0% found this document useful (0 votes)
86 views12 pages

Xi SPL Computer SC Sample Paper

Uploaded by

wrk07864
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views12 pages

Xi SPL Computer SC Sample Paper

Uploaded by

wrk07864
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

(2022 -–25

SAMPLE QUESTION PAPER 2024 23)


CLASS- XI
SUB : COMPUTER SCIENCE
Time Allowed: 3 Hours Maximum Marks : 70 Marks

General Instructions :
1. This question paper contains five sections : Section A to E .
2. All questions are compulsory .
3. Section A have 18 questions carrying 01 mark each .
4. Section B has 07 Very Short Answer type questions carrying 02 marks each .
5. Section C has 05 Short Answer type questions carrying 03 marks each .
6. Section D has 03 Long Answer type questions carrying 05 marks each .
7. Section E has 02 questions carrying 04 marks each . One internal choice is given in
Q34 against part (iii) only .
6. All programming questions are to be answered using Python Language only .

Question Marks
SECTION - A
No. Allocated
1 State True or False 1

“ Python code can run on a variety of platforms. “

2 Consider the given expression: 1

"Python" or True and "Programming" or not 70

Which of the following will be correct output if the given


expression is evaluated ?

(a) True (b) False (c) ‘Python’ (d) ‘Programming’


3 16 TB is equivalent to : 1

(a) 214 KB (b) 214 MB (c) 214 PB (d) 214 GB


4 What shape represents a decision in a flowchart ? 1

(a) A diamond (b) A rectangle


(c) An oval (d) A parallelogram
5 Add the binary numbers (110111.01)2 + (1101.1001)2 , and 1
find out the result ?

(a) (1001001.1101)2 (b) (1000100.1101)2


(c) (1010011.1011)2 (d) (1101100.0111)2
6 Using someone else’s twitter handle to post something , will be 1
termed as :

(a) Fraud (b) Identity theft


(c) Online stealing (d) Violation
7 Choose the correct octal number for the given hexadecimal 1
number (EB4A)16 .

(a) (156521)8 (b) (166321)8


(c) (165512)8 (d) (156412)8
8 ___________ are attempts by individuals to obtain confidential 1
information from you to falsifying their identity .

(a) Computer viruses (b) Phishing scams


(c) Phishing trips (d) Spyware scams
9 Choose the correct dual of the Boolean expression : 1

(A+0).(A.1.A’)

(a) (A+1)+(A+0+A’) (b) (A.1)+(A.0.A’)


(c) (A.1)+(A+0+A’) (d) (A+0)+(A+1+A’)
10 When the OS creates temporary RAM on the Hard Drive it is 1
known as _______________ .

(a) Virtual Memory (b) Cache


(c) Registering (d) Defragmenting
11 Select the equivalent Boolean expression from the following 1
options for the logic circuit given below :
(a) (A+ B + C) . A + (B’ . C’)
(b) (A.B.C) + A+ B’ + C’
(c) (A+ B + C) . A’ + (B . C)
(d) (A.B.C) + A.(B’ + C’)
12 Select the correct output of the code : 1

>>> S = "1welcome 2the Worlds of Wonder"


>>> S.title()

(a) '1Welcome 2the worlds of wonder'


(b) '1Welcome 2the Worlds of Wonder'
(c) '1WELCOME 2THE WORLDS OF WONDER'
(d) '1Welcome 2The Worlds Of Wonder'
13 Given a List 1
L = [25, 35, 43, 22, 13, 56, 45, 78, 90]

Identify the statement from the list below that will produce the
result as [25, 43, 13, 45, 90]

(a) print(L[::]) (b) print(L[0:9:1])


(c) print(L[::2]) (d) print(L[2:0:9])
14 Suppose T is a tuple . Which of the following statement(s) 1
would give an error after executing the following code ?

T = (100,101,-89,45)

print(sum(T)) #Statement 1
print(T.sort()) #Statement 2
x, y, z, w = T #Statement 3
print(sorted(T)) #Statement 4

(a) Statement 1
(b) Statement 2
(c) Statement 3
(d) Statement 4
15 It is a small text file on the user’s computer where visited 1
websites store own information about a user .

(a) Spam (b) Malware (c) Cookies (d) Adware


16 Which of the following will delete the key_value pair for key = 1
"tiger" in dictionary ?

di = {"loin" : "wild", "tiger" : "wild", "cat" : "domestic" , "dog"


: "domestic"}

(a) del di["tiger"]


(b) delete(d1["tiger" : "wild"])
(c) delete(di.["tiger"])
(d) del(di.["tiger])
Q17 and Q18 are ASSERTION AND REASONING based questions .
Mark the correct choice as
(a) Both A and R are True and R is the correct explanation for A
(b) Both A and R are True and R is not the correct explanation for A
(c) A is True but R is False
(d) A is False but R is True
17 Assertion (A) :- A break statement continues the loop if it lies 1
within a loop.
Reasoning (R) :- The else clause of a Python loop executes
only when the loop ends normally , not when the loop is
terminating because of a break statement .
18 Assertion (A) :- Plagiarism is stealing someone else’s 1
intellectual work and representing it as your own work without
giving credit to creator .
Reasoning (R) :- Plagiarism encourages individuals to create
new software and promotes investment in the national economy
.
SECTION - B
19 Rewrite the following code in Python after removing all syntax 2
error(s). Underline each correction done in the code.

25=Val
for I in the range(0,Val)
if I%2=0:
print( I+1)
Else:
print (I-1)

20 Predict the output of the Python code given below: 2

L = [1,2,3,4,5,6,2,3,4]
del L[2]
L.remove(4)
L.pop(3)
print(L)
L.append(9)
L.insert(3,10)
print(L)

OR
Predict the output of the Python code given below:

L = [100,50,60,90,40,10,30,20,80,70]
L.pop()
L.sort()
print(L)
L[3] = 50
L1 = L.count(200)
L.insert(0,L1)
print(L)

21 Correct the following Boolean statements : 2

(a) X + 1 = X
(b) (A’)’ = A’
(c) A + A’ = 0
(d) (A + B)’ = A.B
22 What is SOC ? How is it different from CPU and why it is 2
considered for better development ?
23 What possible outputs(s) are expected to be displayed on 2
screen at the time of execution of the program from the
following code? Also specify the maximum values that can be
assigned to each of the variables Lower and Upper.

import random
AR=[20,30,40,50,60,70];
Lower =random.randint(1,3)
Upper =random.randint(2,4)
for K in range(Lower, Upper +1):
print (AR[K],end=”#“)

(i) 10#40#70# (ii) 30#40#50#


(iii) 50#60#70# (iv) 40#50#70#

24 Nibedita has recently shifted to new city and new school . She 2
does not know many people in her new city and school . But all
of a sudden , someone is posting negative , demeaning
comments on her social networking profile , school site’s
forum etc.
She is also getting repeated mails from unknown people .
Everytime she goes online , she finds someone chasing her
online .
(a) What is this happening to Nibedita ?
(b) What action should she taken to stop them ?
OR

Robin wanted to gift his friend a football or a wrist watch . So


he searched for many sports items and wrist watches online .
But after that everytime he goes online , his web browser
shows him advertisements about sports items and wrist watches
.
(a) Why is this happening ?
(b) How can Robin get rid of this now ?
25 What do you understand by e – waste management ? Explain 2
the benefits of e – waste recycling .

OR

What are intellectual property rights ? Why should intellectual


property rights be protected ?
SECTION – C
26 (a) Predict the output of the Python code given below: 1+2

a={}
a[2]=1
a[1]=[2,3,4]
print(a[1][1])

(b) Write a program using dictionary to count the frequency of


each character in a given string .

Example :

If the string is given as : i like python programming

OUTPUT :

{'i': 3, ' ': 3, 'l': 1, 'k': 1, 'e': 1, 'p': 2, 'y': 1, 't': 1, 'h': 1, 'o': 2, 'n': 2,
'r': 2, 'g': 2, 'a': 1, 'm': 2}

27 Predict the output of the Python code given below: 3

str="Exam@7PM"
m=""
for i in range(0,len(str)):
if(str[i].isupper()):
m=m+str[i].lower()
elif str[i].islower():
m=m+str[i].upper()
else:
m=m+"#"
print(m)

OR

Predict the output of the Python code given below:

Text = "Pattern123"
L=len(Text)
ntext= ""
for i in range(0,L):
if Text[i].isupper():
ntext = ntext + Text[i].lower()
elif Text[i].isalpha():
ntext=ntext + Text[i].upper()
else:
ntext=ntext + '@'
print(ntext)

28 Write a program in Python that accepts a string as input and 3


removes all the vowels from that string . Also , the program
should print the changed string .

Example :

Enter a string :computer science

OUTPUT :

The changed string without vowels : cmptr scnc

29 (a) What can be done to reduce the risk of identity theft ? Write 3
any two ways .
(b) Enumerate any two disability issues while teaching and
using computers .
(c) Differentiate between open source and open data .
30 Write the program in Python to shift the negative numbers to 3
right and the positive numbers to left so that the resultant list
will be as follows :

Example :

Original list is : [-2, 1, -3, -15, 16, -17, 5, -3, -6]


Output should be :

New List : [1, 16, 5, -6, -3, -17, -15, -3, -2]

OR

Write a program to accept a list of numbers from the user . Find


the position and number of occurrence of a number in the list .

Example :

If the input is given as :


Enter list elements :[2,5,6,7,2,4,5,6,7]
Element the element that you wants to search : 2

OUTPUT :

The element 2 is present at


0 position , 4 position , and for 2 no. of times

SECTION - D
31 (a) Write a Python Program to input an integer number from 3
the user and find the sum of digits of that integer number .

Example :

Enter number :345

OUTPUT :

Sum of digits : 12

(b) Write a Python Program to print the Fibonacci series for nth
number of terms . 2

Example :

Enter how many terms :7

OUTPUT :

0 1 1 2 3 5 8

32 (a) Write a python program to input a string having some digits 3+2
and alphabets and calculate the sum of digits and alphabets
present in that string .

For example :

Enter a string :I love2 python34 progr2amming

Output :

The total number of digits : 4


The total number of alphabets : 22

(b) Write the output of the code given below :

mySubject = 'Computer Science'


print(mySubject[::2])
print(mySubject[-7:-1])
print(mySubject.isalpha())
print(mySubject.find('te'))

OR

(a) Write a program in python that reads a string and checks


whether it is a palindrome string or not without using string
slicing .

(b) Write the output of the code given below :

myAddress = "WZ-1,New Ganga Nagar,New Delhi"


print(myAddress.split(','))
print(myAddress.index('ag'))
print(myAddress.find('wz'))
print(myAddress.lstrip('Z-1W'))

33 (a) Write the use of popitem() in dictionary . 5

(b) Write a Python Program to input name , department and


salary of 3 employees from the user and store them in a
dictionary . Display all the employee names , departments and
salaries separately .

OR

(a) Write the use of setdefault() in dictionary .

(b) Write a program to create a third dictionary from two


dictionaries having some common keys , in way so that the
values of common keys are added in the third dictionary .

Example :

If two dictionaries are as follows :

dct1 = {1 : 100 , 2 : 200 , 3 : 300}


dct2 = {1 : 300 , 2 : 200 , 5 : 400}

OUTPUT :

The resultant dictionary : {1: 400, 2: 400, 3: 300, 5: 400}

SECTION - E
34 Yagnesh a fruit seller, who sales the seasonal fruits . 1+1+2

In Summer days , he sales Fruits like : 'Mango' , 'Papaya' ,


'Watermelon' ,'Pineapple', 'Litchi' .
In Winter days , he sales Fruits like : 'Orange' , 'Pear',
'Pomegranate', 'Kiwi' , 'Pineapple' .
He also planned to sale the Rainy season Fruits like : 'Jamun',
'Peaches' ,'Cherries' .

He wants to perform some operations on these Fruits . As a


programmer , help him to successfully execute the given task .

Total_Fruits = [ ]
Summer_Fruits = ['Mango' , 'Papaya' , 'Watermelon',
'Pineapple', 'Litchi']
Winter_Fruits = ['Orange' , 'Pear', 'Pomegranate', 'Kiwi' ,
'Pineapple']
print("Summer Season Fruits :", Summer_Fruits)
print("Winter Season Fruits :", Winter_Fruits)

sumwin_Fruits = [Summer_Fruits , Winter_Fruits]

Total_Fruits.append(sumwin_Fruits)

Rainy_Fruits = ['Jamun','Peaches','Cherries']
Total_Fruits________________ #Statement1
print("The Fruitseller has : ",Total_Fruits)
print()
print("One of the Rainy season Fruit : ",
Total_Fruits[1][1]) #Statement2
print()
__________________ #Statement3

print("Summer_Fruits sorted in Ascending order : ",


Summer_Fruits)
print()
_________________________ #Statement4

print("Winter Fruits sorted in Descending order : ",


Winter_Fruits)
del Total_Fruits[0:3] #Statement5

print("The Fruitseller has sold all his fruits : ", Total_Fruits)

(i) Help Yagnesh to add the rainy season fruits named as


“Rainy_Fruits” at the second position of the Total_Fruits in
Statement1 .

(ii) What will be the output of Statement2 .

(iii) At the end of each day , he sales all of his fruits and he
returns back home with empty Fruit basket and smiley face .
Write an appropriate statement in Statement5 to empty his
Fruit basket . Write an appropriate statement to destroy the
basket also .

OR(Option for Part iii only)

(iii) Yagnesh wants to arrange the Summer season fruits


alphabetically in ascending order . Guide him to make his work
easier in Statement3 .
He then wants to arrange the Winter season fruits
alphabetically in descending order . Assist him to complete his
work in Statement4 .

35 RAJESH works as a security consultant in XYZ Solutions. One 1+1+2


of his clients (ABC Bank) complained that the network of their
bank is behaving very slowly. Data transfer is also taking a lot
of time. PCs have slowed down. After proper investigation,
RAJESH found that a very dangerous program is running in the
network system which is self-replicating itself and eating up all
the resources. Further in the PCs, there is a type of program
which is tracking all the usage details of the computers
including keystrokes and system logs. The data usage details of
the systems are also being sent to the developer of the malware.
RAJESH further noticed that, someone has tampered the
physical wire of the network to gain access to the
communication medium illegally.

(i) Name the self replicating malicious program propagated


over this network.

(ii) The program that tracks the usage of the system without the
knowledge of the owner is __________________.

(iii) Name the cyber crime, where the physical communication


medium of an organization is tampered. How Rajesh can
protect the bank systems from malicious programs?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy