0% found this document useful (0 votes)
549 views6 pages

Dav Computer Science SP

Uploaded by

cutetamilgal2010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
549 views6 pages

Dav Computer Science SP

Uploaded by

cutetamilgal2010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

DAV PUBLIC SCHOOL

SAMPLE PAPER 2023-2024


Class: XI Maximum Marks: 70
Subject: Computer Science (083) Max Time: 3 Hours

General Instructions:
1. This question paper contains five sections, Sections A to E.
2. All questions of a particular section must be attempted in the correct order.
3. SECTION A has 18 Objective Type Questions of 01 mark each.
4. SECTION B has 07 Very Short Answer Type Questions carrying 02 marks each.
5. SECTION C has 05 Short Answer Type Questions carrying 03 marks each.
6. SECTION D has 02 Questions carrying 04 marks each.
7. SECTION E has 03 Questions carrying 05 marks each.
8. All programming questions are to be answered using Python Language only

SECTION - A
1. Which of the following is a valid identifier in Python? 1
a. none b. True c. False d. None
2. Size of ASCII Code is: 1
a. 8 bit b. 7 bit c. 128 bit d. 256 bit
3. The _____ mode of Python gives instant result of typed statement. 1
a. Interactive b. script c. both a and b d. none of these
4. 1 GB is equal to - 1
a. 210 MB b. 220 KB c. both a and b d. None of the above.
5. Identify the following Boolean logic gate. 1

a. AND b. OR c. XOR d. NAND


6. ISCII stands for 1
a. Indian Scripts Code for Interchanging Information
b. Indian Scripts Code for Information Interchange
c. Indian Scientific code for Interchanging Information
d. Indian Standard code for Internally Interchange
7. What will be the output of the following code? 1
tp1 = (2,4,3)
tp3 = tp1*(2)
print(tp3)
a. (4,8,6) b. (2,4,3,2,4,3) c. (2,2,4,4,3,3) d. Error
8. When someone steals someone else’s personal information to commit theft or fraud, 1
it’s called __________.
a. Identity Theft b. Hacking c. Computer Piracy d. Infringement
9. Which of the following function will return the key, value pairs of a dictionary? 1
a. keys() b. values() c. items() d. all of these
10. Evaluate the following expression and identify the correct answer: 1
8 // 5 + 3**5 %1//5-3
a. 14 b. -2 c. 4 d. -5

XI –COMPUTER SCIENCE Page 1 of 6


11. Gitika is advised by her best friend, Seerat to protect her personal information from 1
intentional or unintentional attacks by other. This is also known as ____________.
(a) digital right (b) copyright
(c) data privacy (d) intellectual property
12. When a person is harassed repeatedly by being followed, called or be written to 1
he/she is target of
a. Phishing b. Cyber Stalking c. Identity theft d. Plagiarism
13. Many people create videos on YouTube by using content from other’s videos. Infer 1
which Intellectual Property Right is being violated in this case?
a. Copyright Infringement b. Trademark c. Copyright d. Patent
14. Which of the following Python code will print out each element of the given list? 1
monthDays = [31,28,31,30,31,30,31,31,30,31,30,31]
a) for days in range(monthDays):
print(days)
b) for days in monthDays:
print(days)
c) for days in range(len(monthDays)):
print(days)
d) for days in monthDays[0]:
print(days)
15. Consider the string 1
s = "REAP"
Which of the following will result in an error?
a. print( s[ : : 2] ) b. print( s[3] ) c. s[3] = 'R' d. t = s[3]
16. What is an example of e-waste? 1
a. a ripened banana b. an old computer
c. old clothes d. empty soda cans
Q17 and Q18 are ASSERTION AND REASONING based questions. Make the
correct choice as
a. Both A and R are true and R is the correct explanation of A
b. Both A and R are true and R is not the correct explanation of A
c. A is True but R is False
d. A is False but R is True
17. Assertion(A) : Dictionaries are mutable. 1
Reason(R) : Contents of the dictionary can not be changed after it has been created.
18. Assertion(A) : Using sum( ) with a nested tuple will raise an TypeError. 1
Reason(R) : TypeError is raised when the program attempts to access or use a
variable that has not been defined or assigned a value.
SECTION - B
19. State the basic units of the computer. Name the subunits that make up the CPU, and 2
give the function of each unit.
OR
Differentiate between compiler and interpreter.

20. What can be done to reduce the risk of identity theft? Write any two ways. 2

OR

XI –COMPUTER SCIENCE Page 2 of 6


Many Inventors, designers, developers and authors can not protect the ideas they
have developed. Intellectual Property Rights have been established to prevent others
from wrongly profiting from their creations or inventions. Elaborate the concept of
Intellectual Property Rights.

21. Match the following : 2

Column A Column B
a. for i. Punctuator
b. + ii. literal
c. : iii. Operator
d. 5 iv. Keyword

22. Rewrite the following code in Python after removing all syntax error(s). Underline 2
each correction done in the code.
25=Val
for I in range(0,Val)
if I%2=0:
print( I+1)
Else:
print (I-1)
23. Convert the following into its equivalent: 2
i) (10110.11)2 = ( ? )10
ii) (BAD)16 = ( ? )8

24. What possible output(s) are expected to be displayed on screen at the time of 2
execution of the program from the following code? Also specify the maximum values
of variables minn and maxn.
import random
ar=[2,3,4,5,6,7]
minn=random.randint(1,3)
maxn=random.randint(2,4)
for i in range(minn,maxn+1):
print(ar[i],end='#')
a. 3#4#5# b. 5#6#7# c. 1#4#7# d. 4#5#7#
OR
WAP to generate five random integers between 50 and 75 and display the sum of
random numbers generated.

25. Write the Boolean expression for the following logic circuit shown below: 2

XI –COMPUTER SCIENCE Page 3 of 6


SECTION C
26. Write a Python program that accepts a string from user and display list containing 3
indices of capital letters of the string.

For Example, If the String is:


India Launched Chandrayan-3
Then the output should be:
[0,6,15]
OR

Write a Program to reverse and print the words starts with O


e.g Ubuntu is an Open Source Operating System
Then the output should be:
Ubuntu is an nepO Source gnitarepO System
27. Draw a flowchart to find the sum of all positive numbers entered by the user. As 3
soon as user enters a negative number, stop taking in any further input from the user
and display the sum.

28. WAP to create a list L3 from two given lists L1 and L2 such that the elements of 3
L1 are placed at even index and elements of list L2 are placed at odd index of L3.
For example :
if L1= [1,2,3,4,5] and L2 =[7,8,9,10,11]
then L3 should be [1,7,2,8,3,9,4,10,5,11]
29. a. Match the columns 2+1
1. Phishing a. visual symbol, word, name, design, etc
2. Cyber crime b. use of digital technology along with the Internet.
3. Trademark c. fake websites or emails look authentic or Original
4. Digital Society d. computers are used as a tool to commit crime.

b. Give one word.


i. A ___ works on a unique digital ID issued by a Certified Authority (CA) to the user.
ii. Biometric information, health information, financial information, or other
personal documents, images or audios or videos are examples of _______ data.

30 Write a Python code to input electricity unit charges and calculate total electricity bill 3
according to given condition:
For units between 0-49, charge is Rs 0.50/unit.
For units between 50-99, charge is Rs 0.75/unit.
For units between 100-199, charge is Rs 1.20/unit.
For 200 and above units, charge is Rs 1.50/unit.
An additional surcharge of 20% is added to the bill in each case.

OR
A company decided to give bonus to employee according to following criteria:
Time period of Service Bonus
More than 10 years 10%
>=6 and <=10 8%
Less than 6 years 5%
Ask user for their salary and years of service and print the net bonus amount.
XI –COMPUTER SCIENCE Page 4 of 6
SECTION - D
31. a. How many times the values of i and j will be displayed after executing the 2+2
following python code?
i,j=5,6
while i<20:
i=i+j
j=j-1
print(i,j)

b. Rewrite the following for loop into its equivalent while loop.
for i in "Programming ":
print(i)

32. Assume the list : List=[8,9,10]. Do the following using list functions : 4
a) Insert value 17 at index 1.
b) Add 4, 5 and 6 to the end of the list.
c) Remove the first entry from the list.
d) Sort the list in reverse order.
SECTION - E
33. Question consider the following string
S1='Azadi ka Amrit Mahotsav'
(i) Compare the outputs of statement 1 and statement 2 2+1+
statement 1 : print(S1[-len(S1[3:8]):-len(S1[-3:-1])].upper()) 2
statement 2 : print( S1[- len( S1[3:8].upper()) :- len( S1[-3:-1].upper())])
(ii) Give the output
print( S1.endswith( 'sav') and S1.startswith( 'azadi'))
(iii) Formulate the code to display five letter words in the string S1.
34. a. Create a dictionary named dict_1 and perform the following: 4+1
i. dict_1 should have first five prime numbers as key and their number
names as value
ii. Write statement to return the keys in the dictionary.
iii. To check if 7 is present or not.
iv. To retrieve the value corresponding to 5
b. Differentiate between pop( ) and popitem( ).
OR

Consider the following dictionary stateCapital:

stateCapital = {"Karnataka": "Bangalore", "Haryana":"Chandigarh",


"Sikkim": "Gangtok", "Bihar":"Patna"}

Find the output of the following statements:


a. print(stateCapital.get("Bihar"))
b. print(stateCapital.keys())
c. print(stateCapital.items())
d. print(len(stateCapital))
e. print("Bangalore" in stateCapital)

XI –COMPUTER SCIENCE Page 5 of 6


35. Different cybercrimes are listed in the box as below: 1+1+
1+1+
Bank Fraud, Cyberbullying, Hacking, Cyberstalking, Spam
1
Identify a specific cybercrime (selecting from the above box) for each of the
following situations:
i. A person complains that somebody has created a fake profile on the Facebook
and is defaming his/her character with comments and pictures.
ii. A person complains that Rs. 4.50 lacs have been withdrawn online from
his/her account by using net banking in two consecutive days.
iii. A person complains that somebody has cracked the password of his/her
computer system and stolen valuable data and information.
iv. A person complains he/she is getting threatening messages by email, text or
through comments on a social networking page.
v. A person complains several times he/she connect to a website, when open
his/her e-mail account, then found number of unwanted mails have come to
inbox.

OR

Anup asked his friend Deepak to suggest him software for image editing. Deepak
asked Anup whether he wanted to buy the software or use it freely. Anup is not 1+1+
interested in buying. Help Deepak to find a solution for his friend by answering 2+1
the following questions.
a. State the difference between License and Open-Source License.
b. Name two popular categories of Public Licenses.
c. Name a FOSS for i. Image editing software ii. Browser
d. Explain Proprietary Software.

************

XI –COMPUTER SCIENCE Page 6 of 6

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy