Class: Xi Session: 2022-23 Computer Science (083) Practice Paper-1 (Theory) Maximummarks:70 Time Allowed: 3 Hrs General Instructions
Class: Xi Session: 2022-23 Computer Science (083) Practice Paper-1 (Theory) Maximummarks:70 Time Allowed: 3 Hrs General Instructions
Practice Paper-1(Theory)
MaximumMarks:70 Time Allowed: 3 Hrs
General Instructions:
1. This question paper contains fives sections, Section A to E.
2. All questions are compulsory.
3. Section A have18 questions carrying 01 mark each.
4. Section B has 07 Very Short Answer type questions carrying 02 marks each.
5. Section C has 05 Short Answer type questions carrying 03 marks each.
6. Section D has 03 Long Answer type questions carrying 05 marks each.
7. Section E has 02 questions carrying 04 marks each. One internal choice
is given in Q35 against part C only.
8. All programming questions are to be answered using Python Language only.
SECTION A
1. MS-Office is a- 1
(a) Operating Software (b) Utility program
(c) Programming language (d) Application Software
2. What is the ASCII equivalent decimal no. for ‘Y’ ? 1
a) 87 (b)88 (c) 89 (d)90
3. Hexa-Decimal of (346)10= (?)16(Show calculation) 1
(a) 14B (b) 1A5 (c)15A (d) 5A1
4. Find the invalid identifier(s) from the following: 1
a) MyName b) 2ndName
c) true d) My_Name
5. Suppose tuple T is T = (10, 12, 43, 39), Find incorrect? 1
a) print(T[1]) b) T[2] = -29
c) print(max(T)) d) print(len(T))
6. What will be the result of the following code? 1
>>>d1 = {“abc” : 5, “def” : 6, “ghi” : 7}
>>>print (d1[abc])
(a) abc (b) 5 (c) {“abc”:5} (d) Error
7. Suppose list L is declared as 1
L = [5 * i for i in range (0,4)], list L is
a) [0, 1, 2, 3,] b) [0, 1, 2, 3, 4]
c) [0, 5, 10, 15] d) [0, 5, 10, 15, 20]
8. Identify declaration of M = ‘Mon’,‘23’,‘Bye’, ’6.5’ 1
a) dictionary b) string c) tuple d) list
9. STR=”RGBCOLOR” 1
colors=list(STR)
How do we delete ‘B’ in given List colors?
(a) del colors[2] (b) colors.remove("B")
(c) colors.pop(2) (d) All of these
10. What is the value of x when this loop has been terminated: 1
x=45
while x>0:
1
print(x)
x=x-10
(a) 25 (b) 45 (c) 5 (d) -5
11. What will be the output of the following Python Code? 1
tp=(5,)
tp1=tp * 2
print(len(tp1))
(a) 0 (b) 2
(c) 1 (d) error
12. day_name= ['Mon', 'Tues', 'Wednes', 'Thursday', 'Friday', 'Saturday','Sunday'] 1
print(day_name[7])
What will be the result?
(a) Sunday (b)Saturday
(c)Error (d) Mon
13. It is a Logical Gate 1
2
18. Choose correct option: 1
Statement 1: t1=tuple(’python’)
Statement 2: t1[4]=’z’
A: Above code will generate error Statement2:
R: Tuple is immutable by nature.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
SECTION B
19. What will be the output of the following Python code? 2
x, y=4, 2
while(x>=y):
print(x, y)
x=x-1
y=y+1
a) 4, 2 b) Invalid syntax c) 2, 4 d) Nothing is printed
3, 3 3, 3
20. What is the result of this statement: 2
10>5 and 7>12 or not 18>3
a) 10 b) True c) False d) None
OR
for i in range(-1,-7,-2):
for j in range(3):
print(1, j)
OR
What’s the output of the following program.
fruits = { 'Apple': 100,
'Orange': 200,
'Banana': 400,
'pomegranate':600 }
if 'Apple' in fruits:
del fruits['Apple']
print('Dictionary after deleting key =',fruits)
25. Write a program to print the Fibonacci Series till n terms, where n is entered 2
by the user.
SECTION C
26. Answer the following: 3
i) Convert: (111111110101110.1101101111)2= (?)16 (1+2)
ii) Differentiate between Compiler and Interpreter.
27. Rewrite the following code in Python after removing all syntax error(s). 3
30 = To
for K in range(0, To)
If K%4 == 0:
Print(K*4)
Else:
Print(K + 3)
28. Write a program to check whether the entered number is Armstrong or not. 3
29. What possible output(s) are expected to be displayed on screen at the time of 3
execution of the program from following code? (1 + 2)
from random import randint
LST=[5,10,15,20,25,30,35,40,45,50,60,70]
first = random.randint(3,8) -1
second = random.randint(4,9) -2
third = random.randint(6,11) -3
print(LST[first],"#", LST[second],"#", LST[third],"#")
a) 20#25#25# b) 30#40#70#
c) 15#60#70# d) 35#40#60#
Specify the maximum values that can be assigned to each of the variables
second and third in the code given.
30. Umesh wanted to gift his brother a football or a wrist watch. So he searched 3
for many sports items and wrist watches online. But after that every time he (1+1+1
goes online, his web browser shows him advertisements about sports items )
and wrist watches.
(a) Why is this happening?
(b) How could have Umesh avoided them?
(c) How can Umesh get rid of this now?
SECTION D
31. Write a program to search for an element in a given list of numbers. 4
32. Expand the following: - 4
i) Write the full forms of following: IPR, GPL, Proprietary Software, (2+2)
URL
ii) Identify the Open Source software(s) from the following: -
MySql, Quick Heal Antivirus, Python, Microsoft Office
SECTION E
33. Explain the following : 5
(i) What is syntax error? Give one example. (1+2
(ii) What is the difference between ‘=’ and ‘==’? Explain with the help of +2)
an example.
(iii) What do you understand by precedence of operators? What is the
precedence of arithmetic operators?
34. Write the solution for the following problem: 5
(a) Write the output of this program : (2+3)
s1='Hello World!'
index=0
while index< (len(s1)-3):
print(s1[index], end=' ')
index =index+ 1
OR
Write the output of this program. Justify your answer also.
my_dict={ }
my_dict[1]=1
my_dict[‘1’]=2
my_dict[1.0]=4
print(my_dict)
(b)Write a Python program to create a dictionary to store names of states and
their capitals.
OR
Write a Python program to create a third dictionary from two dictionaries in
the way so that the values are shown in third dictionary.
35. Explain the following : 5
(a) How do websites track you online? (3+2)
(b) What are cookies? How are they used by websites to track you?
******************************
Class: XI Session: 2022-23 Computer Science (083)
Answer Key for Practice Paper-1
MaximumMarks:70 Time Allowed: 3 Hrs
SECTION A
1. (d) Application Software 1
2. (c) 89 1
3. (c)15A 1
4. (b) 2ndName 1
5. (b) T[2] = -29 1
6. (d) Error 1
7. (c) [0, 5, 10, 15] 1
8. c) tuple 1
9. (d) All of these 1
10. (d) -5 1
11. (b) 2 1
12. (c)Error 1
13. (c) AND 1
14. (a) A’.B’ 1
15. (d) E-Mail 1
16. (d) All of these 1
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct choice as:
(a)Both A and R are true and R is the correct explanation for A
(e) Both A and R are true and R is not the correct explanation for A
(f) A is True but R is False
(g) A is false but R is True
17. (b) Both A and R are true and R is not the correct explanation for A 1
18. (d) A is false but R is True 1
SECTION B
19. a) 4, 2 2
3, 3
20. c) False 2
OR
a) 13
21. for count in range(0,10,1): 2
print(“Hello”)
print(“Good Bye!”)
22. PC Intrusion - Computer Definition. To compromise a computer system by 2
breaking the security of such a system or causing it to enter into an insecure
state. The act of intruding—or gaining unauthorized access to a system—
typically leaves traces that can be discovered by intrusion detection systems.
23. Spam email is a form of commercial advertising which is economically viable 2
because email is a very cost-effective medium for the sender. If just a fraction
of the recipients of a spam message purchase the advertised product, the
spammers are making money and the spam problem is perpetuated.
24. Outer loop ( i based) run 3 times and Inner loop ( j based) will run 3 times for 2
each value of i.
Output:
10 11 12 10 11 12 10 11 12
OR
Dictionary after deleting key = {'Orange': 200, 'Banana': 400, 'pomegranate':
600}
25. n=int(input("How many numbers do you want to print in Fibonacci Series: ")) 2
first=0
second=1
i=3
print(first, second, end=" ")
while i<=n:
third=first+second
print(third, end=" ")
first=second
second=third
i=i+1
SECTION C
26. iii) (111111110101110.1101101111)2= (7FAE.DBC)16 3
iv) Difference between Compiler and Interpreter:
1. Compiler converts whole source code of program into target
program (machine code) in one round and display all the errors
with their line numbers while Interpreter converts source code
into machine code program line by line and stop/ halt at the
error-prone line until that error has been debugged from that
line of code.
2. Compiler takes lesser time in conversion while Interpreter takes
more time in conversion.
27. Rewrite the following code in Python after removing all syntax error(s). 3
To=30 # Variable assignment statement
for K in range(0, To): #colon should be there before loop body
if K%4 == 0: # if is a keyword
print(K*4) #print( ) is a predefined method in python
else: # else is a keyword
print(K + 3)
28. temp=n=int(input("enter a three digit number:")) 3
sum=0
while(n>0):
r=n%10
sum=sum + (r*r*r)
n=n//10
if temp==sum:
print("armstrong")
else:
print("not armstrong")
29. a) 20#25#25# 3
Option (a) is expected output. (1+2)
Maximum values that can be assigned to the variables second and third are 7
and 8 respectively.
30. (a) This is happening because third party cookies saved his search preferences 3
and now websites are posting advertisements based on his preferences. (1+1+1
(b) Umesh could have avoided this by privately browsing i.e. opening the web )
browser in incognito mode before searching for such things.
(c) Now Umesh can delete all the previous history and cookies stored on his
computer. This would stop websites posting advertisements.
SECTION D
31. L1=[2,5,11,13,18] 4
list1=len(L1)
n=int(input("Enter element to be searched for"))
for j in range(0, list1,1):
if L1[j]==n:
print(n,"found at index",j)
break
else:
print(" Element Not found" )
32. iii) IPR- Intellectual Property Rights 4
GPL-General Purpose License (2+2)
Proprietary Software-The software which is purchased by paying
some amount of money.
URL-Unified Resource Locator
iv) the Open Source software(s) are: MySql, Python
SECTION E
33. (i) syntax error-These are produced by Python when it is translating the 5
source code into byte code. They usually indicate that there is something(1+2+2
wrong with the syntax of the program. Example: Omitting the colon at the end )
of a for statement yields the somewhat redundant message SyntaxError:
invalid syntax.
Example: print(“Hello” #syntax error due to right parenthesis is missing
(ii) Difference between ‘=’ and ‘==’operator:
‘=’ assignment operator while ‘==’ is equality operator.
Example: a=5 # value 5 assigned to variable a.
2==9 # checks the equality, gives False as result
(iii) The order in which the operators are executed in an expression is called
the operator precedence. The precedence of Arithmetic operator is as follows:
**
*, /, //, %
+, -
34. Write the solution for the following problem: 5
Output: H e l l o W o r (2+3)
OR
Output: {1: 4, '1': 2}
Justification/Reason: 1 and 1.0 are considered as same key of integer type
while ‘1’ is considered as string type key hence statement-4 overwrite the
value assigned in statement-2 by the compiler.
(b)
md={ }
n=int(input("How many capitals you want to store"))
for i in range(n):
st=input("Enter state:")
cap=input("Enter Capital:")
md[st]=cap
print("States and their capitals are:", md)
OR
d1={ 1:'one',2:'two', 3: 'three' }
d2={ 4:'four',5:'five',6:'six'}
d3=dict(d1)
d3.update(d2)
print(d1)
print(d2)
print(d3)
35. (a) Whenever you visit a website, your web browser may reveal your 5
location via your device‘s IP address. (3+2)
1. It can also provide your search and browsing history etc. which may be
used by third parties, like advertisers or criminals.
2. This way website track you. Tracking is generally used by advertising
networks to build up details profiles for pinpoint ad targeting.
3. This information is compiled through your web usage patterns, and
which websites generally use for tracking you.
This generally includes-
1. IP Address
2. Cookies and tracking scripts etc.
3. HTTP Referrer
4. Super Cookies
5. User Agent
(b) Cookies are small pieces of information websites can store in your
browser.
Cookies can be –
1. First Party Cookies- These are the cookies that store your own log in id,
password, and auto fill information etc.
2. Third Party Cookies: These are the cookies that websites store to know
about your search history and web browsing history so as to place
advertisements as per your interests.
******************************
hours
ss: XI Session: 2022-23 Computer Science (083)
Practice Paper-2 (Theory)
Maximum Marks: 70 Time Allowed: 3
C
l
a
General Instructions:
10. You should never give out which of the following on the Internet? 1
(a) Your name (b) Your age (c) Your address. (d)All of the above.
Which of the following is the best description of an 'internet troll'? 1
11.
(a) Someone who goes trolling on the internet, moving from place to place
without settling anywhere in a chat room or on a board.
(b) A funny emoticon made to look like a troll.
(c)Another name for a spammer.
(d) Someone who participates in a message board or chat with the intention to
disrupt it in some way.
OR
i = 1
while i < 6:
print(i)
if i == 3:
break
i += 1
25. Write a program calculate and print total and average runs scored by a 2
cricketer in 3 matches.
SECTION C
26. State De Morgan’s laws / theorems and prove using truth table. 3
30. What are common gender and disability issues faced while teaching / using 3
computers in class rooms.
SECTION D
31. Write a python program to calculate factorial of a number. 4
32. Convert the following numbers. 4
(a) ( 100111101 )2 = ( ? )8
(b) ( 127 )10 = ( ? )2
SECTION E
33. (a) Differentiate between list and tuple with example ? 5
(b) Write a python program to input 3 students name and their marks using (3+2)
dictionary. Print the dictionary also.
34. Write the solution for the following problem: 5
(a) How is random.randint(10) different from random.randrange (10)? (3+2)
(b)Write a Python program to generate a random number between 0 to 8.
35. (a) What is E-waste management? Discuss proper disposal of used electronic 5
gadgets (3+2)
(b) Write short note on IPR (Intellectual Property Right).
******************************
Class: XI Session: 2022-23 Computer Science (083)
Answer Key Practice Paper 2 (Theory)
Maximum Marks: 70 Time Allowed: 3
SECTION A
1. (a) Bit
2. (b) RAM
3. (c) NOT
4. (b) String
5. (d) All Above
6. (a) NUM
7. (d) Date
8. (b) bum=1,000
9. (b) #
10. (d) All of the above.
11. (d) Someone who participates in a message board or chat with the intention to
disrupt it in some way.
12. (c) Stalking
13. (b) [7]
14. (b) -3
15. (a) true
16. (c) List
17. (a)
18. (a)
Section B
19 (a) 56
(b) import math
20 Smallest unit in a program is known as token. Examples – int, if , a, num, # etc
OR
c) 82
21 (a) ['CS', 'and', 'IP']
(b) {'stname': 'Ajay', 'age': 27, 'address': 'Bikaner'}
22 (a) Digital Footprints -Digital footprints are the records and traces that we
leave behind as we use the internet.
(b) Cookies are text files with small pieces of data — like a username and
password — that are used to identify your computer as you use a computer
network.
23 Use a firewall, install antivirus, create strong password , don’t share personal
information
24 Banana
cherry
OR
1
2
3
25 run1= int (input ("Enter run scored in 1st inning="))
run2= int (input ("Enter run scored in 2nd inning="))
run3= int (input ("Enter run scored in 3rd inning="))
total= run1 +run2 + run2
avg= total/3
print("Total runs=",total)
print("Average Runs= ", avg)
26 3 Marks both theorem and truth table.
(i) (A+B)’ = A’.B’ (ii) (A.B)’ = A’+B’
27 N=100 (No Error)
A= “Number” +”5 “
B= 2*N +20
print(B)
28 #Series -----2,4,8,16, …………….
a=1
n= int (input ("Enter the terms="))
for i in range(n):
a=a*2
print(a, end=",")
29 L=[]
found=False
for i in range(5):
name=input("Enter Name =")
L.append(name)
text=input("Enter name to be searched=")
for i in range(len(L)):
if (text ==L[i]):
found=True
if(found):
print("Name is in List")
else:
print("Name is not in List")
30 Preconceived notions, Lack of interest, Lack of motivation
General Instructions:
1. This question paper contains five sections, Section A to E.
2. All questions are compulsory.
3. Section A have 18 questions carrying 01 mark each.
4. Section B has 07 Very Short Answer type questions carrying 02
marks each.
5. Section C has 05 Short Answer type questions carrying 03 marks
each.
6. Section D has 03 Long Answer type questions carrying 05 marks
each.
7. Section E has 02 questions carrying 04 marks each. One internal
choice is given in
Q35 against part c only.
8. All programming questions are to be answered using Python
Language only.
SECTION: A
Q.No Question Marks
28. Go through the program of dictionary in python given below and predict the 3
output of program.
Student={"RollNo":10 , "Name":"Kuku" , "Class":11 , "Age":15}
T=len(Student)
Elm=Student.get("Name")
mylist=Student.items()
print("Length=",T)
print("Specific Element=",Elm)
print("My List=",mylist)
29. Find the output of the following code: 3
>>> L=["These", "are", "a", ["few", "words"], "that", "we", "will", "use"]
>>> print (L[3:4])
>>> print (L[1:4:-1])
>>> print ("few" in L)
>>> print (L[0::2])
>>> print (L[4:])
>>> print (L)
OR
te a program to check number of ‘H’ present in a string:
ALPS HEALS WITHOUT HURTING”
output will be displayed as:
Total number of ‘H’ is: 4
30. Consider the Following conversation and answer the question 3
Person 1:- What’s your name?
Person 2:- Radha
Person 1:- What is the name of your first school?
Person 2 :- Army Public School
Person 1 :- What are your Father and Mother name?
Person 2 :- Krishna and Sarita
Person 1 :- Who is your favorite actor or actress?
Person 2 :- Amitabh
Person 1:- What is the name of your pet animal?
Person 2 :- Tommy
Person 1 :- Where were you born and when?
Person 2:- Ajmer on 15 March 2002
Person 1 :- May I use your Laptop for online banking for fees payment
Person 2 :- Sure
(i) Who may be Victim of Cyber Crime Person1, Person 2 or both?
Justifyyour answer
(ii) Who is doing Ethical Hacking person1 or person2? Justify your Answer
(iii) Person 2 was using Key Logger software in his computer. What is it?
SECTION: D
31. Write a Python program to input 10 numbers to store in the list and print the 2+2
third largest number. For example, if the entered numbers in the list are List are
36, 25, 14, - 951, 75, - 85, 654, 88, 9521, 657, then output will be
The third largest number is : 654
32. What will be the output of the following code 4
i. type(34)
ii. a, b=10,20
a, b= b, a+b
print(a, b)
iii. a=20 + 4j
print(a.real + a.imag)
iv. print(10,20,30, sep=’*’,end=’@’)
SECTION: E
33. What will be the output of the following: 5
(a) [11, 14, 18, 10, 15]
(b) ['P', 'Y', 'T', 'H', 'O', 'N']
(c) L1.insert(0,12)
(d) L1.sort()
(e) L1.remove(14)
(f) L1.append(5)
(g) L2.pop()
(h) L1+L2
(i) L1.extend([12,16,18])
(j) L1*2
34. A code snippet using a dictionary is shown below and What will be the output of 5
the following :
dt={“Apple”:50, “Orange”:40, “Banana”:30 , “Mango”:80}
print(len(dt)) #Statement 1
print(dt.keys()) #Statement 2
print(dt.items()) #Statement 3
print(dt.popitem()) #Statement 4
print(dt.get("Banana")) #Statement5
Evaluate output of all statements.
1. (a) Registers 1
2. (c) A.B.C+(B'+C').A 1
3. (c) Optical Mark Reader 1
4. (c) “Hello’ 1
5. (b) Diamond 1
6. (d) abc 1
7. c) print(str1[-11:-6]) 1
8. Identity Theft is a type of fraud that involves using someone else’s identity to steal 1
money or gain other benefits.
9. (c) key 1
10. (b) [1,2,3,4,1,2,3,4] 1
11. (b) extend() 1
12. (d) Report vulnerability in any system 1
13. (d)All the above 1
14. (b) 17 1
15. India 1
16. Python is an interpreted language, which means the source code of a Python 1
program is converted into bytecode that is then executed by the Python virtual
machine.
17. Both A and R are true and R is the correct explanation of A. 1
18. (c)A is true but R is false. 1
SECTION : B
19. What is output from the following code : ½*4=2
(i)range(6) : 0,1,2,3,4,5
(ii)range(7,10) : 7,8,9
(iii)range(5,20,4) : 5,9,13,17
(iv)range (12,1,-2): 12,10,8,6,4,2
20. Pop() will delete last item from a list. Also displaying the deleted item. 1+1=2
Remove() function will delete given item from list.
OR
[10,16]
{'Name': 'Ravi', 'Marks': 95, 'Age': 16}
21. Definition of internet security: 1 Mark 2
two solutions of internet security threats : ½ Marks each
22. Mutable :- That can be modified . example List 1+1=2
Immutable :- That can not be modified . example Tuple, String
23. Valid : MyDiary, File123, _Clear, Mynameisking, If 1+1=2
Invalid=1num, while, Your.story
24. (i) 1. Twitter · 2. Tumblr · 3. Pinterest · 4. Instagram · 5. Facebook · 6. LinkedIn. 1+1=2
ii) C. antivirus
25. c) 10,5 1+1=2
OR
2
Cmue
SECTION : C
26. (29.75)10 = 11101.11 1+1+1=
(A4B)16 = 2635 3
(1234)8 = 29C
27. sal=int(input("enter the salary of employee:")) #1/2 mark 3
if (sal <=25000): #1/2 mark
b=sal*.25
elif (sal>25000 and sal <= 35000): #1/2 mark
b=sal*.15
elif (sal>35000 and sal <= 50000): #1/2 mark
b=sal*.10
elif (sal>50000 and sal <= 75000): #1/2 mark
b=sal*.05
else:
b=0
print("Bonus will be: ",b) #1/2 mark
OR
1 mark for break+1/2 mark for example
- Break: it’s a jump statement which forces to skip the remaining statements/
iterations of the loop and exit the loop.
Example : while(True) :
n=int(input(“enter a number and zero to terminate”))
if(n==0):
break
print(n*n)
1 mark for continue+1/2 mark for example
- Continue: it is just opposite to the break statement. As soon as continue is invoked,
the control will return for the next iteration of the loop.
example :
for i in range(1,5):
a= int(input(“enter first number”))
b= int(input(“enter second number”))
c=a+b
if(c<0):
print(“ program continues”)
continue
print(“sum of two numbers:”,c)
General Instructions:
SECTION A
Q.1 MICR stands for?
(a)Maganetic Ink Character Reader (b) Maganetic Ink Code Reader
(c) Maganetic Ink Caser Reader (d) Maganetic Ink Computer Reader
Q.3 A gate gives the output as 1 only if all the inputs signals are 1.
(a) AND (b) OR
(c)EXOR (d) NOR
Q.4 Which one of the following is the correct extension of the Python file?
(a) .py (b) .python
(c) .p (d) None of these
Q.6 Which of the following operators is the correct option for calculating ab ?
(a) a ^ b (b) a**b
(c) a ^ ^ b (d) a ^ * b
Q.9 Operators with the same precedence (except power operator) are evaluated inwhich
manner?
(a) Left to Right (b) Right to Left
(d) Can’t say (d) None of the mentioned
Q.11 What can happen when you give your personal data (email, address, photos
you post…) in exchange for free apps and services?
(i) Nothing can happen. Your data is not allowed to be passed on to anyone
(ii) It isn’t really used, it’s just compulsory to ask for that information
(iii) When giving your email you’re automatically entered in a lottery where you
can win something
(iv) Everything you do online is of value and is used by companies looking to
target their advertising
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the correct
choice as
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
SECTION B
Q.19 What will be the output of the following Python code? >
>>>a,b=6,7
>>>a,b=b,a
>>>a,b
a) (6,7) b) Invalid syntax c) (7,6) d) Nothing is printed
OR
Q.23 What measures should one take to avoid and maintain confidentiality of
personal information?
NUMBER= [15,12,19,26,18]
for CNT in range (3,0,-1):
A=NUMBER[CNT]
B=NUMBER[CNT-1]
print(Vari(A,B),'#', end=' ')
OR
SECTION C
Q.26 Write the truth table for given Boolean expression:
𝐸 = 𝐸. 𝐸(𝐸. 𝐸 + 𝐸¯)
Q.29 Write a program to input names of n students and store them in a tuple.
Also, input a name from the user and find if this student is present in the
tuple or not.
Q.30 What are common gender and disability issues faced while teaching /
using computers in class rooms.
SECTION D
SECTION E
Q.33 Mr. Rajesh Kumar is a teacher in a school. He is doing his work manually.
As a python learner solve the problems of Rajesh Kumar by python programs:
(i) Create a dictionary student which ask Student roll number, Name and Marks of
students and display them in tabular format.
(ii) Display the names of those students who have secured marks more than 75.
(iii) Delete those students who have secured less than 50 marks
(a)What are cookies? How are they used by websites to track you?
(b)What is confidentiality of information? How do you ensure it
(c)What procedure can be carried out for proper E-Waste disposal.
******************************
Practice Paper 4 Answer Key (2022-23)
Computer Science (083) Class: XI
Q Section-A (attempt 8 out of 10) Mark
No. s
1. Magnetic Ink Character Reader (1)
2. Word Processors (1)
3. AND (1)
4. .py (1)
5. Sum (1)
6. a**b (1)
7. List (1)
8. a,b,c= 1000 2000 3000 (1)
9. Left to Right (1)
10. 17 October 2000 (1)
11. Everything you do online is of value and is used by companies looking to (1)
target their advertising
12. Cracking passwords (1)
13. 8 (1)
14. Yes (1)
15. False (1)
16. Elif (1)
17. Both A and R are true and R is the correct explanation for A (1)
18. A is True but R is False (1)
19. (7,6) (2)
20. Integer (2)
Or
(1,2,3,4 )
21. Exami (2)
Or
dict_items([('name', 'Aman'), ('age', 27), ('address', 'Delhi')])
22. Cyber Bullying: use of internet to harm or frighten another person, (2)
especially by sending them unpleasant messages.
Cyber Stalking: Follow the target online by joining the same groups and
forums. Send threatening, controlling, or lewd messages or emails to the
target
23. Restrict access to data. ...Encrypt your data. ... Implement a confidentiality (2)
policy. ...Implement a data retention policy. ...
Develop and implement a cybersecurity program .... Take physical security
measures.....Non-disclosure agreements.
Or
(22,44,66)
25. num=int(input(“Enter a Number”)) (2)
if ( num% 2)==0:
print(“Even Number”)
else:
print(“Odd Number”)
26. X Y Z X YZ (YZ+Z XY(YZ+ (3)
Y ) Z)
0 0 0 0 0 0 0
0 0 1 0 0 1 0
0 1 0 0 0 0 0
0 1 1 0 1 1 0
1 0 0 0 0 0 0
1 0 1 0 0 1 0
1 1 0 1 0 0 0
1 1 1 1 1 1 1
27. (a) x is not defined (3)
print(random.randrange(10))
35. (a) Cookies are text files with small pieces of data that are used to (5)
identify your computer as you use a computer network. Specific cookies
known as HTTP cookies are used to identify specific users and improve
your web browsing experience.
General Instructions:
a. Yes
b. No
c. May be
d. Don’t Know
15. Predict the output of the following code: 1
Var=5
if Var>4 OR VAR<6 AND Var==10
print(“Good”)
else:
print(“Not Good”)
SECTION B
19. What will be the output of the following Python code? 2
>>>x,y=5,10
>>>x,y=y,x
>>>x,y
20. What will be the output of the following Python code? 2
>>> a=’OK-BYE’
>>> a*=2
>>> a
21. (a) Given is a Python string declaration: 2
exam="##KVS Examination 2022##"
Write the output of: print(exam[2:6])
(b) Write the output of the code given below:
Dict1 = {"name": "RAM", "age": 26}
Dict1['age'] = 27
Dict1['address'] = "JAIPUR"
print(Dict1.items())
22. Define the term : 2
(a) Hackers
(b) Crackers
23. Name the online activities which would help you detect that your friend is 2
being cyber bulled.
24. Predict the output of the Python code given below: 2
(a) X=range(1,10,2)
for i in X:
print(i)
(b) X,Y=17,4
print (X//Y)
print(X/Y)
25. Write a Python program to input a number print its Square if it is odd, 2
otherwise print its square root. (use import math function)
SECTION C
26. Draw logic circuit for given Boolean expression: 3
F(A,B,C) = A’B+AB+B’C
27. Find the error in the following code and rewrite corrected code: 3
25=Val
for I in the range(0,Val)
if I%2==0:
print( I+1)
Else:
print (I‐1
28. Write a python program to print a sum of series up to 10 integers using for 3
loop.
29. Write a program to input a list of numbers and find the smallest and largest 3
number from the list.
30. What are the benefits of e-waste recycling? 3
SECTION D
31. Write a python program to accept a string and replace all space by ‘$’ symbol. 4
32. Convert the following number system. 4
(a) (11011.10 )2 into ()10
(b) (11100.1010)2 in to ()16
(c) (10AF)16 into ()2
(d) (A42)16 into ()8
SECTION E
33. Write a program to create a dictionary to input total number of sections and 5
class teacher’s name of a class 11 and display all information on the output
screen.
34. Which string method is used to implement the following: 5
a. To count the number of characters in the string
b. To change the first character of the string in capital letter
c. To change lowercase to uppercase letter
d. To check whether the given character is letter or a number
e. To replace all the occurrences of the old string with the new string.
35. Explain the following: 5
Open-Source Software and Proprietary Software
OR
Active and Passive digital footprint
******************************
Class: XI Session: 2022-23 Computer Science (083)
Answer Key Practice Paper-5 (Theory)
SECTION A
1. (c) Optical Character Recognition 1
2. c) Speaker 1
3. (d) NOR 1
4. (c) 5 1
5. (d) # 1
6. (c) My.File 1
7. List 1
8. b. List is mutable & Tuple is immutable 1
9. String 1
10. d) Open Source Initiative 1
11. Cyber-bullying 1
12. (i) Tracking 1
13. b) 3 1
14. Yes 1
15. A. Good 1
16. b. if…elif 1
17. (a) Both A and R are true and R is the correct explanation for A 1
18. ( C) A is True but R is False 1
SECTION B
19. c) (10,5) 2
20. c) OK-BYEOK-BYE 2
21. a) KVS 2
B)
dict_items([('name', 'RAM'), ('age', 27), ('address', JAIPUR')])
22. Hackers and Crackers : Hackers are most often programmers. Hackers are 2
people who hack devices and systems with good intentions. They might hack a
system for a specified purpose or for obtaining more knowledge out of it.
Crackers: Crackers are people who hack a system by breaking into it and
violating it with some bad intentions. They may hack a system remotely for
stealing the contained data or for harming it permanently. Crackers can easily
be identified because their actions are malicious.
1 mark each for explain the terms
23. Cyberbullying can include: 2
Sending mean texts or IMs to someone
Pranking someone’s cell phone
Hacking into someone’s gaming or social networking profile
Being rude or mean to someone in an online game
Spreading secrets or rumours about people online
Pretending to be someone else to spread hurtful messages online
1 mark each for at least two activities
24. Predict the output of the Python code given below: 2
1,3,5,7,9
4
4.25
1 mark for each correct output
25. #program to input a number print its square if it is odd otherwise print its 2
square root.
import math
num=int(input("enter a number : "))
if (num%2!=0):
print("The given number",num, "is odd so its square is :",num*num)
else:
print ("The given number",num, "is even so its square root is :", math.sqrt (num))
2 mark for correct python code
SECTION C
26. Logic circuit for given Boolean expression: 3
SECTION D
31. # python program to accept a string and replace all space by ‘$’ symbol. 4
output:
enter a string :I love my india
The replaced string is: I$love$my$india
3 mark for correct python code and 1 mark for output
32. 27.50 4
1C.A
0001000010101111
5102
output:
Enter total number of section in xi class2
enter section :Science
enter class teacher name :Sunil
enter section :Humanities
enter class teacher name :Jyoti
Class Section Teacher Name
XI Science Sunil
XI Huminities Jyoti
3 mark for correct python code and 2 mark for output and documentation.
34. a. len(str) 5
b. str.capitalize( )
c. str.upper( )
d. ch.isalnum( )
e. str.replace()
Proprietary software is any software that is copyrighted and bears limits against
use, distribution and modification that are imposed by its publisher, vendor or
developer. Proprietary software remains the property of its owner/creator and is
used by end-users/organizations under predefined conditions.
OR
A passive digital footprint is created when data is collected without the owner
knowing. A more personal aspect of your passive digital footprint is your search
history, which is saved by some search engines while you are logged in.
******************************