Xi Sample Papers
Xi Sample Papers
General Instructions:
This question paper contains five sections, Section A to E.
All questions are compulsory.
Section A have 18 questions carrying 01 mark each.
Section B has 07 Very Short Answer type questions carrying 02 marks each.
Section C has 05 Short Answer type questions carrying 03 marks each.
Section D has 03 Long Answer type questions carrying 05 marks each.
Section E has 02 questions carrying 04 marks each. One internal choice
is given in Q35 against part c only.
All programming questions are to be answered using Python Language only.
SECTION A
1. Which of following is Which of the following is the smallest unit of data 1
in a computer?
(a) Bit (b) KB (c) Nibble (d) Byte
2. Which of the following is an example of primary memory? 1
(a)Hard Disk (b)RAM
(c)Floppy Disk (c)DVD
3. A gate gives the output as 1 only if the input signal is 0. 1
(a) NOR (b) OR
(c)NOT (d) XOR
4. Given A= “[ 22,4.88,”India”, “T”]” the datatype of A is 1
(a) List (b) String (c) Dictionary (d) Tuple
5. Which of the following is a keyword in Python language? 1
(a) if (b)for
(c) int (d) all above
6. Which of following is valid identifier- 1
(a) NUM (b) 1_Num
(c) F.No (d) False
7. Which of following datatype not supported by python- 1
(a) float (b) Complex
(c) List (D) Date
8. Which of the following is a valid statement in python? 1
(a) name = “bikaner’
(b) num = 1,000
(c) a+b =c
(d) x=”30” +5
1
9. Which of following can be used for making a comment in python- 1
(a) & (b) # (c) @ (d) None of these
10. You should never give out which of the following on the Internet? 1
(a) Your name (b) Your age (c) Your address. (d)All of the above.
Which of the following is the best description of an 'internet troll'? 1
11.
(a) Someone who goes trolling on the internet, moving from place to
place without settling anywhere in a chat room or on a board.
(b) A funny emoticon made to look like a troll.
(c)Another name for a spammer.
(d) Someone who participates in a message board or chat with the intention to
disrupt it in some way.
2
17. Choose correct option : 1
T1=[3,9,0,1,7]
T2=[5,1,0,7,5.5]
Statement A: Output of print (len(T1)==len(T2) is True.
Statement R: method len() returns the number of elements in
the list.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
18. Choose correct option: 1
S1=’CoMPuter SciENce’
S1[0] =S1[0].lower()
Statement A: Above code will generate error.
Statement R: String is mutable by nature.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
SECTION B
19. (a) What will be the output of the following Python code? > 2
>>> print(math.ceil(55.1))
(b) Which python module required to run above code successfully?
20. What is token ? Name various types of token. 2
OR
3
24. Predict the output of the Python code given below: 2
i = 1
while i <
6:
print(i)
if i ==
3:
brea
k i +=
1
25. Write a program calculate and print total and average runs scored by a 2
cricketer in 3 matches.
SECTION C
26. State De Morgan’s laws / theorems and prove using truth table. 3
30. What are common gender and disability issues faced while teaching / using 3
computers in class rooms.
SECTION D
31. Write a python program to calculate factorial of a number. 4
32. Convert the following numbers. 4
(a) ( 100111101 )2 = ( ? )8
(b) ( 127 )10 = ( ? )2
SECTION E
33. (a) Differentiate between list and tuple with example ? 5
(b) Write a python program to input 3 students name and their marks (3+2)
using dictionary. Print the dictionary also.
34. Write the solution for the following problem: 5
(a) How is random.randint(10) different from random.randrange (10)? (3+2)
(b)Write a Python program to generate a random number between 0 to 8.
4
35. (a) What is E-waste management? Discuss proper disposal of used electronic 5
gadgets (3+2)
(b) Write short note on IPR (Intellectual Property Right).
******************************
5
KENDRIYA VIDYALAYA SANGATHAN JAIPUR REGION
Class: XI Session: 2022-23 Computer Science (083)
Answer Key Practice Paper 2 (Theory)
Maximum Marks: 70 Time Allowed: 3
SECTION A
1. (a) Bit
2. (b) RAM
3. (c) NOT
4. (b) String
5. (d) All Above
6. (a) NUM
7. (d) Date
8. (b) bum=1,000
9. (b) #
10. (d) All of the above.
11. (d) Someone who participates in a message board or chat with the intention to
disrupt it in some way.
12. (c) Stalking
13. (b) [7]
14. (b) -3
15. (a) true
16. (c) List
17. (a)
18. (a)
Section B
19 (a) 56
(b) import math
20 Smallest unit in a program is known as token. Examples – int, if , a, num, # etc
OR
c) 82
21 (a) ['CS', 'and', 'IP']
(b) {'stname': 'Ajay', 'age': 27, 'address': 'Bikaner'}
22 (a) Digital Footprints -Digital footprints are the records and traces that
we leave behind as we use the internet.
(b) Cookies are text files with small pieces of data — like a username and
password — that are used to identify your computer as you use a
computer network.
23 Use a firewall, install antivirus, create strong password , don’t share personal
information
6
24 Banana
cherry
OR
1
2
3
25 run1= int (input ("Enter run scored in 1st inning="))
run2= int (input ("Enter run scored in 2nd inning="))
run3= int (input ("Enter run scored in 3rd inning="))
total= run1 +run2 + run2
avg= total/3
print("Total runs=",total)
print("Average Runs= ", avg)
26 3 Marks both theorem and truth table.
(i) (A+B)’ = A’.B’ (ii) (A.B)’ = A’+B’
27 N=100 (No Error)
A= “Number” +”5 “
B= 2*N +20
print(B)
28 #Series -----2,4,8,16, …………….
a=1
n= int (input ("Enter the terms="))
for i in range(n):
a=a*2
print(a, end=",")
29 L=[]
found=False
for i in range(5):
name=input("Enter Name =")
L.append(name)
text=input("Enter name to be searched=")
for i in range(len(L)):
if (text ==L[i]):
found=True
if(found):
print("Name is in List")
else:
print("Name is not in List")
30 Preconceived notions, Lack of interest, Lack of motivation
8
KENDRIYA VIDYALAYA SANGATHAN JAIPUR REGION
Class: XI Session: 2022-23 Computer Science (083)
Practice Paper-3 (Theory)
Maximum Marks: 70 Time Allowed: 3 hours
General Instructions:
1. This question paper contains five sections, Section A to E.
2. All questions are compulsory.
3. Section A have 18 questions carrying 01 mark each.
4. Section B has 07 Very Short Answer type questions carrying
02 marks each.
5. Section C has 05 Short Answer type questions carrying 03
marks each.
6. Section D has 03 Long Answer type questions carrying 05
marks each.
7. Section E has 02 questions carrying 04 marks each. One
internal choice is given in
Q35 against part c only.
8. All programming questions are to be answered using
Python Language only.
SECTION: A
Q.No Question Marks
9
(a) 1 (b) 6/4 (c) 1.5 (d) abc
7. Which of the following will give "Simon" as output? 1
If str1="Hari,Simon,Vinod"
(a) print(str1[-7:-12]) (b) print(str1[-11:-7])
(c) print(str1[-11:-6]) (d) print(str1[-7:-11])
8. What is identity theft? 1
9. Accessing of data in a dictionary is done through 1
: (a)Index (b) value (c) key (d) cell number
10. Which of the following will be the output of the operation? 1
L1=[1,2]
L2=[3,4]
(L1 + L2)*2
(a) [2,4,6,8] (b) [1,2,3,4,1,2,3,4] (c) [1,3,4,4] (d) [3,4,1,2]
11. Which of the following can add a list of elements to a list? 1
(a) append() (b) extend() (c) add() (d) none of these
12. Which of the following is not a type of cyber criminals? 1
(a) Unauthorized account access (b) Email spoofing and spamming
(c) Mass attack using Trojans as botnets (d) Report vulnerability in any system
10
same place. The updated collection will be use the same address for its storage.
Pick an appropriate statement from the given options:
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true and R is not the correct explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
SECTION : B
19. What is output from the following code : 2
(i)range(6) (iii)range(5,20,4)
(ii)range(7,10) (iv)range (12,1,-2)
20. How the pop ( ) function is different from remove( ) function working with list in 2
python ?
OR
What will be the output of the following python code:
(i) a = [12,14,16,18,10]
print(a[-1:1:-2])
(ii) d = {'Name':'Ravi', 'Marks':90}
e = {'Age':16, 'Marks':95}
d.update(e)
print(d)
21. How the internet security is a major issue? Write any two solutions of internet 2
security threats.
22. What is mutable and immutable data objects in Python? Name any one of each 2
type.
23. Identify the valid and invalid identifiers 2
MyDiary, 1num, File123, _Clear, Mynameisking, while, Your.story, If
24. (i)Name the popular micro blogging social networking website 2
ii)To protect a computer from virus, you should install---------in your computer.
A. backup wizard B. disk cleanup
C. antivirus D. disk defragmenter
25. What will be the output of the following Python code? 2
>>>x,y=5,10
>>>x,y=y,x
>>>x,y
a) 5,10 b) 10,10 c) 10,5 d) 5,5
OR
What will be the output of the following code
(i) List1=[13,18,16,16,13,18]
print(List1.index(16))
(ii) Strg=”computer”
print(Strg[ 0: 8 : 2]
SECTION: C
26. Convert the following numbers into their equivalent numbers. 3
(i) (29.75)10 = (………….)2 (ii) (A4B)16 = (….............)10
(iii) (1234)8 = (….........)16
27. Write a Python program to calculate bonus as the following criteria using if- elif 3
statement :
If salary between bonus
0 to 25000 25% of salary
25001 to 35000 15% of salary
35001 to 50000 10% of salary
11
50001 to 75000 05 % of salary
75001 and above nil
OR
What is difference between break and continue statement in Python explain with
example.
28. Go through the program of dictionary in python given below and predict the 3
output of program.
Student={"RollNo":10 , "Name":"Kuku" , "Class":11 , "Age":15}
T=len(Student)
Elm=Student.get("Name")
mylist=Student.items()
print("Length=",T)
print("Specific Element=",Elm)
print("My List=",mylist)
29. Find the output of the following code: 3
>>> L=["These", "are", "a", ["few", "words"], "that", "we", "will", "use"]
>>> print (L[3:4])
>>> print (L[1:4:-1])
>>> print ("few" in L)
>>> print (L[0::2])
>>> print (L[4:])
>>> print (L)
OR
te a program to check number of ‘H’ present in a string:
ALPS HEALS WITHOUT HURTING”
output will be displayed as:
Total number of ‘H’ is: 4
30. Consider the Following conversation and answer the question 3
Person 1:- What’s your name?
Person 2:- Radha
Person 1:- What is the name of your first
school? Person 2 :- Army Public School
Person 1 :- What are your Father and Mother name?
Person 2 :- Krishna and Sarita
Person 1 :- Who is your favorite actor or actress?
Person 2 :- Amitabh
Person 1:- What is the name of your pet
animal? Person 2 :- Tommy
Person 1 :- Where were you born and
when? Person 2:- Ajmer on 15 March 2002
Person 1 :- May I use your Laptop for online banking for fees payment
Person 2 :- Sure
(i) Who may be Victim of Cyber Crime Person1, Person 2 or both?
Justify your answer
(ii) Who is doing Ethical Hacking person1 or person2? Justify your Answer
(iii) Person 2 was using Key Logger software in his computer. What is it?
SECTION: D
31. Write a Python program to input 10 numbers to store in the list and print the 2+2
third largest number. For example, if the entered numbers in the list are List are
36, 25, 14, - 951, 75, - 85, 654, 88, 9521, 657, then output will be
The third largest number is : 654
12
32. What will be the output of the following code 4
i. type(34)
ii. a, b=10,20
a, b= b, a+b
print(a, b)
iii. a=20 + 4j
print(a.real + a.imag)
iv. print(10,20,30, sep=’*’,end=’@’)
SECTION: E
33. What will be the output of the following: 5
(a) [11, 14, 18, 10, 15]
(b) ['P', 'Y', 'T', 'H', 'O', 'N']
(c) L1.insert(0,12)
(d) L1.sort()
(e) L1.remove(14)
(f) L1.append(5)
(g) L2.pop()
(h) L1+L2
(i) L1.extend([12,16,18])
(j) L1*2
34. A code snippet using a dictionary is shown below and What will be the output of 5
the following :
dt={“Apple”:50, “Orange”:40, “Banana”:30 , “Mango”:80}
print(len(dt)) #Statement 1
print(dt.keys()) #Statement 2
print(dt.items()) #Statement 3
print(dt.popitem()) #Statement 4
print(dt.get("Banana")) #Statement5
Evaluate output of all statements.
13
Class: XI Session: 2022-23Computer Science (083)
Answer Key Practice Paper 3 (Theory)
SECTION A
1. (a) Registers 1
2. (c) A.B.C+(B'+C').A 1
3. (c) Optical Mark Reader 1
4. (c) “Hello’ 1
5. (b) Diamond 1
6. (d) abc 1
7. c) print(str1[-11:-6]) 1
8. Identity Theft is a type of fraud that involves using someone else’s identity to steal 1
money or gain other benefits.
9. (c) key 1
10. (b) [1,2,3,4,1,2,3,4] 1
11. (b) extend() 1
12. (d) Report vulnerability in any system 1
13. (d)All the above 1
14. (b) 17 1
15. India 1
16. Python is an interpreted language, which means the source code of a Python 1
program is converted into bytecode that is then executed by the Python virtual
machine.
17. Both A and R are true and R is the correct explanation of A. 1
18. (c)A is true but R is false. 1
SECTION : B
19. What is output from the following code : ½*4=2
(i)range(6) : 0,1,2,3,4,5
(ii)range(7,10) : 7,8,9
(iii)range(5,20,4) : 5,9,13,17
(iv)range (12,1,-2): 12,10,8,6,4,2
20. Pop() will delete last item from a list. Also displaying the deleted item. 1+1=2
Remove() function will delete given item from list.
OR
[10,16]
{'Name': 'Ravi', 'Marks': 95, 'Age': 16}
21. Definition of internet security: 1 Mark 2
two solutions of internet security threats : ½ Marks each
22. Mutable :- That can be modified . example List 1+1=2
Immutable :- That can not be modified . example Tuple, String
23. Valid : MyDiary, File123, _Clear, Mynameisking, If 1+1=2
Invalid=1num, while, Your.story
24. (i) 1. Twitter · 2. Tumblr · 3. Pinterest · 4. Instagram · 5. Facebook · 6. LinkedIn. 1+1=2
ii) C. antivirus
14
25. c) 10,5 1+1=2
OR
2
Cmue
SECTION : C
26. (29.75)10 = 11101.11 1+1+1=
(A4B)16 = 2635 3
(1234)8 = 29C
27. sal=int(input("enter the salary of employee:")) #1/2 mark 3
if (sal <=25000): #1/2 mark
b=sal*.25
elif (sal>25000 and sal <= 35000): #1/2 mark
b=sal*.15
elif (sal>35000 and sal <= 50000): #1/2 mark
b=sal*.10
elif (sal>50000 and sal <= 75000): #1/2 mark
b=sal*.05
else:
b=0
print("Bonus will be: ",b) #1/2 mark
OR
1 mark for break+1/2 mark for example
- Break: it’s a jump statement which forces to skip the remaining statements/
iterations of the loop and exit the loop.
Example : while(True) :
n=int(input(“enter a number and zero to terminate”))
if(n==0):
break
print(n*n)
1 mark for continue+1/2 mark for example
- Continue: it is just opposite to the break statement. As soon as continue is invoked,
the control will return for the next iteration of the loop.
example :
for i in range(1,5):
a= int(input(“enter first number”))
b= int(input(“enter second number”))
c=a+b
if(c<0):
print(“ program continues”)
continue
print(“sum of two numbers:”,c)
16
letter, a digit and a special symbol and the password may be changed at a frequent
time. A good combination of these mixed letters makes a strong password and makes
difficult to crack it. A strong password makes our system safe and secure.
17
KENDRIYA VIDYALAYA SANGATHAN JAIPUR REGION
Class: XI Session: 2022-23 Computer Science (083)
Practice Paper-4 (Theory)
Maximum Marks: 70 Time Allowed:
3 hours
General Instructions:
This question paper contains five sections, Section A to E.
All questions are compulsory.
Section A have 18 questions carrying 01 mark each.
Section B has 07 Very Short Answer type questions carrying 02 marks each.
Section C has 05 Short Answer type questions carrying 03 marks each.
Section D has 03 Long Answer type questions carrying 05 marks each.
Section E has 02 questions carrying 04 marks each. One internal
choice is given in Q35 against part c only.
All programming questions are to be answered using Python Language only.
SECTION A
Q.1 MICR stands for?
(a)Maganetic Ink Character Reader (b) Maganetic Ink Code Reader
(c) Maganetic Ink Caser Reader (d) Maganetic Ink Computer Reader
Q.3 A gate gives the output as 1 only if all the inputs signals are 1.
(a) AND (b) OR
(c)EXOR (d) NOR
Q.4 Which one of the following is the correct extension of the Python file?
(a) .py (b) .python
(c) .p (d) None of these
Q.6 Which of the following operators is the correct option for calculating ab ?
(a) a ^ b (b) a**b
(c) a ^ ^ b (d) a ^ * b
18
(a) a,b,c = 1000 (b) a,b,c = 1000 2000 3000
(c) a,b,c = 1000, 2000, 3000 (d) a_b_c = 1000
Q.9 Operators with the same precedence (except power operator) are evaluated inwhich
manner?
(a) Left to Right (b) Right to Left
(d) Can’t say (d) None of the mentioned
Q.11 What can happen when you give your personal data (email, address, photos
you post…) in exchange for free apps and services?
(i) Nothing can happen. Your data is not allowed to be passed on to anyone
(ii) It isn’t really used, it’s just compulsory to ask for that information
(iii) When giving your email you’re automatically entered in a lottery where you
can win something
(iv) Everything you do online is of value and is used by companies looking
to target their advertising
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the correct
choice as
19
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
SECTION B
Q.19 What will be the output of the following Python code? >
>>>a,b=6,7
>>>a,b=b,a
>>>a,b
a) (6,7) b) Invalid syntax c) (7,6) d) Nothing is printed
OR
Q.23 What measures should one take to avoid and maintain confidentiality
of personal information?
NUMBER= [15,12,19,26,18]
for CNT in range (3,0,-1):
A=NUMBER[CNT]
B=NUMBER[CNT-
1]
print(Vari(A,B),'#', end=' ')
OR
SECTION C
Q.26 Write the truth table for given Boolean expression:
𝐸 = 𝑋. 𝑌(𝑌. 𝑍 + 𝑍¯)
Q.29 Write a program to input names of n students and store them in a tuple.
Also, input a name from the user and find if this student is present in the
tuple or not.
Q.30 What are common gender and disability issues faced while teaching /
using computers in class rooms.
SECTION D
SECTION E
Q.33 Mr. Rajesh Kumar is a teacher in a school. He is doing his work
manually. As a python learner solve the problems of Rajesh Kumar by python
programs:
(i) Create a dictionary student which ask Student roll number, Name and Marks
of students and display them in tabular format.
(ii) Display the names of those students who have secured marks more than 75.
(iii) Delete those students who have secured less than 50 marks
(a)What are cookies? How are they used by websites to track you?
(b)What is confidentiality of information? How do you ensure it
(c)What procedure can be carried out for proper E-Waste disposal.
******************************
22
Practice Paper 4 Answer Key (2022-23)
Computer Science (083) Class: XI
Q Section-A (attempt 8 out of 10) Mark
No. s
1. Magnetic Ink Character Reader (1)
2. Word Processors (1)
3. AND (1)
4. .py (1)
5. Sum (1)
6. a**b (1)
7. List (1)
8. a,b,c= 1000 2000 3000 (1)
9. Left to Right (1)
10. 17 October 2000 (1)
11. Everything you do online is of value and is used by companies looking to (1)
target their advertising
12. Cracking passwords (1)
13. 8 (1)
14. Yes (1)
15. False (1)
16. Elif (1)
17. Both A and R are true and R is the correct explanation for A (1)
18. A is True but R is False (1)
19. (7,6) (2)
20. Integer (2)
Or
(1,2,3,4 )
21. Exami (2)
Or
dict_items([('name', 'Aman'), ('age', 27), ('address', 'Delhi')])
22. Cyber Bullying: use of internet to harm or frighten another (2)
person, especially by sending them unpleasant messages.
Cyber Stalking: Follow the target online by joining the same
groups and forums. Send threatening, controlling, or lewd
messages or emails to the target
23. Restrict access to data. ...Encrypt your data.Implement a (2)
confidentiality
policy. ...Implement a data retention policy. ...
Develop and implement a cybersecurity program Take physical
security
measures. .Non-disclosure agreements.
23
24. 7#7#3# (2)
Or
24
(22,44,66)
25. num=int(input(“Enter a Number”)) (2)
if ( num% 2)==0:
print(“Even Number”)
else:
print(“Odd Number”)
26. X Y Z X YZ (YZ+Z XY(YZ+ (3)
Y ) Z)
0 0 0 0 0 0 0
0 0 1 0 0 1 0
0 1 0 0 0 0 0
0 1 1 0 1 1 0
1 0 0 0 0 0 0
1 0 1 0 0 1 0
1 1 0 1 0 0 0
1 1 1 1 1 1 1
27. (a) x is not defined (3)
25
33. (i) (5)
n = int(input("Enter number of students: "))
result = {}
for i in range(n):
print("Enter Details of student No.", i+1)
rno = int(input("Roll No: "))
name = input("Name: ")
marks = int(input("Marks: "))
result[rno] = [name, marks]
print(result)
(ii)
for student in result:
if result[student][1] > 75:
print(result[student][0])
(iii)
for student in result:
if result[student][1] < 50:
del result[student][0])
34. (a) math. ceil(89.7)' will return 90 whereas 'math. floor(89.7)' (5)
will return 89.
print(random.randrange(10))
35. (a) Cookies are text files with small pieces of data that are used (5)
to identify your computer as you use a computer network.
Specific cookies known as HTTP cookies are used to identify
specific users and improve your web browsing experience.
26
KENDRIYA VIDYALAYA SANGATHAN JAIPUR REGION
Class: XI Session: 2022-23 Computer Science (083)
Practice Paper-5 (Theory)
Maximum Marks: 70 Time : 3 hours
General Instructions:
This question paper contains five sections, Section A to E.
All questions are compulsory.
Section A have 18 questions carrying 01 mark each.
Section B has 07 Very Short Answer type questions carrying 02 marks each.
Section C has 05 Short Answer type questions carrying 03 marks each.
Section D has 03 Long Answer type questions carrying 05 marks each.
Section E has 02 questions carrying 04 marks each. One internal
choice isgiven in Q35 against part c only.
All programming questions are to be answered using Python Language only.
SECTION A
1. OCR stands for? 1
(a) Optical Character Reader (b) Optical Code Reader
(c) Optical Character Recognition (d) Optical Computer Reader
2. Which one of the following is not input device? 1
b) Keyboard (b) Mouse
c) Speaker (d) Scanner
3. Which gate returns true if both inputs are similar otherwise false 1
(a) AND (b) OR
(c) EXOR (d) NOR
4. What is the output of the expression , 5*1**5 1
(a) 125 (b) 25
(c) 5 (d) 1
5. Which character is used in Python to make a single line 1
comment? (a) / (b) //
(c) * (d) #
6. Which of the following is an invalid identifier? 1
(a) my_file (b) myfile13
c) My.File (d) Myfile
7. if L= [ ‘My Score’,95.2, 2022], which data type in Python is used? 1
a. List
b. String
c. Dictionary
d. Tuple
8. Which statement is true from following- 1
a. List is immutable & Tuple is mutable
b. List is mutable & Tuple is immutable
c. Both are mutable
d. Both are immutable
27
9. Which type of value is returned by the input() function. 1
a. integer
b. float
c. string
d. no value
a. Yes
b. No
c. May be
d. Don’t Know
15. Predict the output of the following code: 1
Var=5
if Var>4 OR VAR<6 AND Var==10
print(“Good”)
else:
print(“Not Good”)
28
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct
choice as
(a) Both A and R are true and R is the correct explanation for A
(n) Both A and R are true and R is not the correct explanation for A
(o) A is True but R is False
(p) A is false but R is True
17. Choose correct option : 1
Dic1={ ’A’:’CS’, ‘B’:’IP’}
Dic2={ ’B’:’IP’, ‘A’:’CS’}
Statement 1: Output of print (Dic1==Dic2) is True.
Statement 2: Dictionary is a collection of key-value pairs. It is not a
sequence.
SECTION B
19. What will be the output of the following Python code? 2
>>>x,y=5,10
>>>x,y=y,x
>>>x,y
20. What will be the output of the following Python code? 2
>>> a=’OK-BYE’
>>> a*=2
>>> a
21. (a) Given is a Python string declaration: 2
exam="##KVS Examination 2022##"
Write the output of:
print(exam[2:6])
(b) Write the output of the code given below:
Dict1 = {"name": "RAM", "age": 26}
Dict1['age'] = 27
Dict1['address'] = "JAIPUR"
print(Dict1.items())
22. Define the term : 2
(a) Hackers
(b) Crackers
23. Name the online activities which would help you detect that your friend is 2
being cyber bulled.
24. Predict the output of the Python code given below: 2
(a) X=range(1,10,2)
for i in X:
print(i)
(b) X,Y=17,4
print (X//Y)
print(X/Y)
29
30
25. Write a Python program to input a number print its Square if it is odd, 2
otherwise print its square root. (use import math function)
SECTION C
26. Draw logic circuit for given Boolean expression: 3
F(A,B,C) = A’B+AB+B’C
27. Find the error in the following code and rewrite corrected code: 3
25=Val
for I in the range(0,Val)
if I%2==0:
print( I+1)
Else:
print (I‐1
28. Write a python program to print a sum of series up to 10 integers using for 3
loop.
29. Write a program to input a list of numbers and find the smallest and largest 3
number from the list.
30. What are the benefits of e-waste recycling? 3
SECTION D
31. Write a python program to accept a string and replace all space by ‘$’ symbol. 4
32. Convert the following number system. 4
(a) (11011.10 )2 into ()10
(b) (11100.1010)2 in to ()16
(c) (10AF)16 into ()2
(d) (A42)16 into ()8
SECTION E
33. Write a program to create a dictionary to input total number of sections and 5
class teacher’s name of a class 11 and display all information on the output
screen.
34. Which string method is used to implement the following: 5
a. To count the number of characters in the string
b. To change the first character of the string in capital letter
c. To change lowercase to uppercase letter
d. To check whether the given character is letter or a number
e. To replace all the occurrences of the old string with the new string.
35. Explain the following: 5
Open-Source Software and Proprietary Software
OR
Active and Passive digital footprint
******************************
31
KENDRIYA VIDYALAYA SANGATHAN JAIPUR REGION
Class: XI Session: 2022-23 Computer Science (083)
Answer Key Practice Paper-5 (Theory)
SECTION A
1. (c) Optical Character Recognition 1
2. c) Speaker 1
3. (d) NOR 1
4. (c) 5 1
5. (d) # 1
6. (c) My.File 1
7. List 1
8. b. List is mutable & Tuple is immutable 1
9. String 1
10. d) Open Source Initiative 1
11. Cyber-bullying 1
12. (i) Tracking 1
13. b) 3 1
14. Yes 1
15. A. Good 1
16. b. if…elif 1
17. (a) Both A and R are true and R is the correct explanation for A 1
18. ( C) A is True but R is False 1
SECTION B
19. c) (10,5) 2
20. c) OK-BYEOK-BYE 2
21. a) KVS 2
B)
dict_items([('name', 'RAM'), ('age', 27), ('address', JAIPUR')])
22. Hackers and Crackers : Hackers are most often programmers. Hackers are 2
people who hack devices and systems with good intentions. They might hack a
system for a specified purpose or for obtaining more knowledge out of it.
Crackers: Crackers are people who hack a system by breaking into it and
violating it with some bad intentions. They may hack a system remotely for
stealing the contained data or for harming it permanently. Crackers can easily
be identified because their actions are malicious.
1 mark each for explain the terms
23. Cyberbullying can include: 2
Sending mean texts or IMs to someone
Pranking someone’s cell phone
Hacking into someone’s gaming or social networking profile
Being rude or mean to someone in an online game
Spreading secrets or rumours about people online
Pretending to be someone else to spread hurtful messages online
1 mark each for at least two activities
32
24. Predict the output of the Python code given 2
below: 1,3,5,7,9
4
4.25
1 mark for each correct output
25. #program to input a number print its square if it is odd otherwise print its 2
square root.
import math
num=int(input("enter a number : "))
if (num%2!=0):
print("The given number",num, "is odd so its square is :",num*num)
else:
print ("The given number",num, "is even so its square root is :", math.sqrt (num))
2 mark for correct python code
SECTION C
26. Logic circuit for given Boolean expression: 3
33
output:
how many elements to be entered: 5
enter elements : 1
enter elements : 2
enter elements : 5
enter elements : 4
enter elements : 3
Largest element in the list is 5
Smallest element in the list is 1
SECTION D
31. # python program to accept a string and replace all space by ‘$’ symbol. 4
output:
enter a string :I love my india
The replaced string is: I$love$my$india
3 mark for correct python code and 1 mark for output
32. 27.50 4
1C.A
0001000010101111
5102
output:
34
Enter total number of section in xi class2
enter section :Science
enter class teacher name :Sunil
enter section :Humanities
enter class teacher name :Jyoti
Class Section Teacher Name
XI Science Sunil
XI Huminities Jyoti
3 mark for correct python code and 2 mark for output and documentation.
34. a. len(str) 5
b. str.capitalize( )
c. str.upper( )
d. ch.isalnum( )
e. str.replace()
Proprietary software is any software that is copyrighted and bears limits against
use, distribution and modification that are imposed by its publisher, vendor or
developer. Proprietary software remains the property of its owner/creator and is
used by end-users/organizations under predefined conditions.
OR
A passive digital footprint is created when data is collected without the owner
knowing. A more personal aspect of your passive digital footprint is your search
history, which is saved by some search engines while you are logged in.
******************************
35