Computer Science (XI)
Computer Science (XI)
General Instructions:
1. This question paper contains two parts A and B. Each part is compulsory.
2. Both Part A and Part B have choices.
3. Part-A has 2 sections:
a. Section – I is short answer questions, to be answered in one word or one line.
b. Section – II has two case studies questions. Each case study has 4 case-based sub-
parts. An examinee is to attempt any 4 out of the 5 subparts.
4. Part - B is Descriptive Paper.
5. Part- B has three sections
a. Section-I is short answer questions of 2 marks each in which two question have
internal options.
b. Section-II is long answer questions of 3 marks each in which two questions have
internal options.
c. Section-III is very long answer questions of 5 marks each in which one question has
internal option.
d. All programming questions are to be answered using Python Language only.
Section A
Q.NO Select the most appropriate option out of the options given for each question. Attempt
any 15 questions from question no 1 to 21.
a) ? b) < c) = d) and e) //
6 Which of the following statement create a dictionary? 1
a) X = { }
b) X = {“Sohan”:40, “Mohan”:45}
c) X = dict()
d) All of the above
7 A tuple is declared as 1
T = (10,5,5,10,15)
What will be the output of
>>> print(T+(„a‟,‟b‟))?
8 These are the small text files for storing a small piece of information related to someone‟s 1
online habits.
i. Spyware ii. Virus iii. Cookies iv. Spam
9 Which function out of the following will return the data type of the object: 1
1. type() 2. id() 3. ord() 4. str()
10 Your friend Suresh is complaining that he is receiving useless back-to-back mails 1
regarding downloading a software from their site. Identify the type of cybercrime for such
situations
11 Which of the following falls under utilities? 1
i. Text Editor ii. Backup iii. Disk Defragmenter iv. All of these
12 This term refers to a person who purposely posts opposing, sarcastic, demeaning or 1
insulting comments about something or someone.
a. Cyber Criminal b. Cyber Thief c. Cyber troll d. Cyber stalker
13 Unauthorized monitoring of other people‟s communication is called: 1
a. Spamming b. Malware c. Adware d. Eavesdropping
14 Which of the following are the example of system software: 1
a. Operating system b. MS Office c. Aarogya setu app d. Games
15 Ramesh wants to print all the key values of the dictionary(D) so which of the following 1
command he should use:
1. print(d.key())
2. print(D.keys())
3. print(D.keys)
4. print(d.key_values())
16 Identify the valid declaration of L: 1
L = [„JAN‟, „12‟, „NEW YEAR‟, ‟365‟]
a. dictionary b. string
c. tuple d. list
17 Suppose list=[0,1,2,3] the statement print(list*2) will print 1
a) [0, 1, 2, 3, 0,1,2,3] b) [0, 1, 2, 3, 1,2,3]
c) [0,2,4,6] d) [0,1,2,3]
18 Write the output of the following code: 1
S=”Kendriya”
for i in range(len(S)):
print(S[i],end=‟@‟)
Line=”Kendriya Vidyalaya
Jagdalpur:1564” Length= # code for
line1
print(“Total no of characters are :”,Length)
cnt=0
for j in Line:
if j. : # code for line2
cnt +=1
print(“Total no of digits in given Line are”,_______) #code for line3
print(Line. ) # code for line4
print(“KV Code : ”,Line[ ]) # code for line5
Line 1 : Ravi wants to count the number characters in a string „Line‟. 1
Line 2 : Ravi wants to check whether the element in loop variable j is a digit or not. 1
Line 3 : Ravi wants to print the total number of digits in a string „Line‟ 1
Line 4 : Ravi wants to change all the uppercase letters into lowercase and lowercase letters 1
into uppercase.
Line 5 : Ravi want to print the kv code i.e. 1564 which is given at the end of the string Line. 1
23 Identify the type of cyber crime/activity from the following Situations:
(a) A person who starts quarrels or upsets people on the internet to distract and sow 1
discord by posting inflammatory and digressive, extraneous or off-topic messages to
an online community. This person will be referred as in cyber world.
i. cyber troll ii. cyber stalker iii. Spyware iv. Hacker
(b) The activity of making false accusations or statements of fact, monitoring , making 1
threats, identity theft ,damage to data or gathering information that may be used to harass
someone by using internet or other electronic means. This may be referred as .
i. Cyber stalking ii. cyber bullying iii digital footprinting iv. Fishing
Section-I
24 2
Evaluate the following expressions:
a) 15*(4%4)//2+6
b) not 10> 5 and 2 < 11 or not 10 < 2
25 What is an ip address? 2
26 2
Expand the following terms:
a) EEPROM b)VDU c)LCD d) OMR
27 What is a module in Python? Define any two functions of Math module in python. 2
OR
Write any two difference between List and Tuple.
28 Observe the following Python code very carefully and rewrite it after removing 2
all errors with each correction underlined.
Str=‟Jagdalpur”
L= length(Str)
For j in range(L)
Print(j)
29 How many times „Hello KV‟ will be printed after the execution of the following code: 2
for x in range(0,20,2):
print(“Hello KV”)
print(“Hello KV”*2)
print(D.keys())
35 Write a program to check whether the given string is a palindrome or not. 3
OR
State and prove the Demorgan Theorem.
36 Define the following terms: 3
i. Application software ii. Cache Memory iii. Language processor
37 What is Social Media? Give examples of some social media platform with their 3
usage.
OR
Define any 3 methods to prevent identity theft?
Section- III
38 Write the function name for the following task: 5
1. Function to add a list element at the end of the existing list.
2. Function to remove all the elements of the dictionary.
3. Function to count the number of characters in a string.
4. Function to find the ASCII code of given character.
5. Function to find the index value of an element of the list.
39 Write a program to create a dictionary „Student‟ to store the data of 10 students ,with the 5
key as „rollno‟,‟name‟, ‟marks‟ and do the following:
i. Accept the details of 10 students and display it.
ii. Search & Display the details of a student on the basis of its rollno.
iii. Display the details of topper student.
Write the program to find the sum of the geometric series given below: 5
40 S = a + ar + ar2+ ar3+ ar4+ ar5+ ar6+ ar7+ ar8
OR
Write a program that reads a line and prints its frequency chart like:
1. Number of uppercase letters
2. Number of lowercase letter
3. Number of alphabets
4. Number of digits