0% found this document useful (0 votes)
87 views

CS - QP - XI - Set 2

The document provides instructions for a Computer Science theory exam. It has 5 sections with a mix of short, long, and very short answer questions covering topics like algorithms, cyber security, Python programming etc. Detailed instructions are given about number of questions in each section, marks allotted and expected answer format. The document is quite long as it contains the entire question paper.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
87 views

CS - QP - XI - Set 2

The document provides instructions for a Computer Science theory exam. It has 5 sections with a mix of short, long, and very short answer questions covering topics like algorithms, cyber security, Python programming etc. Detailed instructions are given about number of questions in each section, marks allotted and expected answer format. The document is quite long as it contains the entire question paper.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Class: XI Session: 2022-23

Computer Science (083)


Set II
Question Paper (Theory)
`
Maximum Marks: 70 Time Allowed: 3 hours
General Instructions:
1. This question paper contains five sections, Section A to E.
2. All questions are compulsory.
3. Section A has 18 questions carrying 01 marks each.
4. Section B has 07 Very Short Answer type questions carrying 02 marks each.
5. Section C has 05 Short Answer type questions carrying 03 marks each.
6. Section D has 03 Long Answer type questions carrying 05 marks each.
7. Section E has 02 questions carrying 04 marks each. One internal choice
is given in Q35 against part c only.
8. All programming questions are to be answered using Python Language only.

SECTION A
1. A worm is 1
a) A slimy pink thing that lives in dirt
b) A piece of malicious code that makes copies of themselves and
spread through without human interaction.
c) An unsolicited email message
d) None of the the above

2. Which of the following features should one always enable on social 1


media accounts?
a) Latest updates and pictures
b) Trending ads and videos
c) security and privacy feature
d) None of the above
3. Abdul got a call from Bank office and asking PIN, OTP and some details 1
for the updation of his ATM card. Which of the following is not suggested
for Abdul?
(a) He should provide all details as desired by the caller.
(b) He should not give any details and contact bank helpline number
to check the validity of the call received.
(c) He should inform local police about the call.
(d) None of the above

4. In a binary number following bits are grouped together to get a hexadecimal 1


number.
a. 4 bits
b. 2 bits
c. 3 bits
d. 5 bits
5. A high speed memory is placed between the CPU and the primary memory is 1
known as
a. RAM
b. ROM
c. Secondary memory
d. Cache memory
6. What is the correct definition of an algorithm? 1
a. An algorithm is a step by step instruction to solve a problem.
b. An algorithm is a process of baking bread.
c. An algorithm is software used to compute numbers.
d. An algorithm is the process of breaking problems
7. The value of radix in Decimal number system is _____________ 1
a. 2
b. 8
c. 10
d. 1
8. What must always follow an "if" statement? 1
a) A semi colon
b) A variable
c) A logical expression
d) An else statement
9. What is the one thing you must ALWAYS do inside a while loop? 1
a) You must initialise a value in the loop.
b) You must specify an increment/decrement value for the loop.
c) You must use break
d) You must use continue
10. ________ converts assembly language into machine language 1
a) Interpreter
b) Compiler
c) Converter
d) Assembler
11. Which operator will have the lowest precedence in the given 1
statement: 5 >= 3 and not 8 < 4 or 6 == 7
a) ==
b) or
c) and
d) not
12. For cyber security who should be responsible 1
a) Owner of the organization
b) Computer Department
c) Managers
d) Every Staff member
13. Local backup files – saved on your computer – will protect your data 1
from being lost in a ransomware attack. True or False?
a) True
b) False
14. In____, an imposter uses an authentic looking email or website to trick 1
recipients into giving out sensitive personal information
a) Hacking
b) Phishing
c) Spoofing
d) Ransomware
15. To check if a string myStr is empty or not we will use the function 1
a) myStr.isblank()
b) myStr.isempty()
c) myStr.isspace()
d) myStr.isfilled()
16. What will be the output of the following statements 1
myList=["Python","is", "Interesting"]
print(myList[-1][-2])
a) g
b) Interesting
c) ng
d) n
Q17 and 18 are ASSERTION AND REASONING based questions.

17. Assertion (A) : To protect one’s intellectual property rights one can get 1
information copyrighted or patented or use trademarks.
Reason (R) : Once information is copyrighted/patented, information must
not be exchanged without the consent of its owner

a) Both A and R are true and R is the correct explanation of A


b) Both A and R are true but R is not the correct explanation of A
c) A is true but R is false
d) A is false but R is true
e) Both A and R are false
18. Assertion (A) : Every open-source software is free software. 1
Reason (R) : Every free software is open source.
a) Both A and R are true and R is the correct explanation of A
b) Both A and R are true but R is not the correct explanation of A
c) A is true but R is false
d) A is false but R is true
e) Both A and R are false
SECTION B

19. What will be the output of the following code fragment? 2


for letter in 'PYTHON':
if letter=='H':
break
print(letter)
else:
print(“Finally")
print(“just out of the loop”)
20. ASCII is a ______ bit code representing ______ characters. 2
21. Write output for the following python code: 2
str1 = “Annual Examination 2023”
print(str1[3:], “and ”, str1[:2])
print(str1[-8:] ,“and”, str1[-4:-1])
22. Convert the following: 2
a. (B2F)16=( )2
b. (10110.0101)2=( )8
23. What is the output produced by the following code? 2
x=1
while True:
if x>3:
if x>4:
print('A',end='#')
else:
print('B',end='$' )
break
elif x<=2:
if (x!=0):
print('C', end='@' )
print('D')
x=x+1
24. We can post or comment on anything on the Internet, and delete it 2
later. Will this deletion be permanent? If yes/no, why?
(source NCERT Chapter 11, page no 233)
25. When you search online for pictures, how will you find pictures that are 2
available in the free public domain? How can those pictures be used in
your project without copyright violations?
SECTION C

26. Write a program to exchange first-half elements of list with second 3


-half elements assuming list is having even number of elements.
Like if L1 is [10,20,30,40,50,60,70]
then output should be
[40,50,60,10,20,30,70]
27. Write a program to find the occurrence of a character entered by the 3
user in a list without using built in function and if number is not in the
list ,it should print “number does not exist.
28. Explain the concept of break and continue in python programming by 3
giving the output of the following code:-
1.for value in "String":
if value=="i":
break
print(value)
2.
for value in "String":
if value=="i":
continue
print(value)
29. Name different types of errors in the following code and rectify as 3
well.
num1=int[input(“enter number 1)]
num2=0
num3=10
div=num1/num2
add=num1*num3 # To find the sum of two numbers
print(add,div)
30. (i) What are the possible outcome(s) executed from the following code? 2+1
Also specify the maximum and minimum values that can be assigned to
variable NUM.
NAV=[“LEFT”,”FRONT”,”RIGHT”,”BACK”]
NUM=random.randint(1,3)
NAVG=””
for C in range(NUM,1,-1):
NAVG=NAVG+NAV[C]
print(NAVG)
i.BACKRIGHT ii.BACKRIGHTFRONT iii. BACK iv.LEFTFRONTRIGHT
(ii) Which module is required for the above code?

Section D

31. Read the passage given below and answer the questions. 1+1+1+1+1+
Source: NCERT Class XI Computer Science book

Our digital footprint can be created and used with or without our
knowledge. It includes websites we visit, emails we send, and any
information we submit online, etc., along with the computer’s IP
address, location, and other device specific details. Such data could be
used for targeted advertisement or could also be misused or exploited.
Thus, it is good to be aware of the data trail we might be leaving
behind. This awareness should make us cautious about what we write,
upload or download or even browse online.

a. What do you mean by Digital footprint?


b. Name the two types of digital footprints.
c. Each examples of each type of digital footprint.
d. Where are the digital footprints stored?
e. Can digital footprints be erased?
32. Krishna Store wants to store mobile numbers of his customers in form of 1+1+1+1+1
a dictionary. The following program was written by the Manager of the
store to input n number of names and mobile numbers and store in the
dictionary. The program also helps in searching the phone number of a
particular customer. Complete the following statements of the program
written below:
dict=_________
ch=’y’
while ch==’y’ or ch==’Y’:
custname=__________ (“Enter Customer Name”)
phone=input(“Enter phone number of the customer”)
dict[________]= phone
ch= input(“Do you want to add more customers”)
print (dict)
cust_name= input(“Enter the name of the customer to be searched”)
for i in dict:
if i == cust_name:
print(“Customer”, _________, “has mobile number”,
__________)

33. a. What will the following code print? 1+1+1+1+1


Str='Smiling'
result=''
for ch in Str:
if ch =='n':
break
if ch=='m':
continue
result +=ch
print(result)

b. Consider a string Str. Choose the correct option that will produce
the output given below::
Str=”I am enjoying learning python programming”

Output: I Am Enjoying Learning Python Programming”

i. print(Str.upper()
ii. print(Str.lower())
iii. print(Str.title())
iv. print(Str.capitalize())
c. What will be the output of the following Python code snippet?

address = “34, Raja Garden, New Delhi”


print(address.split(','))

d. What will be the output of the following code if user enters 3 as


an integer?
x=int(input(‘Enter a number ‘))
if x==1:
print(‘GOOD’)
elif x>=2:
print(‘GREAT’)
else:
print("Can’t say ")
print(‘Have a great day’)
e. What should be the steps 2 and 4 in sequence to complete the
steps in problem solving approach?
Step 1: Analyzing the problem
Step 2: ____________
Step 3: Coding
Step 4: ______________

SECTION E

34 L1=[2,3,4,5,6] 2+2

a. Identify the data type used above. Is it mutable or immutable?


b. Write the output after executing the following commands:
L1.append(35,45)
print (L1[2: ])

or

del(L1[2:4]
print (L1[ ])
35 Answer the following questions on the basis of the code below: 2+2

name_1 = “RAJAT”
for i in range (0, len(name_1)+1):
print(name_1[0:i])

i. Give the output of the above code.

ii. Can this be written using while loop? If yes, rewrite the above code
using while loop.
+

You might also like