0% found this document useful (0 votes)
31 views4 pages

Class 11 QP Prep

The document contains questions from a Computer Science exam for Class XI. It has 5 sections with a total of 35 questions ranging from 1 to 5 marks each. The questions test concepts related to Python programming, operating systems, cyber security, and computer fundamentals.

Uploaded by

Dinesh Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views4 pages

Class 11 QP Prep

The document contains questions from a Computer Science exam for Class XI. It has 5 sections with a total of 35 questions ranging from 1 to 5 marks each. The questions test concepts related to Python programming, operating systems, cyber security, and computer fundamentals.

Uploaded by

Dinesh Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

EXCEL PUBLIC SCHOOL, MYSURU

PREPARATORY EXAMINATION 1- JANUARY/FEBRUARY 2024

Class: XI Marks: 70
Subject: Computer Science (083) Time: 3 Hours
General Instructions:
 Please check This Question Paper contains 35 questions.
 The paper is divided into 5 Sections- A, B, C, D and E.
 Section A, consists of 18 questions (1 to 18). Each question carries 1 Mark.
 Section B, consists of 7 questions (19 to 25). Each question carries 2 Marks.
 Section C, consists of 5 questions (26 to 30). Each question carries 3 Marks.
 Section D, consists of 2 questions (31 to 32). Each question carries 4 Marks.
 Section E, consists of 3 questions (33 to 35). Each question carries 5 Marks.
 All programming questions are to be answered using Python Language only.

Ques
Question Marks
No
SECTION A
1. Which of the following function(s) does not require the user’s involvement? 1
a. Input b. Process c. Output d. Storage
2. ___________ is used while booting process of a computer. 1
a. RAM b. ROM c. CACHE d. BIOS
3. A type of software that is designed to help users manage, maintain, and optimise 1
their computer system is
a. Utility software c. Application software
b. System software d. Tailor-Made software
4. Find the invalid identifier from the following. 1
a. none b. pass c. name d. gender
5. Which statement will produce an output for the below operation? 1
ST= ‘Learning Python’
a. ST/2 b. ST*2 c. ST+2 d. ST**2
6. Identify the output of the following Python statements. 1
x, y = 2,10
while x+1 < y:
print (x, end=' ')
x += 1
a. 2345678 b. 3456789 c. 23456789 d. 3456789
7. Which of the following function will return the last three characters of a string 1
‘s’?
a. s[3:] b. s[:3] c. s[-3:] d. [: -3]
8. The function that returns the ASCII value of a character is 1
a. chr() b. ord() c. id() d.
asc()

9. State (True / False) 1


pop and remove perform a similar action to a list.
10. The output is high if either of the input is high. The above statement repesents 1
_____.
a. NAND gate c. OR gate
b. AND gate d. EX-OR gate
11. A program that replicates and spreads from one computer to another is a 1
a. Antivirus b. driver c. Firmware d. Virus
12. If a, b = 35, 45. The output for 1
a and b will be
a. 35 b. 45 c. 3545 d. error
13. ______ built-in function returns the memory address of the object. 1
a. ord b. in c. obj d. id
14. _________ keyword is use for function. 1
a. define b. fun c. def d. function
15. The datatype of % is always 1
a. str b. int c. float d. bool
16. A function that generates floating point number from 0 to 1 is 1
a. randint b randrange c. shuffle d. random
17. Predict the output- 1
d={'Phy': 94, 'Che': 72, 'Bio': 80, 'Eng': 95}
for i in d:
if d[i] = = 94:
print(i)
a. Phy b. True c. value error d. ‘Phy’ : 94
18. Wiretapping a phone line by cutting into the phone wires outside an individual's 1
home and listening to conversation is an act of
a. Phishing b. Eavesdropping c. Cyber troll d. Scam

SECTION B

19. Convert the following: 2


a. (FACE)16=(?)2
b. (125)10=(?)8
20. Correct the below code. Rewrite and underline each correction. 2

// print odd numbers through 9 to 1


n = 10

while n > 0:
n=1-n
for n%2 == 0:
continue
print('Odd Numbers:', n)
print("Loop is finished")

21. Write a program to swap the first and last element of a list. 2
22. Write the difference between split() and partition() with an example. 2
23. What is a membership operator? Explain with an example. 2
24. Explain the difference between random and randint function in python. 2
25. What is an identity fraud? Give an example. 2
SECTION C
,26. Write the output for the string operations below 3
sentence='learning python'
a. print(str3.istitle())
b. print(sentence[:5])
c. print(‘-‘.join(sentence))
d. print(sentence[-1:-10])
27. What are the different types of errors in python? Give an example. 3
28. Write a program to generate prime numbers up to 50. 3
29. Write the output for the following questions. 3
tu=('learning', 'python', 'is', 'fun')

a. for i in tu:
print(len(i))
b. for i in tu:
t3=i[:2]
print(t3)
c. tu1=sorted(tu)
print(tu1)

30. Write a program to generate the below pattern. 3


55555
4444
333
22
1
SECTION D
31. Write the methods for the following list 4
L1=[88,11,25,45,78,36,9,68]
L2=[12,84,15,5]
a. Create a list L3 to hold the content of L2 and L1.
L3 should be [12,84,15,5, 88,11,25,45,78,36,9,68].
b. Slice only the even index value from L3 and save it to L4.
c. Print L3 from 88 to 36 using backward indexing.
d. Print L3 in reverse order.

32. Write the output of the methods below on the following dictionary. 4
d1={1:5000,3:2000,2:9000,5:4000,4:8000}
a. d2=d1.copy()
b. d1.pop()
c. sorted(d1.values(),reverse=True))
d. k,v=d1.popitem()
SECTION E

33. a. Softwares that are neither free nor open are called as ____________. 5
b. ____________ is an act of stealing someone else’s intellectual work and
representing as your own.
c. Any information such as email, online account, document on a pen drive
is a ___________ property.
d. A fake email from a bank asking you to click a link and verify your
account details is an example of _____________.
e. ______________ refers to creations of the mind, such as inventions;
literary and artistic works, designs and symbols, names and images used
in commerce.
34. What is e-waste? How is e-waste generated, write the methods to manage it? 5
35. Write various methods of creating strings in python with an example. 5

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy