KV NLC Neyveli See 2020-21
KV NLC Neyveli See 2020-21
Part-A M
A
Q.
Section-I R
No K
Attempt any 15 questions from question no 1 to 21.
S
1 ______________ is the term for a program being run by the computer 1
2 51216 = _______2 1
Name the input or output device used to do the following:
3 a) To output audio 1
b) To build 3D models
In Boolean Algebra,
4 A.1= __________ 1
A+1=___________
5 1000002= _____________10 1
Which one is valid relational operator in Python
6 1
i) / ii) = iii) == iv)and
Which of the following can be used as valid variable identifiers in Python?
7 1
i) 4th Sum ii) Total iii) Number# iv) _Data
Identify the mutable data types:
8 1
i) List ii) Tuple iii) Dictionary iv) String
Name the python library need to be imported to invoke following function
9 1
i) sqrt() ii) randint()
1
t1=(2,3,4,5,6)
print(t1.index(4))
10 1
Output is:
i) 4 ii) 5 iii) 6 iv) 2
What is the length of the tuple shown below?
11 1
t=(((('a',1),'b','c'),'d',2),'e',3)
Write a Python Dictionary named class_student with keys: 12101,12102,12103 and
12 1
corresponding values as ‘Rahul’,’Ravi’,’Mahesh’ respectively
If s=”python programming”
13 What will be output of 1
print(s [3:16:3])
Give the output:
from statistics import *
14 M=[1,2,3,4,5,6,7,8,9,10] 1
print(mean(M))
a) Fakers, by offering special rewards or money prize asked for personal information, such as
bank account information
16 1
b) Copy and paste information from the Internet into your report and then organise it
c) The trail that is created when a person uses the Internet.
d) Breaking into computers to read private emails and other files
17 Expand IPR 1
______________ is a security measure that monitors all traffic between the system and outside
18 network and prevents unauthorized data access 1
___________________ is the trail of data we leave behind when we visit any website (or use any
19 online application or portal) to fill-in data or perform any transaction. 1
After a fight with your friend, you did the following activities. Which of these activities is not an
example of cyber bullying?
a) You sent an email to your friend with a message saying that “I am sorry”.
20 b) You sent a threatening message to your friend saying “Do not try to call or talk to me”. 1
c) You created an embarrassing picture of your friend and uploaded on your account on a social
networking site.
A ______________ is a malware, that looks like a legitimate software and once it tricks a user into
21 1
installing it, it acts pretty much like a virus or worm.
2
Section-II
Both the case study based questions are compulsory. Attempt any 4 subparts from each question.
Each question carries 1 mark.
Ms. Naseema is a computer science teacher created a list
List = [12,15,18,19,45,76,11,28,16]
a. She wants to know the number of elements of list. Which function she should use to get
answer. [1]
b. Ms. Naseema want to add two new elements 56,66 in the last.
Which of the following is correct option? [1]
i) List.append(56,66)
ii) List.insert(56,66)
22 iii) List.extend(56,66) 4
iv) List.extend([56,66])
c. Ms. Naseema wants to show her students how to remove all the elements from the list.
Please help her to write the python code for the same. [1]
d. She tried to replace 19 with 99 in the list by following code but got error. Please help her
to write correct code. [1]
List.replace(19,99)
e. How can she display list in descending order? Write the code. [1]
Krishna of class 11 is writing a program to check whether square root of a given number is
prime or not. Some of the code segment is written below. Help him to complete the program.
import ______________ #Line 1
n = int(______________(“Enter a number”)) #Line 2
m = int(math.__________(n)) #Line 3
k = 0
for i in _________(2,m//2+1): #Line 4
if (m%i==0):
k=k+1
23 if (k == 0): 4
print(m,”Which is square root of ”,n,”is Prime number.”)
else:
print(m, “which is square root of ”,n, “is not Prime number.”)
(a) Name the module he should import in Line 1.
(b) Name the function he should use in Line 2 for input.
(c) Name the function to find the square root in Line 3.
(d) Name the function to execute for statement in Line 4.
(e) What will be the output if the value of n is given by user as 16?
Part-B
Section-I
24 Draw the logic circuit for the Boolean expression: F=AB’ +(CD)’ 2
3
26 Write a program that reads a string and check whether it is a palindrome string or not. 2
If L =[10,14,18,22,’four numbers’],
Evaluate and write the output of the following
27 2
I) L[1::3]
II) L[4][0:4]
Pseudocode of the algorithm to display whether a given number is EVEN/ODD is as follows:
PRINT "Enter the Number"
INPUT number
IF number MOD 2 == 0 THEN
28 PRINT "Number is Even" 2
ELSE
PRINT "Number is Odd"
Draw the Flowchart representation of the algorithm
i) ______________ function in list is used to add multiple elements at end of list
32 Write any four safety measures that can reduce the risk of cyber crime 2
a) Sapna received a mail congratulating her on winning an online lottery of rs. 10 lakhs and asked
to make a payment of rs 1000 as fees so that she may get the 10 lakh rupees. She made the
payment to the account given but did not receive any lottery money.
33 What cyber crime was Sapna a victim of? 2
And what action must Sapna now take?
OR
B) Explain phishing.
Section II
What will the output for following code?
S=’Model Exams 2020 XI Computer Science’
L=S.split()
for I in L:
if I[0]==’C’:
34 print(‘CS’) 3
elif I[0]==’E’:
print(‘Experiment’)
elif I.isdigit():
print(‘2021’)
else print(I)
4
What possible outputs(s) are expected to be displayed on screen at the time of execution of the
program from the following code? Also specify the maximum values that can be assigned to each of the
variables Lower and Upper.
import random
AR = [20, 30, 40, 50, 60, 70]
Lower =random.randint (1, 3)
35 3
Upper =random.randint (2, 4)
for K in range(Lower, Upper +1):
print (AR[K],end=”#“)
Write python program to get the PERCENTAGE of a student out of 100 and display related
message based on table below:
PERCENTAGE MESSAGE
80 AND ABOVE CONGRATS! YOU GOT DISTINCTION.
ABOVE 59 AND BELOW 80 YOU PASSED IN FIRST CLASS
ABOVE 34 AND BELOW 60 YOU PASSED IN SECOND CLASS
BELOW 35 FAIL! BETTER LUCK NEXT TIME
Sample Output:
36 Enter your marks: 65 3
YOU PASSED IN FIRST CLASS
OR
Write a program to input a string and check the number of digits and alphabets in it.
Sample output:
Enter a line of text: Class XI exam 2021
No. of alphabets in line: 11
No. of digits in line: 4
Differentiate between Compiler and Interpreter
OR
37 3
Define the following terms:
i. Application software ii. Cache Memory iii. Language processor
Section-III
Identify the type of cyber crime for the following situations:
1. Sabhya quickly downloads a 2-minute clip from the internet explaining the concept of
dictionary in Python. Using video editor, he adds the text “Prepared by Sabhya” in the
downloaded video clip. He then emails the modified video clip to Ahaana.
38 5
This act of Sabhya is an example of:
(a) Fair use (b) Hacking (c) Copyright infringement (d) Cybercrime
2. Ms. Kavita complains that her debit/credit card is safe with her still somebody has
done shopping /ATM transaction on this card.
5
3. A person complains that somebody has created a fake profile of Facebook and
defaming his/her character with abusive comments and pictures.
4. Ravi received an email from First Generic Bank (as shown below). On clicking the link,
he was taken to a site designed to imitate an official looking website. He uploaded
some important information on it.
5. After a fight with your friend, you created an embarrassing picture of your friend and
uploaded on your account on a social networking site.
39 Write a Python Program to find max among three input numbers using if - elif statement 5
Results is a dictionary containing Name and Score of students in key: value pair.
Results= {“A”:240,”B”:340,”C”:350,”D”:280,”E”:370}
40 OR 5