0% found this document useful (0 votes)
388 views15 pages

CS XI Sample 23-24

Bdjdn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
388 views15 pages

CS XI Sample 23-24

Bdjdn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Sample Question Paper 2023-2024

Class : XI
Subject: Computer Science(083)
Max Time:3 Hours Maximum Marks:70
General Instructions:
1. This question paper contains five sections, Sections A to E.
2. All questions of a particular section must be attempted in the correct order.
3. SECTION A has 18 Objective Type Questions of 1 mark each.
4. SECTION B has 07 Very Short Answer Type Questions carrying 02 marks each.
5. SECTION C has 05 Short Answer Type Questions carrying 03 marks each.
6. SECTION D has 02 Questions carrying 04 marks each.
7. SECTION E has 03 Questions carrying 05 marks each.
8. All programming questions are to be answered using Python Language only

Section A
1. Which of the following is an invalid identifier in Python? 1
a. DAVSchool
b. True
c. Dav2nd
d. Dav_school
2. Pick up the system utility software from the following: 1
a. MS Word
b. Antivirus
c. Ubuntu
d. iOS
3. Consider the following string 1
K= "Knowledge"
Which of the following will result into an error?
a. K[5]= "e"
b. print(K[::3])
c. print(K[7])
d. m=K[8]
4. Which of the following memory types cannot store the data or information 1
permanently?
a. ROM
b. Flash Memory
c. RAM
d. Hard Disk
5. Identify the following Boolean logic gate. 1

a. AND
b. OR
c. XOR
d. NAND
6. ASCII stands for________________ 1
a. American Standard code for Interchanging Information
b. American Standard code for Information Interchange
c. American Scientific code for Interchanging Information
d. American Standard code for Internally Interchange
7. Select the correct output of the code: 1
tuple1=(11,22,33,44,55,66)
list1=list(tuple1)
new_list=[]
for i in list1:
if i%2==0:
new_list.append(i)
new_tuple=tuple(new_list)
print(new_tuple)
a. [22,44,66]
b. (22,44,66)
c. (11,33,55,66)
d. [11,33,55]
8. Which of the following issues are addressed by the Information Technology Act 1
2000?

a. Legal recognition of electronic documents


b. Redressal of grievances
c. Offences and contravention
d. Justice dispensation system for cyber crimes
e. Disputes settlement
Choose the correct answer from the options given below:

i) Options a,c,d only


ii) Options c,d,e only
iii) Options b,d,e only
iv) Options a,c,e only

9. Which is the right way to use the function pow? 1

a. import math
print(pow.math(12,4))
b. import maths
print(maths.pow(12,4))
c. import math
print(math.pow(12,4))
d. from math import pow
print(math.pow(12,4))
10. Evaluate the following expression and identify the correct answer: 1
4 * 5 + 3**2 %7//2-3
a. 18
b. -3
c. 44
d. 25
11. Which of the following will delete the key :value pair for key = "input" in 1
dictionary?
D1={"output": "monitor", "input":"keyword", "hardware": "mouse","software" :
"VLC"}
a. del D1["input"]
b. D1["tiger"].delete()
c. Delete(D1["input"])
d. del(D1.[ "input"])
12. Emily, a talented musician and songwriter, recently released her debut album 1
titled "Harmonious Melodies." The album received widespread appreciation from
fans and critics alike, and some of her songs gained popularity on various music
streaming platforms. However, Emily soon noticed that a few individuals had
uploaded her songs on their social media accounts and personal websites
without seeking her permission.
Identify which type of Intellectual property right is violated here
a. copyright Infringement
b. Trademark
c. Patent
d. Plagiarism
13. How can employers or advertisers use digital footprints? 1
a. To enforce online privacy laws
b. To identify and reward anonymous online users
c. To create targeted advertisements based on user interests
d. To limit access to online content
14. Select the correct output of the following string operations 1
myString= "pynative"
stringList=["abc", "pynative", "xyz"]
print(stringList[1]==myString)
print(stringList[1] is myString)
a. True
False
b. True
True
c. False
True
d. False
False
15. In a small company named TechSecure, employees are vigilant about cybersecurity 1
practices. One day, an employee receives an email with an attachment named
"Important_Company_Updates.docx" from an unknown sender. The email claims
to contain essential information about recent company developments. The
employee, curious to know the updates, downloads and opens the attachment.
The file contained malware and corrupted the computer. Identify the malware.
a. Worm
b. Spyware
c. Trojan Horse
d. Adware
16. How can individuals contribute to proper e-waste management? 1
a. To generate more revenue from electronic devices
b. To reduce the number of electronic devices in use
c. To prevent environmental pollution and health hazards
d. To promote the use of traditional waste disposal methods.

Q17 and 18 are ASSERTION AND REASONING based questions. Make the correct
choice as
a. Both A and R are True and R is the correct explanation for A.
b. Both A and R are True and R is not the correct explanation for A.
c. A is True but R is False.
d. A is False but R is True.
17. Assertion(A): It is possible to have duplicate keys in a Python dictionary. 1
Reasoning (R): If you attempt to add a new key-value pair with a key that already
exists in the dictionary, the value associated with the existing key will be
overwritten with the new value.

18. Assertion(A): Slicing a list in python creates a new list containing the sliced 1
elements.
Reasoning(R): When you slice a list in Python, it returns a new list containing the
specified elements, while the original list remains unchanged.
Section B
19. Four statements about interpreter and compiler are given below. Study each 2
statement and determine which of them hold true for a compiler or for an
interpreter.

a. Takes one statement at a time and execute it


b. Generates an error report at the end of the translation of the whole
program
c. Stops the translation process as soon as the first error is encountered
d. Translates entire program in one go

OR

a. Name the two encoding schemes supported by unicode.


b. Arrange the following memory units in descending order:
KB, GB, PB, TB

20. Rewrite the following Python program after removing any/all logical and syntax 2
error(s), underline each correction done in the code:

A = int(input("Enter First Number: "))


B = int(input("Enter Second Number: "))
Op = int(input("Enter Operator")
if Op = "+":
C=A+B
elseif Op == "-":
C=A-B
else
C = "Invalid operator entered"
print("Result = ",C)

21. Differentiate between implicit and explicit conversion. Illustrate with the help of 2
an example.
OR

Add a pair of parentheses to each of the following expression so that it evaluates


to True.
a. 0 ==2==3
b. 3+4==4+5==9
22. (a) Expand the following terms: 2
GPL, IPR

(b) Shweta found a crumpled paper under her desk. She picked it up and opened
it. It contained some text which was struck off thrice. But she could still figure
out easily that the struck off text was the email ID and password of Himanshu,
her classmate. What is ethically correct for Shweta to do?

(i) Inform Himanshu so that he may change his password.


(ii) Give the password of Himanshu’s email ID to all other classmates.
(iii) Use Himanshu’s password to access his account.

23. Do the following conversion: 2


a. (76F)16 =>(?)10
b. (101110010.1011)2 => (?)8

OR
Draw the logic gate of the following expression:
Y=(NOT A OR B) AND ( A OR NOT B )

24. What possible output(s) are expected to be displayed on screen at the time of 2
execution of the program from the following code?
import random
ar=[2,3,4,5,6,7]
minn=random.randint(1,3)
maxn=random.randint(2,4)
for I in range(minn,maxn+1):
print(ar[i],end=”#”)

a. 3#4#5#
b. 5#6#7#
c. 1#4#7#
d. 4#5#7#
OR
Give the output of the following when num1=4,num2=3 and num3=2
NOTE: Consider the initial value of num1 to be 4 for each of the following parts.

a. num1+=num2+num3
print(num1)

b. num1=num1**(num2+num3)
print(num1)
c. num1=2+9*((3*12)-8)/10
print(num1)

d. num1=24//4//2
print(num1)

25. Write the Boolean expression for the following logic circuit shown below: 2

SECTION C
26. Write a Python program that accepts a string from user and display list containing 3
indices of capital letters of the string.

For Example, If the String is:


'India Launched Chandrayan-3'
Then the output should be:
[0,6,15]
OR

Write a Program to reverse and print the words starts with O


e.g Ubuntu is an Open Source Operating System
Then the output should be:
Ubuntu is an nepO Source gnitrepO System

27. Draw a flowchart to find the sum of all positive numbers entered by the user. As 3
soon as user enters a negative number, stop taking in any further input from the
user and display the sum.

28. What will be the output of the Python code given below: 3
T1= "IND-23"
T2= ""
I=0
while I<len(T1):
if T1[I] >= "0" and T1[I]<= "9":
Val=int(T1[I])
Val=Val+1
T2=T2+ str(Val)
elif T1[I]>= "A" and T1[I]<= "Z":
T2=T2+T1[I+1]
else:
T2=T2+ "*"
I+=1
print(T2)
29. a. Fill in the blank with the appropriate term that describes what inventors have 3
the exclusive right to do with their inventions under a patent.
Patents grant inventors the exclusive right to…………….and …………….._ their
inventions for a limited period, typically 20 years from the filing date.

b. What are the potential consequences of oversharing personal information on


social media?

30 Write a Python code to input electricity unit charges and calculate total electricity 3
bill according to given condition:
For units between 0-49, charge is Rs 0.50/unit.
For units between 50-99, charge is Rs 0.75/unit.
For units between 100-199, charge is Rs 1.20/unit.
For 200 and above units, charge is Rs 1.50/unit.
An additional surcharge of 20% is added to the bill in each case.

Section D
31. a. How many times the values of i and j will be displayed after executing the 2+2
following python code?
i,j=5,6
while i<20:
i=i+j
j=j-1
print(i,j)

b. Rewrite the following for loop into its equivalent while loop
for i in "Programming ":
print(i)

32. a. A real value can be converted to nearest integer value with the help of 2+2
two built-in functions: int() and round().
In this context differentiate the above built-in functions with suitable
examples.
b. Write the equivalent python expressions of the following mathematical
expressions
(i) f1=(a2+b2+c2)1/2
𝑞
(ii) f2=p+ 4
(𝑟+𝑠)

Section E
33. a. Find the output of the following python code: 1+2+2
(i) a,b,c,d=(1,2,3,4)
myt=(a,b,c,d)*2 +(5**2,)
print(len(myt)+2)
(ii) Mystring= "programming is Fun"
print(Mystring[-50:10:1].endswith('in'))
print(Mystring.partition('m'))
b. Write a program to count the number of lower case characters and upper case
characters in a given strings.
Example: VaSudhaiva KutumBakam
34. Create a dictionary named dict_1 and perform the following: 1*5=5
a. dict_1 should have first five primary numbers as key and their number
names as value
b. A code to return the keys in the dictionary.
c. To check if 7 is present or not.
d. To retrieve the value corresponding to 5
e. Differentiate between pop and popitem.
f.
OR

Consider the following dictionary stateCapital:

stateCapital = {"Karnataka": "Bangalore", "Haryana":"Chandigarh",


"Sikkim": "Gangtok", "Bihar":"Patna"}

Find the output of the following statements:


a. print(stateCapital.get("Bihar"))
b. print(stateCapital.keys())
c. print(stateCapital.items())
d. print(len(stateCapital))
e. print("Maharashtra" in stateCapital)

Source :NCERT Computer Science Class XI

The school offers wireless facility (wifi) to the Computer Science students of Class
35. XI. For communication, the network security staff of the school have a registered
URL schoolwifi.edu. On 17 September 2017, the following email was mass
distributed to all the Computer Science students of Class XI. The email claimed
that the password of the students was about to expire. Instructions were given to
go to URL to renew their password within 24 hours.

1
1
a. Do you find any discrepancy in this email? 1
b. What will happen if the student will click on the given URL? 2
c. Write any two points to avoid such incident.
d. Is the email an example of cyber crime? If yes, then specify which type
of cyber crime is it. Justify your answer.
OR
Q35 Read the passage given below and answer the questions:

Our digital footprints can be created and used with or without our knowledge. It
includes websites we visits, e-mais we send , and any information we submit
online etc. along with the compiler’s IP address, location and other device specific
details. Such data could be used for targeted advertisement or could also be
misused or exploited. Thus, it is good to be aware of the data trail we might be
leaving behind. This awareness should make us cautious about what we write,
upload or even browse online.

a. What are digital foot prints?


b. What are two types of digital footprints?
c. Can a digital footprint be completely erased or deleted?
d. How can employers or colleges use digital footprints during the selection
process?
e. Where are digital footprints stored?
Marking Scheme 2023-2024
Class :XI
Subject: Computer Science(083)

Section A Marks
1. b. True 1
2. b. Anti Virus 1
3. a. K[5]= "e" 1
4. c. RAM 1
5. c. XOR 1
6. b. American Standard code for Information Interchange 1
7. b. (22,44,66) 1
8. (i) Options a,c,d only 1
9. c. import math 1
print(math.pow(12,4))
10 a. 18 1
.
11 a. del D1["input"] 1
.
12 a. copyright infringement 1
.
13 c. To create targeted advertisements based on user interests 1
.
14 b. True 1
. True
15 c. Trojan Horse 1
.
16 c. To prevent environmental pollution and health hazards 1
.
17 d. A is False but R is True 1
.
18 a. Both A and R are True and R is the correct explanation of A. 1
.
Section B
19 Interpreter: a, c 1 mark each for
. Compiler: b, d correct
identification of
options for
Interpreter and
compiler
OR OR
a. UTF 8 and UTF 32 ½ mark each for
correct
encoding
scheme.
b. PB,TB,GB,KB 1

20 A = int(input("Enter First Number: ")) ½ mark for each


B = int(input("Enter Second Number: ")) correction
Op = input("Enter Operator") #Error 1
if Op = ="+": # Error 2
C=A+B
elif Op == "-": # Error 3
C=A-B
else: #Error 4
C = "Invalid operator entered"
print("Result = ",C)
21 Implicit Type Conversion Explicit Type Conversion (½ mark for
. Also known as coercion Also called type casting each correct
Data type conversion is done automatically by Data type conversion is explicitly explanation of
Python and is not instructed by the done by programmer. Implicit type
programmer. conversion and
Example: Example: explicit type
num1 = 10 #num1 is an integer num1 = 10 conversion)
num2 = 20.0 #num2 is a float num2 = 20 ( ½ mark for
sum1 = num1 + num2 #sum1 is sum of a num3 = num1 + num2 each correct
#float and an integer print(num3) example of
print(sum1) print(type(num3)) Implicit type
print(type(sum1)) num4 = float(num1 + num2) conversion and
print(num4) explicit type
print(type(num4) conversion)
OR
OR
1
a. 0 ==(2==3) 1
b. 3+(4==4)+5==9

22 a. General Public Licence ½+½


. Intellectual Property Right
b. (i) Inform Himanshu so that he may change his password. 1
23 a. 1903 1
. b. 562.54 1
OR

24 a. 3#4#5# 2
.
OR
½ *4=2
a. 9
b. 1024
c. 27.2
d. 3

25 G1=A+B 1 mark for (A+B)


. G2=(AB)’ 1 mark for (AB)’
G3=(A+B)(AB)’
Section C
26 str1=input("Enter a string") ½ -Input
L=[] ½-loop
length=len(str1) 1-if
for i in range(length): ½- adding to
if str1[i].isupper(): list
L.append(i) ½ for print
print(L)

OR
½-split words
Str1="Ubuntu is an Open Source Operating System" ½-loop
L=Str1.split() 1-if
for word in L: ½ -print in
if word[0]=='O': reverse order
print(word[::-1],end=" ") ½ – print
else: normally
print(word,end=" ")
27 ½ -start, stop
. ½-Initialization
of sum
½-Input
½ for each
Loop and
Checking the
number is
greater than
0
½- print

28 ND-*34 ½*6=3
.
29 a. make , use or sell (any 2) ½+½=1
b. Oversharing can have several consequenses:
a. Privacy risks: When you share too much personal information online, you may
inadvertently expose yourself to identity theft, fraud, or other forms of cybercrime. 1+1
b. Cyberstalking and harassment: Oversharing can make you more vulnerable to
cyberstalking, online harassment, or even real-life threats if someone with malicious
(any two
intent gains access to your personal information.
c. Employment and Academic consequences: Employers and educational institutions points )
may review social media profiles during the hiring or admissions process.
d. Targeted Advertising and data mining: Social media platforms and other companies
often use the data you share to target you with advertisements and promotions.

30 units=int(input("Enter the number of units")) ½- input units


if(units>=0 and units<=49): ½ -for each
bill=units*0.50 if..elif
elif(units>=50 and units<=99): i.e 2 marks
bill=units*0.75 ½ -for
print(bill) calculating
elif(units>=100 and units<=199): surcharge
bill=units*1.20
elif(units>=200):
bill=units*1.50
surcharge=bill*0.20
totalBill=surcharge+bill
print("The Surcharge is",surcharge)
print("The Total bill is",totalBill)
Section D
31 a. 3 times 2
b. Str1=" Programming" 2
l=len(Str1)
i=0
while i<l:
print(Str1[i])
i=i+1

32 a. round(): It is a built-in Python function used to round a floating-point (½ mark for


number to a specified number of decimal places. The round() function takes each correct
two arguments: the first is the number you want to round, and the second explanation of
(optional) argument is the number of decimal places you want to round to. If built-in
the second argument is not provided, the number is rounded to the nearest functions
whole number. round() and
Example:>>>round(3.7) evaluates to 4 int())
( ½ mark for
int():It is a built-in Python function used to convert a real number to an each correct
integer (a whole number without any decimal points). When you pass a example of
floating-point number to int(), it truncates the decimal part and returns the round() and
whole number component. int())
Example:>>>int(3.7) evaluates to 3

b. (i) import math


1
f1=math.sqrt(a*a+b*b+c*c)
(ii) import math
1
f2=p+q/(math.pow((r+s),4))
Section E
33 a. (i) 11 1
(ii) True 1
('progra', 'm', 'ming is Fun') 1

½ – loop
b. str1="VaSudhaiva KutumBakam"
½ - isupper()
uc=0
½ -islower()
lc=0 ½-for counting
for i in str1: characters
if i.isupper():
uc=uc+1
elif i.islower():
lc=lc+1
print("Upper Case Characters=",uc)
print("Lower Case Characters=",lc)
34 a. dict_1={"2":"Two","3":"Three","5":"Five","7":"Seven","11":"Eleven"} 1
b. dict_1.keys() 1
c. "7" in dict_1 1
d. print(dict_1["5"]) 1
1
e. pop() can delete an item with a chosen key while popitem will remove only
the last entered item from the dictionary.
Example: dict_1.popitem() returns ('11', 'Eleven')
dict_1.pop('2') returns 'Two'
OR
a. Patna 1
b. dict_keys(['Karnataka', 'Haryana', 'Sikkim', 'Bihar']) 1
c. dict_items([('Karnataka', 'Bangalore'), ('Haryana', 'Chandigarh'), ('Sikkim', 1
'Gangtok'), ('Bihar', 'Patna')])
d. 4 1
e. False 1
35 (a) Yes, There is a discrepancy as the domain spelling is different in the mail. 1
(b) Clicking on the link may install malware on the laptop which record all the
keys pressed and send to hacker. 1
(c) Points:
1
1. Do not click on any link or download any file from untrusted source
2. Do not respond or provide any information to unknown source.

(d) Yes, email is an example of cyber crime. It is a type of email spoofing as here
fake email address is used and students presumes it to be from an authentic
source. 2
OR
1
(a) A digital footprint refers to the trail of data and information that individuals
leave behind while using the internet. It includes all the actions, interactions,
and content they create or engage with online. This data can be collected,
stored, and analyzed by various entities, including websites, social media
platforms, advertisers, and even governments 1
(b) Active digital foot prints, Passive digital footprints
(c) It's challenging to completely erase a digital footprint since data can be 1
stored in various databases and archives. However, individuals can take steps
to minimize their digital footprint, such as deleting unnecessary accounts,
requesting data removal from certain platforms, and being cautious about
what they share online.
(d) Employers and colleges might use digital footprints to gain insights into an 1
applicant's character, behaviour, and qualifications. They might review social
media profiles, online portfolios, and professional networking sites to assess
an individual's suitability for a position or academic program. 1
(e) Website servers, social media platforms, search engines, online accounts,
cookies and tracking mechanisms , mobile app.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy