use']
['These', 'are', 'a', ['few', 'words'], 'that', 'we', 'will', 'use']
OR
"HEALPS HEALS WITHOUT HURTING"
0
i in s:
f i=="H":
n=n+1
nt(n)
30. (iv) Both may be the victim of Cyber Crime because these are the common security 1+1+1=
answers a normal user sets and your system can be hacked by person 2 3
We should not do financial transaction using other’s computer because your
personal information may be revealed to person 1
Person 2 is doing Ethical Hacking by asking personal information
Key Logger is a software/Hardware that records you key strokes.
SECTION : D
31. #students may use their own logic also. 4
L=list()
for i in range (10):
k=int(input("Enter a number :"))
L.append(k)
L.sort()
print ("List is ", L)
print ("The third largest number is :", L[-3])
- 1M for inputting 10 numbers to store in list
- 2M for method for finding third largest
- 1M for printing third largest

32. Int 1*4=4


20,30
24.0
10*20*30@
SECTION : E
33. (k) [11,14,18,10,15] ½ x10
(l) [‘P’, ‘Y’, ‘T’, ‘H’, ‘O’, ‘N’] =5
(m) [12,11,14,18,10,15]
(n) [10, 11, 12, 14, 15, 18]
(o) [10, 11, 12, 15, 18]
(p) [10, 11, 12, 15, 18, 5]
(q) 'N'
(r) [10, 11, 12, 15, 18, 5, 'P', 'Y', 'T', 'H', 'O']
(s) [10, 11, 12, 15, 18, 5, 12, 16, 18]
(t) [10, 11, 12, 15, 18, 5, 12, 16, 18, 10, 11, 12, 15, 18, 5, 12, 16, 18]
34. dt={“Apple”:50, “Orange”:40, “Banana”:30 , “Mango”:80} 1*5=5
Statement 1= 4
Statement 2 = dict_keys(['Apple', 'Orange', 'Banana', 'Mango'])
Statement 3= dict_items([('Apple', 50), ('Orange', 40), ('Banana', 30), ('Mango', 80)])
Statement 4= ('Mango', 80)
Statement5=30
35. a) Cyber Safety refers to the safe and responsible use of Internet to ensure safety 1+2+2=
and 5
security of personal information and not posing threat to anyone else’s information.

b) Some common threats are:


Viruses, Spyware, Adware, Spamming, PC Intrusion (Denial of service, Sweeping,
Password guessing), Phishing
c) A strong password may be created mixing an upper-case letter, a lower-case
letter, a digit and a special symbol and the password may be changed at a frequent
time. A good combination of these mixed letters makes a strong password and makes
difficult to crack it. A strong password makes our system safe and secure.
Class: XI Session: 2022-23 Computer Science (083)
Practice Paper-4 (Theory)
Maximum Marks: 70 Time Allowed: 3
hours

General Instructions:

 This question paper contains five sections, Section A to E.


 All questions are compulsory.
 Section A have 18 questions carrying 01 mark each.
 Section B has 07 Very Short Answer type questions carrying 02 marks each.
 Section C has 05 Short Answer type questions carrying 03 marks each.
 Section D has 03 Long Answer type questions carrying 05 marks each.
 Section E has 02 questions carrying 04 marks each. One internal choice
is given in Q35 against part c only.
 All programming questions are to be answered using Python Language only.

SECTION A
MICR stands for?
(a)Maganetic Ink Character Reader (b) Maganetic Ink Code Reader
(c) Maganetic Ink Caser Reader (d) Maganetic Ink Computer Reader

Which of the following is not an example of system software?


(a) Language Translator (b)Utility Software
(c) Communication Software (d)Word Processors

A gate gives the output as 1 only if all the inputs signals are 1.
(a) AND (b) OR
(c)EXOR (d) NOR

Which one of the following is the correct extension of the Python file?
(a) .py (b) .python
(c) .p (d) None of these

Which of the following is not a keyword in Python language?


(a) for (b)if
(c) try (d) sum

Which of the following operators is the correct option for calculating ab ?


(a) a ^ b (b) a**b
(c) a ^ ^ b (d) a ^ * b

What is data type of L if L= [ 1,’Python’,2.5]


(a) List (b) String
(c)Dictionary (d) Tuple

Which of the following is an invalid statement?


(a) a,b,c = 1000 (b) a,b,c = 1000 2000 3000
(c) a,b,c = 1000, 2000, 3000 (d) a_b_c = 1000

Operators with the same precedence (except power operator) are evaluated inwhich
manner?
(a) Left to Right (b) Right to Left
(d) Can’t say (d) None of the mentioned

IT Act of the Indian Parliament notified on


(i) 17 January 2001 (ii) 25 October 2002
(iii)17 October 2000 (iv) 25 April 2000

What can happen when you give your personal data (email, address, photos
you post…) in exchange for free apps and services?

(i) Nothing can happen. Your data is not allowed to be passed on to anyone
(ii) It isn’t really used, it’s just compulsory to ask for that information
(iii) When giving your email you’re automatically entered in a lottery where you
can win something
(iv) Everything you do online is of value and is used by companies looking to
target their advertising

What is the most important activity in system hacking?


(i) Information gathering (ii) Cracking passwords
(iii) Escalating privileges (iv) Covering tracks

Find the output of the following


word=”green vegetables”
print(word.find(‘veg’,2)
(a) 8 (b) 6
(c)10 (d) 12

Does Python supports Exit-Controlled Loop?


(a) Yes (b) No
(c) May be (d) Don’t Know

Predict the output of the following code:


x,y=2,4
if(x+y= =10):
print(“true”)
else:
print(“false”)
(a) true (b)false (c) no output (d)none

What keyword you use to add an alternative condition to an if statement?


(a) else if (b) false (c) elif (d) None of the above

Q17 and 18 are ASSERTION AND REASONING based questions. Mark the correct
choice as
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True

Choose correct option:


D1= {’A’:’CS’, ‘B’:’IP’}
D2= { ’B’:’IP’, ‘A’:’CS’}
A: Output of print (D1==D2) is True.
R: Dictionary is a collection of key-value pairs. It is not a sequence.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True

Choose correct option:


S1=’python’
S1[0] =S1[0].upper( )
A: Above code will generate error.
R: String is mutable by nature.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True

SECTION B

What will be the output of the following Python code? >


>>>a,b=6,7
>>>a,b=b,a
>>>a,b
a) (6,7) b) Invalid syntax c) (7,6) d) Nothing is printed

What is the data type of (1)?

a) Tuple b) Integer c) List d) Both tuple and integer

OR

What will be the output of the following Python code?


>> a=(1,2)
>>> b=(3,4)
>>> c=a+b
>>> c

(a) (4,6) (b) (1,2,3,4 )


(c) Error as tuples are immutable (d) None

Given is a Python string declaration:


(a) myexam="@@CBSE Examination 2022@@"

Write the output of: print(myexam[6:12])


(b) Write the output of the code given below:
my_dict = {"name": "Aman", "age": 26}
my_dict['age'] = 27
my_dict['address'] = "Delhi"
print(my_dict.items())

Define the term:


(a) Cyber bullying
(b) Cyber Stalking

What measures should one take to avoid and maintain confidentiality of


personal information?

Predict the output of the Python code given below:def


Vari(C1,C2):
if C1>C2:
return C1-C2
else:
return C2-C1

NUMBER= [15,12,19,26,18]
for CNT in range (3,0,-1):
A=NUMBER[CNT]
B=NUMBER[CNT-1]
print(Vari(A,B),'#', end=' ')

OR

Predict the output of the Python code given below:

KV = (11, 22, 33, 44, 55 ,66)


NVS =list(KV)new_list = []
for i in KV:
if i%2==0:
new_list.append(i)
new_tuple = tuple(new_list)
print(new_tuple)

Write a program to check a number whether it is even or odd. ?

SECTION C
Write the truth table for given Boolean expression:
𝐸 = 𝐸. 𝐸(𝐸. 𝐸 + 𝐸¯)

Find the error in the following code:


(a) y = x +5 (b) a=input(“Value: “) (c) print(x = y = 5)
print(x, y) b = a/2
print( a, b)
Write a program to input temperature in Celsius and convert it into
Fahrenheit using the formula: F = C * 9 / 5 + 32

Write a program to input names of n students and store them in a tuple.


Also, input a name from the user and find if this student is present in the
tuple or not.

What are common gender and disability issues faced while teaching /
using computers in class rooms.
SECTION D

Write a program to calculate digits and letters in a string.


Convert the following number system.
( 10011111 )2 = ( ? )16 = ( ? )10 = ( ? )8

SECTION E
Mr. Rajesh Kumar is a teacher in a school. He is doing his work manually.
As a python learner solve the problems of Rajesh Kumar by python programs:

(i) Create a dictionary student which ask Student roll number, Name and Marks of
students and display them in tabular format.
(ii) Display the names of those students who have secured marks more than 75.
(iii) Delete those students who have secured less than 50 marks

Write the solution for the following problem:


(a) How is math. ceil (89.7) different from math. floor (89.7)?
(b) Write a Python program to generate random number between 0 and 9.

Explain the following:

(a)What are cookies? How are they used by websites to track you?
(b)What is confidentiality of information? How do you ensure it
(c)What procedure can be carried out for proper E-Waste disposal.

******************************
Practice Paper 4 Answer Key (2022-23)
Computer Science (083) Class: XI
Q Section-A (attempt 8 out of 10) Mark
No. s
1. Magnetic Ink Character Reader (1)
2. Word Processors (1)
3. AND (1)
4. .py (1)
5. Sum (1)
6. a**b (1)
7. List (1)
8. a,b,c= 1000 2000 3000 (1)
9. Left to Right (1)
10. 17 October 2000 (1)
11. Everything you do online is of value and is used by companies looking to (1)
target their advertising
12. Cracking passwords (1)
13. 8 (1)
14. Yes (1)
15. False (1)
16. Elif (1)
17. Both A and R are true and R is the correct explanation for A (1)
18. A is True but R is False (1)
19. (7,6) (2)
20. Integer (2)
Or
(1,2,3,4 )
21. Exami (2)
Or
dict_items([('name', 'Aman'), ('age', 27), ('address', 'Delhi')])
22. Cyber Bullying: use of internet to harm or frighten another person, (2)
especially by sending them unpleasant messages.
Cyber Stalking: Follow the target online by joining the same groups and
forums. Send threatening, controlling, or lewd messages or emails to the
target
23. Restrict access to data. ...Encrypt your data .... Implement a confidentiality (2)
policy. ...Implement a data retention policy. ...
Develop and implement a cybersecurity program .... Take physical security
measures .... Non-disclosure agreements.

24. 7#7#3# (2)

Or
(22,44,66)
25. num=int(input(“Enter a Number”)) (2)
if ( num% 2)==0:
print(“Even Number”)
else:
print(“Odd Number”)
26. X Y Z X YZ (YZ+Z XY(YZ+ (3)
Y ) Z)
0 0 0 0 0 0 0
0 0 1 0 0 1 0
0 1 0 0 0 0 0
0 1 1 0 1 1 0
1 0 0 0 0 0 0
1 0 1 0 0 1 0
1 1 0 1 0 0 0
1 1 1 1 1 1 1
27. (a) x is not defined (3)

(b) unsupported operand type(s) for /: 'str' and 'int'

(c) invalid syntax


28. celsius = float(input("Enter temperature in celsius: ")) (3)
fahrenheit = (celsius * 9/5) + 32
print('%.2f Celsius is: %0.2f Fahrenheit' %(celsius, fahrenheit))
29. n = int(input("Enter the number of students: ")) (3)
list1 = [ ]
for i in range(n):
name = input()
list1.append(name)
tuple1 = tuple(list1)
findName = input("Enter name to find: ")
for item in tuple1:
if item==findName:
print("Name found")
else:
print("Name not found")
30. there can be one or more disabilities: (3)
(i) Locomotor disabilities – Severe deformities, polio, leprosy, cerebral palsy.
(ii) Hearing and speech disabilities – Hearing impairment, speech aphasia.
(iii) Cognitive impairment – Specific learning deficits (Dyslexia, Dyscalculia).
Down’s syndrome, Autism.
(iv) Vision impairment. low vision, blindness.
31. String =”python1234” (4)
total_digits = 0
total_letters = 0
for s in string:
if s.isnumeric():
total_digits += 1
else:
total_letters += 1
print(“Total Letters found :-“,total_letters)
print(“total digits found:-“,total_digits)
32. 9F16=15910=2378 (4)
33. (i) (5)
n = int(input("Enter number of students: "))
result = {}
for i in range(n):
print("Enter Details of student No.", i+1)
rno = int(input("Roll No: "))
name = input("Name: ")
marks = int(input("Marks: "))
result[rno] = [name, marks]
print(result)
(ii)
for student in result:
if result[student][1] > 75:
print(result[student][0])
(iii)
for student in result:
if result[student][1] < 50:
del result[student][0])
34. (a) math. ceil(89.7)' will return 90 whereas 'math. floor(89.7)' will return (5)
89.

(b) import random


for i in range(10):

print(random.randrange(10))
35. (a) Cookies are text files with small pieces of data that are used to (5)
identify your computer as you use a computer network. Specific cookies
known as HTTP cookies are used to identify specific users and improve
your web browsing experience.

(b) Data confidentiality is about protecting data against unintentional, unlawful,


or unauthorized access, disclosure, or theft.We can ensure it by Shared
documents in a secure way,Use anti-virus software, Install a firewall,
Password-protect important files and systems. ...
(c)
Recycling: complete segregation of parts and materials that is then used to
build new electronic products.
Refurbishing: reuse of the working, good quality products to replace parts and
extend the life of other electronic equipment.
Land filling. This is the most common method of electronic waste
disposal. ...
Incineration. A controlled combustion process wherein e-waste is burned
in an incinerator unit.

You might also like