0% found this document useful (0 votes)
6 views3 pages

Class Xi Sqp Cs Set III

Uploaded by

jangrasahil.1221
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views3 pages

Class Xi Sqp Cs Set III

Uploaded by

jangrasahil.1221
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

KENDRIYA VIDYALAYA SANGATHAN, RAIPUR REGION

SAMPLE PAPER-III, 2020-21

Class –XI SUB-Computer Science

Max. Marks: 70 Duration: 3:00Hrs

General Instructions:

1. This question paper contains two parts A and B. Each part is compulsory.
2. Both Part A and Part B have choices.
3. Part-A has 2 sections:
a. Section-I is short answer questions, to be answered in one word or one line.
b. Section –II has two case studies question. Each case study has 4 case-based subparts.

An examinee is to attempt any 4 out of the subparts.

4. Part – B is descriptive Paper.


5. Part – B has three sections
a. Section-I is short answer questions of 2 marks each in which two question have internal options.
b. Section-II is long answer questions of 3 marks each in which two questions have internal options.
c. Section-III is very long answer questions of 5 marks each in which one question has internal option.
6. All programming questions are to be answered using Python Language only.

Question PART - A Marks


No. Allotted
Section I
Select the most appropriate option out of the options given for each question. Attempt any
15 questions from no 1 to 21.
1 The set of instructions given to a computer is called………………….. 1
a)Program b)ALU c)CU d)Storage
2 Expand the following a-OLED b-TFT 1
3 What are universal gates? 1
4 Name two ways of representing an algorithm. 1
5 ………………………. are tokens that trigger some computation/action when applied to variables. 1
6 State Demorgan’s Theorem. 1
7 Some common threats to a computer are 1
a- Worms b-Denial of service c- Phishing d- All of these
8 Which of these is not an optical media? 1
a-CDs b-Bluray Disk c- DVDs d- Flash Memory
9 Which statement will produce an error? 1
a) int(7.0+0.1) b) str(1.2*3.4) c) float(“77”+”0”) d) str(9/0)
10 Identify the types of errors? 1
a) Division by zero b) x+y=z
11 What is a debugger? 1
12 Python allows repetition of a set of statements using…………….. construct. 1
13 How can you create multi-line strings in Python? 1
14 …………… operator is used to replicate 2 string. 1
(i) + (ii) - (iii) * (iv) /
15 Name the sorting you use in daily life. 1
16 How we write empty statement in Python? 1
17 The smallest individual unit in a program is called----------. 1
a-keywords b-integers c-token d-key
18 Which of the following is not a Python legal string operation? 1
a) ‘abc’+’abc’ b) ‘abc’*3 c) ‘abc’+3 d) ’abc’.lower()
19 What are the two Boolean constants? 1
20 Write any one drawback of social media networks. 1
21 The online payments must be made using a ……… connection. 1
a- Secure b- valid c- Controlled d- closed
Section II
Both the case study based questions are compulsory. Attempt any 4 sub parts from each
question. Each question carries 1 mark
22 Xenox Technologies deals in hardware components required for assembling computer 4x1
systems in the Nehru Place Market. They provide reliable and efficient data storage devices to
their customers. Five storage devices in which they deal are described below. Name the
storage device being described and also list the appropriate category of storage.
(a) Non-volatile memory chip: contents of the chip cannot be altered; it is often used to store the
start-up routines in a computer.
(b) Optical media which use blue laser technology to read and write data on the media surface.
(c) This allows read and write operations to be carried out at the same time.
(d) Non-volatile memory device which uses flash memories.
(e) Magnetic disc with very large storage capacity; can be used to store vast amounts of data;
mostly fixed in computer cases and serves as the main storage device.
23 Krishna of class 11 is writing a program to check whether square root of a given is prime or 4x1
not. Some of the code segment is written below. Help him to complete the program.
import ______________ #Line 1
n = int(______________(“Enter a number”)) #Line 2
m = int(math.__________(n)) #Line 3
k=0
for i in _________(2,m//2+1): #Line 4
if (m%i==0):
k=k+1
if (k == 0):
print(m,”Which is square root of ”,n,”is Prime number.”)
else:
print(m, “which is square root of ”,n, “is not Prime number.”)
(a) Name the module he should import in Line 1.
(b) Name the function he should use in Line 2 for input.
(c) Name the function to find the square root in Line 3.
(d) Name the function to execute for statement in Line 4.
(e) What will be the output if the value of n is 16?
PART - B
Section I
24 Evaluate the following expressions: 2
a) 7 * 2 + 3**// 8 – 3
b) 15>19 and 7 > 11 or not 15 > 3
25 Give difference between Public cloud and Private cloud. 2
OR
Give differences between ASCII and Unicode.
26 Expand the following- 2
a)EEPROM b)BCD c) CUI d)APU
27 Differentiate between Immutable and Immutable data types with suitable example. 2
OR
Explain the use of continue keyword used in a loop with the help of a suitable example.
28 Rewrite the following code in Python after removing all syntax error(s). Underline each 2
correction done in the code.
m = 30
for x in range(0,m):
If x%4==0:
print(x*3)
Elseif x%5=0:
print(x+3)
else
print(x+10)
29 Predict the output of the following two parts. Are the outputs same/different? Why? 2
a) L1, L2 =[2,4],[2,4] b) L1, L2=[2, 4],[2, 4]
L3=L2 L3 = list(L2)
L2[1] = 5 L2[1] = 5
Print(L3) print(L3)
30 What do you understand by Private Browsing? Give a suitable example of private search 2
engines.
31 Differentiate between list.pop() and del method. 2
32 What are Worms and Trojan Horses? 2
33 Give the value of 2
a) math.ceil(5.05) b)math.ceil(-5.05)
PART-B (Section II)
34 Write a Python program to get a single string from two given strings, separated by a space 3
and swap the first two characters of each string.
Sample String : 'abcd', 'wxyz'
Expected Result : 'wxcd abyz'
35 Predict the output of the following program- 3
text =’kendriayvidyalayasangathan’
counts={}
ct=0
lst=[]
for word in text:
if word in lst:
lst.append(word)
counts[word]=0
ct+=1
counts[word]=counts[word]+1
print(counts)
print(lst)

36 Write a program in Python to read three numbers in three variables and swap first two 3
variables with the sums of first and second, second and third numbers respectively.
37 Write two active protection and two preventive measures for PC intrusion. 3
38 What does each of the following expressions evaluate to? Suppose that T is the tuple 5
(“These”,*“are”,”a”,”few”,”words”+,”that”, “we”,”will”,”use”)
a) T*1+*::2+ b) “a” in T*1][0] c) T[:1]+T[1] d)T[2::2] e) T[2][2] in T[1]
39 Verify the following using truth table: 5
X + Y.Z = (X+Y) . (X+Z)
40 Give the Gender inequality issues in regard of Computer Education. 5

You might also like