0% found this document useful (0 votes)
244 views35 pages

Xi Sample Papers

Computer science

Uploaded by

sukithepcdoc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
244 views35 pages

Xi Sample Papers

Computer science

Uploaded by

sukithepcdoc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

KENDRIYA VIDYALAYA SANGATHAN JAIPUR REGION

Class: XI Session: 2022-23 Computer Science (083)


Practice Paper-2 (Theory)

hour Maximum Marks: 70 Time Allowed: 3


s

General Instructions:
 This question paper contains five sections, Section A to E.
 All questions are compulsory.
 Section A have 18 questions carrying 01 mark each.
 Section B has 07 Very Short Answer type questions carrying 02 marks each.
 Section C has 05 Short Answer type questions carrying 03 marks each.
 Section D has 03 Long Answer type questions carrying 05 marks each.
 Section E has 02 questions carrying 04 marks each. One internal choice
is given in Q35 against part c only.
 All programming questions are to be answered using Python Language only.
SECTION A
1. Which of following is Which of the following is the smallest unit of data 1
in a computer?
(a) Bit (b) KB (c) Nibble (d) Byte
2. Which of the following is an example of primary memory? 1
(a)Hard Disk (b)RAM
(c)Floppy Disk (c)DVD
3. A gate gives the output as 1 only if the input signal is 0. 1
(a) NOR (b) OR
(c)NOT (d) XOR
4. Given A= “[ 22,4.88,”India”, “T”]” the datatype of A is 1
(a) List (b) String (c) Dictionary (d) Tuple
5. Which of the following is a keyword in Python language? 1
(a) if (b)for
(c) int (d) all above
6. Which of following is valid identifier- 1
(a) NUM (b) 1_Num
(c) F.No (d) False
7. Which of following datatype not supported by python- 1
(a) float (b) Complex
(c) List (D) Date
8. Which of the following is a valid statement in python? 1
(a) name = “bikaner’
(b) num = 1,000
(c) a+b =c
(d) x=”30” +5

1
9. Which of following can be used for making a comment in python- 1
(a) & (b) # (c) @ (d) None of these

10. You should never give out which of the following on the Internet? 1
(a) Your name (b) Your age (c) Your address. (d)All of the above.
Which of the following is the best description of an 'internet troll'? 1
11.
(a) Someone who goes trolling on the internet, moving from place to
place without settling anywhere in a chat room or on a board.
(b) A funny emoticon made to look like a troll.
(c)Another name for a spammer.
(d) Someone who participates in a message board or chat with the intention to
disrupt it in some way.

12. In which of the following, a person is constantly followed/chased by another 1


person or group of several peoples?

(a) Phishing (b) Bulling (c) Stalking (d) Identity theft


13. Find the output of the following code- 1
number= [1,5,7,0,4]
print(number[2:3])
(a) [5]
(b) [7]
(c) [7,0]
(d) None of above
14. What is output of following code segment- 1
T= min(1,6,0,-3,100)
(a) 1 (b) -3 (c) 0 (d) None of above

15. Predict the output of the following code: 1


a=5
a+=100
if(a<100):
print(“false”)
else:
print(“true”)

(a) true ( b ) false (c) no output (d) none of these


16. Which of these is not a primitive or fundamental data types? 1
(a) integer ` (b) Boolean
(c) List (d) String
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct
choice as
(a) Both A and R are true and R is the correct explanation for A
(h) Both A and R are true and R is not the correct explanation for A
(i) A is True but R is False
(j) A is false but R is True

2
17. Choose correct option : 1
T1=[3,9,0,1,7]
T2=[5,1,0,7,5.5]
Statement A: Output of print (len(T1)==len(T2) is True.
Statement R: method len() returns the number of elements in
the list.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
18. Choose correct option: 1
S1=’CoMPuter SciENce’
S1[0] =S1[0].lower()
Statement A: Above code will generate error.
Statement R: String is mutable by nature.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
SECTION B
19. (a) What will be the output of the following Python code? > 2
>>> print(math.ceil(55.1))
(b) Which python module required to run above code successfully?
20. What is token ? Name various types of token. 2

OR

What will be the output of the following Python code?


>>> a=72.55
>>> b=10
>>> c=int(a+b )
>>> c
a) 72.55 b) 72 c) 82 d) None of these

21. (a) Write the output of following code segment. 2


str= “ CS and IP"
a=str.split()
print(a)

(b) Write the output of the code given


below: dict = {"stname": "Ajay", "age":
17} dict['age'] = 27
dict['address'] = "Bikaner"
print(dict)

22. Define the term: 2


(a) Digital Footprints
(b) Cookies
23. What measures should one take to avoid and maintain confidentiality of 2
personal information?

3
24. Predict the output of the Python code given below: 2

fruits = ["apple",”mango”, "banana",


"cherry"] for x in fruits:
if(len(x)>5)
: print(x
)
OR

Predict the output of the Python code given below:

i = 1
while i <
6:
print(i)
if i ==
3:
brea
k i +=
1
25. Write a program calculate and print total and average runs scored by a 2
cricketer in 3 matches.
SECTION C
26. State De Morgan’s laws / theorems and prove using truth table. 3

27. Rewrite following code after removing errors (if any): 3


N=100
A= “Number” +5
B= 2N +20
Print(B)
28. Write a program to print following series – 3
2,4,8,16, …………….
29. Write a program to input names of 5 employee and store them in a List. Now 3
enter name of an employee and find if this employee is present in the List or
not.

30. What are common gender and disability issues faced while teaching / using 3
computers in class rooms.

SECTION D
31. Write a python program to calculate factorial of a number. 4
32. Convert the following numbers. 4
(a) ( 100111101 )2 = ( ? )8
(b) ( 127 )10 = ( ? )2
SECTION E
33. (a) Differentiate between list and tuple with example ? 5
(b) Write a python program to input 3 students name and their marks (3+2)
using dictionary. Print the dictionary also.
34. Write the solution for the following problem: 5
(a) How is random.randint(10) different from random.randrange (10)? (3+2)
(b)Write a Python program to generate a random number between 0 to 8.

4
35. (a) What is E-waste management? Discuss proper disposal of used electronic 5
gadgets (3+2)
(b) Write short note on IPR (Intellectual Property Right).

******************************

5
KENDRIYA VIDYALAYA SANGATHAN JAIPUR REGION
Class: XI Session: 2022-23 Computer Science (083)
Answer Key Practice Paper 2 (Theory)
Maximum Marks: 70 Time Allowed: 3

SECTION A
1. (a) Bit
2. (b) RAM
3. (c) NOT
4. (b) String
5. (d) All Above
6. (a) NUM
7. (d) Date
8. (b) bum=1,000
9. (b) #
10. (d) All of the above.
11. (d) Someone who participates in a message board or chat with the intention to
disrupt it in some way.
12. (c) Stalking
13. (b) [7]
14. (b) -3
15. (a) true
16. (c) List
17. (a)
18. (a)
Section B
19 (a) 56
(b) import math
20 Smallest unit in a program is known as token. Examples – int, if , a, num, # etc
OR
c) 82
21 (a) ['CS', 'and', 'IP']
(b) {'stname': 'Ajay', 'age': 27, 'address': 'Bikaner'}
22 (a) Digital Footprints -Digital footprints are the records and traces that
we leave behind as we use the internet.
(b) Cookies are text files with small pieces of data — like a username and
password — that are used to identify your computer as you use a
computer network.
23 Use a firewall, install antivirus, create strong password , don’t share personal
information

6
24 Banana
cherry
OR
1
2
3
25 run1= int (input ("Enter run scored in 1st inning="))
run2= int (input ("Enter run scored in 2nd inning="))
run3= int (input ("Enter run scored in 3rd inning="))
total= run1 +run2 + run2
avg= total/3
print("Total runs=",total)
print("Average Runs= ", avg)
26 3 Marks both theorem and truth table.
(i) (A+B)’ = A’.B’ (ii) (A.B)’ = A’+B’
27 N=100 (No Error)
A= “Number” +”5 “
B= 2*N +20
print(B)
28 #Series -----2,4,8,16, …………….
a=1
n= int (input ("Enter the terms="))
for i in range(n):
a=a*2
print(a, end=",")
29 L=[]
found=False
for i in range(5):
name=input("Enter Name =")
L.append(name)
text=input("Enter name to be searched=")
for i in range(len(L)):
if (text ==L[i]):
found=True
if(found):
print("Name is in List")
else:
print("Name is not in List")
30 Preconceived notions, Lack of interest, Lack of motivation

Unavailability of teaching material / aids, Lack of special needs teachers, Lack


of supporting curriculum
31 n= int (input ("Enter the Number="))
f=1
for i in range(1,n+1):
f=f*i
print("Factorial=",f)
7
32 (a) 475
(b) 1111111
33 (a) List is collection of items enclosed with[]. Tuple is collection of
items enclosed with(). List is mutable . Tuple is immutable.
L=[1,4,5,6,2] is a list
T=(3,5,4,1,8) is a tuple.
(b) student={}
n=3
i=1
while(i<=n):
a=input("enter student name=")
b=input("enter marks")
student[a]=b
i=i+1
print(student)
34 (a) randint() when we want to generate a random number from an
inclusive range.
randrange() when we want to generate a random number within a range by
specifying the increment. It produces a random number from an exclusive
range.
(b) import random
a=random.randint(0,8)
print(a)
35 (a) Electronic waste or e-waste describes discarded electrical or electronic
devices. Used electronics which are destined for refurbishment, reuse, resale,
salvage recycling through material recovery, or disposal are also considered e-
waste. Informal processing of e-waste in developing countries can lead to
adverse human health effects and environmental pollution.
We should Recycle it.
(b) Intellectual property (IP) is a category of property that includes intangible
creations of the human intellect. There are many types of intellectual property,
The best-known types are copyrights, patents, trademarks, and trade secrets.

8
KENDRIYA VIDYALAYA SANGATHAN JAIPUR REGION
Class: XI Session: 2022-23 Computer Science (083)
Practice Paper-3 (Theory)
Maximum Marks: 70 Time Allowed: 3 hours

General Instructions:
1. This question paper contains five sections, Section A to E.
2. All questions are compulsory.
3. Section A have 18 questions carrying 01 mark each.
4. Section B has 07 Very Short Answer type questions carrying
02 marks each.
5. Section C has 05 Short Answer type questions carrying 03
marks each.
6. Section D has 03 Long Answer type questions carrying 05
marks each.
7. Section E has 02 questions carrying 04 marks each. One
internal choice is given in
Q35 against part c only.
8. All programming questions are to be answered using
Python Language only.

SECTION: A
Q.No Question Marks

1. Components that provide internal storage to the CPU is: 1


(a) Registers (b) Program Counters
Controller (d) Internal Chips
2. The boolean expression of following logic circuit is : 1

(a) (A+B).C'+B (b) A'B'+C+B'A


(c) A.B.C+(B'+C').A (d) A+B+C'(A+B)
3. Full form of OMR is: 1
(a) Optical Mark Reading (b) Optical Mark Recognition
(c) Optical Mark Reader (d) Optical Mark Resolution
4. Which of the following is not valid string in Python? 1
(a) “Hello” (b) ‘Hello’
(c) “Hello’ (d) None of the Above
5. What shape represents a decision in a flow chart? 1
(a)Oval (b) Diamond (c) Rectangle (d) Arrow
6. What will be the output of above Python code? 1
abc="6/4"
print("abc")

9
(a) 1 (b) 6/4 (c) 1.5 (d) abc
7. Which of the following will give "Simon" as output? 1
If str1="Hari,Simon,Vinod"
(a) print(str1[-7:-12]) (b) print(str1[-11:-7])
(c) print(str1[-11:-6]) (d) print(str1[-7:-11])
8. What is identity theft? 1
9. Accessing of data in a dictionary is done through 1
: (a)Index (b) value (c) key (d) cell number
10. Which of the following will be the output of the operation? 1
L1=[1,2]
L2=[3,4]
(L1 + L2)*2
(a) [2,4,6,8] (b) [1,2,3,4,1,2,3,4] (c) [1,3,4,4] (d) [3,4,1,2]
11. Which of the following can add a list of elements to a list? 1
(a) append() (b) extend() (c) add() (d) none of these
12. Which of the following is not a type of cyber criminals? 1
(a) Unauthorized account access (b) Email spoofing and spamming
(c) Mass attack using Trojans as botnets (d) Report vulnerability in any system

13. Which of the following can be termed as Cyber Bullying: 1


a) Posting Rumors online
b) Posting hate speech
c) Posting sexual remarks
d) All the above
14. How many asterisks does the following code 1
fragment print?
a=3
while a < 20:
print('*')
a += 1
(a)16 (b) 17 (c) 18 (d) 20
15. What is the output of the following? 1
>>>print('INDIA'.capitalize())
16. ‘Python is an interpreted high level language’. What does it mean to you? 1
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct
choice as
(a) Both A and R are true and R is the correct explanation for A
(k) Both A and R are true and R is not the correct explanation for A
(l) A is True but R is False
(m) A is false but R is True
17. Assertion (A) : Comments are non-executable statements that enable the users to 1
understand the program logic.
Reason (R) : They are basically statements used to put remarks. The comments
are used to explain the code and to make it more informative for the users.
Pick an appropriate statement from the given options:
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true and R is not the correct explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
18. Assertion (A) : In Python, the tuple is an immutable collection of data. 1
Reason (R) : It means that any change or alteration in data, is mentioned in the

10
same place. The updated collection will be use the same address for its storage.
Pick an appropriate statement from the given options:
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true and R is not the correct explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
SECTION : B
19. What is output from the following code : 2
(i)range(6) (iii)range(5,20,4)
(ii)range(7,10) (iv)range (12,1,-2)
20. How the pop ( ) function is different from remove( ) function working with list in 2
python ?
OR
What will be the output of the following python code:
(i) a = [12,14,16,18,10]
print(a[-1:1:-2])
(ii) d = {'Name':'Ravi', 'Marks':90}
e = {'Age':16, 'Marks':95}
d.update(e)
print(d)
21. How the internet security is a major issue? Write any two solutions of internet 2
security threats.
22. What is mutable and immutable data objects in Python? Name any one of each 2
type.
23. Identify the valid and invalid identifiers 2
MyDiary, 1num, File123, _Clear, Mynameisking, while, Your.story, If
24. (i)Name the popular micro blogging social networking website 2
ii)To protect a computer from virus, you should install---------in your computer.
A. backup wizard B. disk cleanup
C. antivirus D. disk defragmenter
25. What will be the output of the following Python code? 2
>>>x,y=5,10
>>>x,y=y,x
>>>x,y
a) 5,10 b) 10,10 c) 10,5 d) 5,5
OR
What will be the output of the following code
(i) List1=[13,18,16,16,13,18]
print(List1.index(16))
(ii) Strg=”computer”
print(Strg[ 0: 8 : 2]
SECTION: C
26. Convert the following numbers into their equivalent numbers. 3
(i) (29.75)10 = (………….)2 (ii) (A4B)16 = (….............)10
(iii) (1234)8 = (….........)16
27. Write a Python program to calculate bonus as the following criteria using if- elif 3
statement :
If salary between bonus
0 to 25000 25% of salary
25001 to 35000 15% of salary
35001 to 50000 10% of salary

11
50001 to 75000 05 % of salary
75001 and above nil
OR
What is difference between break and continue statement in Python explain with
example.

28. Go through the program of dictionary in python given below and predict the 3
output of program.
Student={"RollNo":10 , "Name":"Kuku" , "Class":11 , "Age":15}
T=len(Student)
Elm=Student.get("Name")
mylist=Student.items()
print("Length=",T)
print("Specific Element=",Elm)
print("My List=",mylist)
29. Find the output of the following code: 3
>>> L=["These", "are", "a", ["few", "words"], "that", "we", "will", "use"]
>>> print (L[3:4])
>>> print (L[1:4:-1])
>>> print ("few" in L)
>>> print (L[0::2])
>>> print (L[4:])
>>> print (L)
OR
te a program to check number of ‘H’ present in a string:
ALPS HEALS WITHOUT HURTING”
output will be displayed as:
Total number of ‘H’ is: 4
30. Consider the Following conversation and answer the question 3
Person 1:- What’s your name?
Person 2:- Radha
Person 1:- What is the name of your first
school? Person 2 :- Army Public School
Person 1 :- What are your Father and Mother name?
Person 2 :- Krishna and Sarita
Person 1 :- Who is your favorite actor or actress?
Person 2 :- Amitabh
Person 1:- What is the name of your pet
animal? Person 2 :- Tommy
Person 1 :- Where were you born and
when? Person 2:- Ajmer on 15 March 2002
Person 1 :- May I use your Laptop for online banking for fees payment
Person 2 :- Sure
(i) Who may be Victim of Cyber Crime Person1, Person 2 or both?
Justify your answer
(ii) Who is doing Ethical Hacking person1 or person2? Justify your Answer
(iii) Person 2 was using Key Logger software in his computer. What is it?
SECTION: D
31. Write a Python program to input 10 numbers to store in the list and print the 2+2
third largest number. For example, if the entered numbers in the list are List are
36, 25, 14, - 951, 75, - 85, 654, 88, 9521, 657, then output will be
The third largest number is : 654

12
32. What will be the output of the following code 4
i. type(34)
ii. a, b=10,20
a, b= b, a+b
print(a, b)
iii. a=20 + 4j
print(a.real + a.imag)
iv. print(10,20,30, sep=’*’,end=’@’)
SECTION: E
33. What will be the output of the following: 5
(a) [11, 14, 18, 10, 15]
(b) ['P', 'Y', 'T', 'H', 'O', 'N']
(c) L1.insert(0,12)
(d) L1.sort()
(e) L1.remove(14)
(f) L1.append(5)
(g) L2.pop()
(h) L1+L2
(i) L1.extend([12,16,18])
(j) L1*2
34. A code snippet using a dictionary is shown below and What will be the output of 5
the following :
dt={“Apple”:50, “Orange”:40, “Banana”:30 , “Mango”:80}
print(len(dt)) #Statement 1
print(dt.keys()) #Statement 2
print(dt.items()) #Statement 3
print(dt.popitem()) #Statement 4
print(dt.get("Banana")) #Statement5
Evaluate output of all statements.

35. a) What do you mean by Cyber safety? 1+2+2


b) What are different types of threats to computer security?
c) What is the need for secure password? How can one make a strong password?

13
Class: XI Session: 2022-23Computer Science (083)
Answer Key Practice Paper 3 (Theory)
SECTION A

1. (a) Registers 1
2. (c) A.B.C+(B'+C').A 1
3. (c) Optical Mark Reader 1
4. (c) “Hello’ 1
5. (b) Diamond 1
6. (d) abc 1
7. c) print(str1[-11:-6]) 1
8. Identity Theft is a type of fraud that involves using someone else’s identity to steal 1
money or gain other benefits.
9. (c) key 1
10. (b) [1,2,3,4,1,2,3,4] 1
11. (b) extend() 1
12. (d) Report vulnerability in any system 1
13. (d)All the above 1
14. (b) 17 1
15. India 1
16. Python is an interpreted language, which means the source code of a Python 1
program is converted into bytecode that is then executed by the Python virtual
machine.
17. Both A and R are true and R is the correct explanation of A. 1
18. (c)A is true but R is false. 1
SECTION : B
19. What is output from the following code : ½*4=2
(i)range(6) : 0,1,2,3,4,5
(ii)range(7,10) : 7,8,9
(iii)range(5,20,4) : 5,9,13,17
(iv)range (12,1,-2): 12,10,8,6,4,2
20. Pop() will delete last item from a list. Also displaying the deleted item. 1+1=2
Remove() function will delete given item from list.
OR
[10,16]
{'Name': 'Ravi', 'Marks': 95, 'Age': 16}
21. Definition of internet security: 1 Mark 2
two solutions of internet security threats : ½ Marks each
22. Mutable :- That can be modified . example List 1+1=2
Immutable :- That can not be modified . example Tuple, String
23. Valid : MyDiary, File123, _Clear, Mynameisking, If 1+1=2
Invalid=1num, while, Your.story
24. (i) 1. Twitter · 2. Tumblr · 3. Pinterest · 4. Instagram · 5. Facebook · 6. LinkedIn. 1+1=2
ii) C. antivirus

14
25. c) 10,5 1+1=2
OR
2
Cmue
SECTION : C
26. (29.75)10 = 11101.11 1+1+1=
(A4B)16 = 2635 3
(1234)8 = 29C
27. sal=int(input("enter the salary of employee:")) #1/2 mark 3
if (sal <=25000): #1/2 mark
b=sal*.25
elif (sal>25000 and sal <= 35000): #1/2 mark
b=sal*.15
elif (sal>35000 and sal <= 50000): #1/2 mark
b=sal*.10
elif (sal>50000 and sal <= 75000): #1/2 mark
b=sal*.05
else:
b=0
print("Bonus will be: ",b) #1/2 mark

OR
1 mark for break+1/2 mark for example
- Break: it’s a jump statement which forces to skip the remaining statements/
iterations of the loop and exit the loop.
Example : while(True) :
n=int(input(“enter a number and zero to terminate”))
if(n==0):
break
print(n*n)
1 mark for continue+1/2 mark for example
- Continue: it is just opposite to the break statement. As soon as continue is invoked,
the control will return for the next iteration of the loop.
example :
for i in range(1,5):
a= int(input(“enter first number”))
b= int(input(“enter second number”))
c=a+b
if(c<0):
print(“ program continues”)
continue
print(“sum of two numbers:”,c)

28. Length= 4 1+1+1=


Specific Element= Kuku 3
My List= dict_items([('RollNo', 10), ('Name', 'Kuku'), ('Class', 11), ('Age', 15)])
29. [['few', 'words']] ½*6=3
[]
False
['These', 'a', 'that', 'will']
['that', 'we', 'will', 'use']
['These', 'are', 'a', ['few', 'words'], 'that', 'we', 'will', 'use']
OR
15
"HEALPS HEALS WITHOUT HURTING"
0
i in s:
f i=="H":
n=n+1
nt(n)
30. (iv) Both may be the victim of Cyber Crime because these are the common security 1+1+1=
answers a normal user sets and your system can be hacked by person 2 3
We should not do financial transaction using other’s computer because your
personal information may be revealed to person 1
Person 2 is doing Ethical Hacking by asking personal information
Key Logger is a software/Hardware that records you key strokes.
SECTION : D
31. #students may use their own logic also. 4
L=list()
for i in range (10):
k=int(input("Enter a number :"))
L.append(k)
L.sort()
print ("List is ", L)
print ("The third largest number is :", L[-3])
- 1M for inputting 10 numbers to store in list
- 2M for method for finding third largest
- 1M for printing third largest

32. Int 1*4=4


20,30
24.0
10*20*30@
SECTION : E
33. (k) [11,14,18,10,15] ½ x10
(l) [‘P’, ‘Y’, ‘T’, ‘H’, ‘O’, ‘N’] =5
(m) [12,11,14,18,10,15]
(n) [10, 11, 12, 14, 15, 18]
(o) [10, 11, 12, 15, 18]
(p) [10, 11, 12, 15, 18, 5]
(q) 'N'
(r) [10, 11, 12, 15, 18, 5, 'P', 'Y', 'T', 'H', 'O']
(s) [10, 11, 12, 15, 18, 5, 12, 16, 18]
(t) [10, 11, 12, 15, 18, 5, 12, 16, 18, 10, 11, 12, 15, 18, 5, 12, 16, 18]
34. dt={“Apple”:50, “Orange”:40, “Banana”:30 , “Mango”:80} 1*5=5
Statement 1= 4
Statement 2 = dict_keys(['Apple', 'Orange', 'Banana', 'Mango'])
Statement 3= dict_items([('Apple', 50), ('Orange', 40), ('Banana', 30), ('Mango', 80)])
Statement 4= ('Mango', 80)
Statement5=30
35. a) Cyber Safety refers to the safe and responsible use of Internet to ensure safety and 1+2+2=
security of personal information and not posing threat to anyone else’s information. 5

b) Some common threats are:


Viruses, Spyware, Adware, Spamming, PC Intrusion (Denial of service, Sweeping,
Password guessing), Phishing
c) A strong password may be created mixing an upper-case letter, a lower-case

16
letter, a digit and a special symbol and the password may be changed at a frequent
time. A good combination of these mixed letters makes a strong password and makes
difficult to crack it. A strong password makes our system safe and secure.

17
KENDRIYA VIDYALAYA SANGATHAN JAIPUR REGION
Class: XI Session: 2022-23 Computer Science (083)
Practice Paper-4 (Theory)
Maximum Marks: 70 Time Allowed:
3 hours

General Instructions:
 This question paper contains five sections, Section A to E.
 All questions are compulsory.
 Section A have 18 questions carrying 01 mark each.
 Section B has 07 Very Short Answer type questions carrying 02 marks each.
 Section C has 05 Short Answer type questions carrying 03 marks each.
 Section D has 03 Long Answer type questions carrying 05 marks each.
 Section E has 02 questions carrying 04 marks each. One internal
choice is given in Q35 against part c only.
 All programming questions are to be answered using Python Language only.

SECTION A
Q.1 MICR stands for?
(a)Maganetic Ink Character Reader (b) Maganetic Ink Code Reader
(c) Maganetic Ink Caser Reader (d) Maganetic Ink Computer Reader

Q.2 Which of the following is not an example of system software?


(a) Language Translator (b)Utility Software
(c) Communication Software (d)Word Processors

Q.3 A gate gives the output as 1 only if all the inputs signals are 1.
(a) AND (b) OR
(c)EXOR (d) NOR

Q.4 Which one of the following is the correct extension of the Python file?
(a) .py (b) .python
(c) .p (d) None of these

Q.5 Which of the following is not a keyword in Python language?


(a) for (b)if
(c) try (d) sum

Q.6 Which of the following operators is the correct option for calculating ab ?
(a) a ^ b (b) a**b
(c) a ^ ^ b (d) a ^ * b

Q.7 What is data type of L if L= [ 1,’Python’,2.5]


(a) List (b) String
(c)Dictionary (d) Tuple

Q.8 Which of the following is an invalid statement?

18
(a) a,b,c = 1000 (b) a,b,c = 1000 2000 3000
(c) a,b,c = 1000, 2000, 3000 (d) a_b_c = 1000

Q.9 Operators with the same precedence (except power operator) are evaluated inwhich
manner?
(a) Left to Right (b) Right to Left
(d) Can’t say (d) None of the mentioned

Q.10 IT Act of the Indian Parliament notified on


(i) 17 January 2001 (ii) 25 October 2002
(iii)17 October 2000 (iv) 25 April 2000

Q.11 What can happen when you give your personal data (email, address, photos
you post…) in exchange for free apps and services?

(i) Nothing can happen. Your data is not allowed to be passed on to anyone
(ii) It isn’t really used, it’s just compulsory to ask for that information
(iii) When giving your email you’re automatically entered in a lottery where you
can win something
(iv) Everything you do online is of value and is used by companies looking
to target their advertising

Q.12 What is the most important activity in system hacking?


(i) Information gathering (ii) Cracking passwords
(iii) Escalating privileges (iv) Covering tracks

Q.13 Find the output of the following


word=”green vegetables”
print(word.find(‘veg’,2)
(a) 8 (b) 6
(c)10 (d) 12

Q.14 Does Python supports Exit-Controlled Loop?


(a) Yes (b) No
(c) May be (d) Don’t Know

Q.15 Predict the output of the following


code: x,y=2,4
if(x+y= =10):
print(“true”)
else:
print(“false”)
(a) true (b)false (c) no output (d)none

Q.16 What keyword you use to add an alternative condition to an if statement?


(a) else if (b) false (c) elif (d) None of the above

Q17 and 18 are ASSERTION AND REASONING based questions. Mark the correct
choice as
19
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True

Q.17 Choose correct option:


D1= {’ A’:’CS’, ‘B’:’IP’}
D2= { ’B’:’IP’, ‘A’:’CS’}
A: Output of print (D1==D2) is True.
R: Dictionary is a collection of key-value pairs. It is not a sequence.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True

Q.18 Choose correct option:


S1=’python’
S1[0] =S1[0].upper( )
A: Above code will generate error.
R: String is mutable by nature.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True

SECTION B

Q.19 What will be the output of the following Python code? >
>>>a,b=6,7
>>>a,b=b,a
>>>a,b
a) (6,7) b) Invalid syntax c) (7,6) d) Nothing is printed

Q.20 What is the data type of (1)?

a) Tuple b) Integer c) List d) Both tuple and integer

OR

What will be the output of the following Python code?


>> a=(1,2)
>>> b=(3,4)
>>> c=a+b
>>> c

(a) (4,6) (b) (1,2,3,4 )


(c) Error as tuples are immutable (d) None

Q.21 Given is a Python string declaration:


(a) myexam="@@CBSE Examination 2022@@"

Write the output of: print(myexam[6:12])


20
(b) Write the output of the code given
below: my_dict = {"name": "Aman",
"age": 26} my_dict['age'] = 27
my_dict['address'] = "Delhi"
print(my_dict.items())

Q.22 Define the term:


(a) Cyber bullying
(b) Cyber Stalking

Q.23 What measures should one take to avoid and maintain confidentiality
of personal information?

Q.24 Predict the output of the Python code given


below: def Vari(C1,C2):
if C1>C2:
return C1-C2
else:
return C2-C1

NUMBER= [15,12,19,26,18]
for CNT in range (3,0,-1):
A=NUMBER[CNT]
B=NUMBER[CNT-
1]
print(Vari(A,B),'#', end=' ')

OR

Predict the output of the Python code given below:

KV = (11, 22, 33, 44, 55 ,66)


NVS =list(KV)new_list = []
for i in KV:
if i%2==0:
new_list.append(i)
new_tuple = tuple(new_list)
print(new_tuple)

Q.25 Write a program to check a number whether it is even or odd. ?

SECTION C
Q.26 Write the truth table for given Boolean expression:
𝐸 = 𝑋. 𝑌(𝑌. 𝑍 + 𝑍¯)

Q.27 Find the error in the following code:


(a) y = x +5 (b) a=input(“Value: “) (c) print(x = y =
5) print(x, y) b = a/2
print( a, b)
21
Q.28 Write a program to input temperature in Celsius and convert it
into Fahrenheit using the formula: F = C * 9 / 5 + 32

Q.29 Write a program to input names of n students and store them in a tuple.
Also, input a name from the user and find if this student is present in the
tuple or not.

Q.30 What are common gender and disability issues faced while teaching /
using computers in class rooms.
SECTION D

Q.31 Write a program to calculate digits and letters in a string.


Q.32 Convert the following number
system. ( 10011111 )2 = ( ? )16 = ( ? )10
= ( ? )8

SECTION E
Q.33 Mr. Rajesh Kumar is a teacher in a school. He is doing his work
manually. As a python learner solve the problems of Rajesh Kumar by python
programs:

(i) Create a dictionary student which ask Student roll number, Name and Marks
of students and display them in tabular format.
(ii) Display the names of those students who have secured marks more than 75.
(iii) Delete those students who have secured less than 50 marks

Q.34 Write the solution for the following problem:


(a) How is math. ceil (89.7) different from math. floor (89.7)?
(b)Write a Python program to generate random number between 0 and 9.

Q.35 Explain the following:

(a)What are cookies? How are they used by websites to track you?
(b)What is confidentiality of information? How do you ensure it
(c)What procedure can be carried out for proper E-Waste disposal.

******************************

22
Practice Paper 4 Answer Key (2022-23)
Computer Science (083) Class: XI
Q Section-A (attempt 8 out of 10) Mark
No. s
1. Magnetic Ink Character Reader (1)
2. Word Processors (1)
3. AND (1)
4. .py (1)
5. Sum (1)
6. a**b (1)
7. List (1)
8. a,b,c= 1000 2000 3000 (1)
9. Left to Right (1)
10. 17 October 2000 (1)
11. Everything you do online is of value and is used by companies looking to (1)
target their advertising
12. Cracking passwords (1)
13. 8 (1)
14. Yes (1)
15. False (1)
16. Elif (1)
17. Both A and R are true and R is the correct explanation for A (1)
18. A is True but R is False (1)
19. (7,6) (2)
20. Integer (2)
Or
(1,2,3,4 )
21. Exami (2)
Or
dict_items([('name', 'Aman'), ('age', 27), ('address', 'Delhi')])
22. Cyber Bullying: use of internet to harm or frighten another (2)
person, especially by sending them unpleasant messages.
Cyber Stalking: Follow the target online by joining the same
groups and forums. Send threatening, controlling, or lewd
messages or emails to the target
23. Restrict access to data. ...Encrypt your data.Implement a (2)
confidentiality
policy. ...Implement a data retention policy. ...
Develop and implement a cybersecurity program Take physical
security
measures. .Non-disclosure agreements.

23
24. 7#7#3# (2)

Or

24
(22,44,66)
25. num=int(input(“Enter a Number”)) (2)
if ( num% 2)==0:
print(“Even Number”)
else:
print(“Odd Number”)
26. X Y Z X YZ (YZ+Z XY(YZ+ (3)
Y ) Z)
0 0 0 0 0 0 0
0 0 1 0 0 1 0
0 1 0 0 0 0 0
0 1 1 0 1 1 0
1 0 0 0 0 0 0
1 0 1 0 0 1 0
1 1 0 1 0 0 0
1 1 1 1 1 1 1
27. (a) x is not defined (3)

(b) unsupported operand type(s) for /: 'str' and 'int'

(c) invalid syntax


28. celsius = float(input("Enter temperature in (3)
celsius: ")) fahrenheit = (celsius * 9/5) + 32
print('%.2f Celsius is: %0.2f Fahrenheit' %(celsius,
fahrenheit))
29. n = int(input("Enter the number of students: ")) (3)
list1 = [ ]
for i in range(n):
name = input()
list1.append(name)
tuple1 = tuple(list1)
findName = input("Enter name to find: ")
for item in tuple1:
if item==findName:
print("Name found")
else:
print("Name not found")
30. there can be one or more disabilities: (3)
(i) Locomotor disabilities – Severe deformities, polio, leprosy, cerebral palsy.
(ii) Hearing and speech disabilities – Hearing impairment, speech aphasia.
(iii) Cognitive impairment – Specific learning deficits (Dyslexia, Dyscalculia).
Down’s syndrome, Autism.
(iv) Vision impairment. low vision, blindness.
31. String =”python1234” (4)
total_digits = 0
total_letters = 0
for s in string:
if s.isnumeric():
total_digits += 1
else:
total_letters += 1
print(“Total Letters found :-“,total_letters)
print(“total digits found:-“,total_digits)
32. 9F16=15910=2378 (4)

25
33. (i) (5)
n = int(input("Enter number of students: "))
result = {}
for i in range(n):
print("Enter Details of student No.", i+1)
rno = int(input("Roll No: "))
name = input("Name: ")
marks = int(input("Marks: "))
result[rno] = [name, marks]
print(result)
(ii)
for student in result:
if result[student][1] > 75:
print(result[student][0])
(iii)
for student in result:
if result[student][1] < 50:
del result[student][0])
34. (a) math. ceil(89.7)' will return 90 whereas 'math. floor(89.7)' (5)
will return 89.

(b) import random


for i in range(10):

print(random.randrange(10))
35. (a) Cookies are text files with small pieces of data that are used (5)
to identify your computer as you use a computer network.
Specific cookies known as HTTP cookies are used to identify
specific users and improve your web browsing experience.

(b) Data confidentiality is about protecting data against


unintentional, unlawful, or unauthorized access, disclosure, or
theft.We can ensure it by Shared documents in a secure way,Use
anti-virus software, Install a firewall, Password-protect important files
and systems. ...
(c)
Recycling: complete segregation of parts and materials that is
then used to build new electronic products.
Refurbishing: reuse of the working, good quality products to replace
parts and extend the life of other electronic equipment.
Land filling. This is the most common method of
electronic waste disposal. ...
Incineration. A controlled combustion process wherein e-waste
is burned in an incinerator unit.

26
KENDRIYA VIDYALAYA SANGATHAN JAIPUR REGION
Class: XI Session: 2022-23 Computer Science (083)
Practice Paper-5 (Theory)
Maximum Marks: 70 Time : 3 hours

General Instructions:
 This question paper contains five sections, Section A to E.
 All questions are compulsory.
 Section A have 18 questions carrying 01 mark each.
 Section B has 07 Very Short Answer type questions carrying 02 marks each.
 Section C has 05 Short Answer type questions carrying 03 marks each.
 Section D has 03 Long Answer type questions carrying 05 marks each.
 Section E has 02 questions carrying 04 marks each. One internal
choice isgiven in Q35 against part c only.
 All programming questions are to be answered using Python Language only.
SECTION A
1. OCR stands for? 1
(a) Optical Character Reader (b) Optical Code Reader
(c) Optical Character Recognition (d) Optical Computer Reader
2. Which one of the following is not input device? 1
b) Keyboard (b) Mouse
c) Speaker (d) Scanner
3. Which gate returns true if both inputs are similar otherwise false 1
(a) AND (b) OR
(c) EXOR (d) NOR
4. What is the output of the expression , 5*1**5 1
(a) 125 (b) 25
(c) 5 (d) 1
5. Which character is used in Python to make a single line 1
comment? (a) / (b) //
(c) * (d) #
6. Which of the following is an invalid identifier? 1
(a) my_file (b) myfile13
c) My.File (d) Myfile
7. if L= [ ‘My Score’,95.2, 2022], which data type in Python is used? 1
a. List
b. String
c. Dictionary
d. Tuple
8. Which statement is true from following- 1
a. List is immutable & Tuple is mutable
b. List is mutable & Tuple is immutable
c. Both are mutable
d. Both are immutable

27
9. Which type of value is returned by the input() function. 1
a. integer
b. float
c. string
d. no value

10. OSI stands for 1


a) Open Source Index
b) Open Source Image
c) Open Source Instant
d) Open Source Initiative
11. Pooja’s classmate sent her a message on Facebook “You are a Loser”. Pooja is 1
victim of :-
a) Phishing
b) Trolling
c) Cyber-bullying
d) Criticis
12. Which is not a cyber crime? 1
(i) Tracking
(ii)Phishing
(iii) Ransomware
(iv) Hacking
13. Find the output of the following 1
str=”My School”
print(str.find(‘School’,2)
(d) 4
(e) 3
(f) 7
(d) 9
14. Does Python support any empty or null statement? 1

a. Yes
b. No
c. May be
d. Don’t Know
15. Predict the output of the following code: 1
Var=5
if Var>4 OR VAR<6 AND Var==10
print(“Good”)
else:
print(“Not Good”)

a. Good b . Not Good c. no output d. none


16. Which statement is used for checking multiple conditions in Python? 1

a. else if b. if…elif c. switch d. None of the above

28
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct
choice as
(a) Both A and R are true and R is the correct explanation for A
(n) Both A and R are true and R is not the correct explanation for A
(o) A is True but R is False
(p) A is false but R is True
17. Choose correct option : 1
Dic1={ ’A’:’CS’, ‘B’:’IP’}
Dic2={ ’B’:’IP’, ‘A’:’CS’}
Statement 1: Output of print (Dic1==Dic2) is True.
Statement 2: Dictionary is a collection of key-value pairs. It is not a
sequence.

18. Choose correct option: 1


Str1=’python’
Str1[0] =Str1[0].upper()
Statement 1: Above code will generate error.
Statement 2: String is mutable by nature.

SECTION B
19. What will be the output of the following Python code? 2
>>>x,y=5,10
>>>x,y=y,x
>>>x,y
20. What will be the output of the following Python code? 2
>>> a=’OK-BYE’
>>> a*=2
>>> a
21. (a) Given is a Python string declaration: 2
exam="##KVS Examination 2022##"
Write the output of:
print(exam[2:6])
(b) Write the output of the code given below:
Dict1 = {"name": "RAM", "age": 26}
Dict1['age'] = 27
Dict1['address'] = "JAIPUR"
print(Dict1.items())
22. Define the term : 2
(a) Hackers
(b) Crackers
23. Name the online activities which would help you detect that your friend is 2
being cyber bulled.
24. Predict the output of the Python code given below: 2

(a) X=range(1,10,2)
for i in X:
print(i)

(b) X,Y=17,4
print (X//Y)
print(X/Y)
29
30
25. Write a Python program to input a number print its Square if it is odd, 2
otherwise print its square root. (use import math function)
SECTION C
26. Draw logic circuit for given Boolean expression: 3
F(A,B,C) = A’B+AB+B’C
27. Find the error in the following code and rewrite corrected code: 3
25=Val
for I in the range(0,Val)
if I%2==0:
print( I+1)
Else:
print (I‐1
28. Write a python program to print a sum of series up to 10 integers using for 3
loop.
29. Write a program to input a list of numbers and find the smallest and largest 3
number from the list.
30. What are the benefits of e-waste recycling? 3
SECTION D
31. Write a python program to accept a string and replace all space by ‘$’ symbol. 4
32. Convert the following number system. 4
(a) (11011.10 )2 into ()10
(b) (11100.1010)2 in to ()16
(c) (10AF)16 into ()2
(d) (A42)16 into ()8
SECTION E
33. Write a program to create a dictionary to input total number of sections and 5
class teacher’s name of a class 11 and display all information on the output
screen.
34. Which string method is used to implement the following: 5
a. To count the number of characters in the string
b. To change the first character of the string in capital letter
c. To change lowercase to uppercase letter
d. To check whether the given character is letter or a number
e. To replace all the occurrences of the old string with the new string.
35. Explain the following: 5
Open-Source Software and Proprietary Software
OR
Active and Passive digital footprint

******************************

31
KENDRIYA VIDYALAYA SANGATHAN JAIPUR REGION
Class: XI Session: 2022-23 Computer Science (083)
Answer Key Practice Paper-5 (Theory)

SECTION A
1. (c) Optical Character Recognition 1
2. c) Speaker 1
3. (d) NOR 1
4. (c) 5 1
5. (d) # 1
6. (c) My.File 1
7. List 1
8. b. List is mutable & Tuple is immutable 1
9. String 1
10. d) Open Source Initiative 1
11. Cyber-bullying 1
12. (i) Tracking 1
13. b) 3 1
14. Yes 1
15. A. Good 1
16. b. if…elif 1
17. (a) Both A and R are true and R is the correct explanation for A 1
18. ( C) A is True but R is False 1
SECTION B
19. c) (10,5) 2
20. c) OK-BYEOK-BYE 2
21. a) KVS 2
B)
dict_items([('name', 'RAM'), ('age', 27), ('address', JAIPUR')])
22. Hackers and Crackers : Hackers are most often programmers. Hackers are 2
people who hack devices and systems with good intentions. They might hack a
system for a specified purpose or for obtaining more knowledge out of it.
Crackers: Crackers are people who hack a system by breaking into it and
violating it with some bad intentions. They may hack a system remotely for
stealing the contained data or for harming it permanently. Crackers can easily
be identified because their actions are malicious.
1 mark each for explain the terms
23. Cyberbullying can include: 2
Sending mean texts or IMs to someone
Pranking someone’s cell phone
Hacking into someone’s gaming or social networking profile
Being rude or mean to someone in an online game
Spreading secrets or rumours about people online
Pretending to be someone else to spread hurtful messages online
1 mark each for at least two activities

32
24. Predict the output of the Python code given 2
below: 1,3,5,7,9
4
4.25
1 mark for each correct output
25. #program to input a number print its square if it is odd otherwise print its 2
square root.

import math
num=int(input("enter a number : "))
if (num%2!=0):
print("The given number",num, "is odd so its square is :",num*num)
else:
print ("The given number",num, "is even so its square root is :", math.sqrt (num))
2 mark for correct python code
SECTION C
26. Logic circuit for given Boolean expression: 3

3 mark for correct logic circuit


27. Find the error in the following code and rewrite corrected code: 3
Val = 25 #Error 1
for I in range(0,Val): #Error 2
if I%2==0:
print( I+1)
else: #Error 3
print (I‐1)
1 mark for each corrected error
28. #program to print a series and sum of series upto 10 integers using for loop. 3
sum=0
for i in range (1,11):
print (i)
sum=sum+i
print("sum of series is " ,sum)
3 mark for correct python code
29. mylist=[] 3
num=int(input("how many elements to be entered: "))
for i in range(num):
item=int(input("enter elements : "))
mylist.append(item)
print("Largest element in the list is ", max(mylist))
print("Smallest element in the list is ", min(mylist))

33
output:
how many elements to be entered: 5
enter elements : 1
enter elements : 2
enter elements : 5
enter elements : 4
enter elements : 3
Largest element in the list is 5
Smallest element in the list is 1

3 mark for correct python code

30. (i) Protects public health and water quality 3


(ii) Allow for recovery of valuable precious metals.
(iii) Save landfill space
(or any other relevant point 1 mark for each correct line)

SECTION D
31. # python program to accept a string and replace all space by ‘$’ symbol. 4

str=input("enter a string :")


str1=" "
for i in str:
if i.isspace():
str1=str1+'$'
else:
str1=str1+i
print("The replaced string is:", str1)

output:
enter a string :I love my india
The replaced string is: I$love$my$india
3 mark for correct python code and 1 mark for output
32. 27.50 4
1C.A
0001000010101111
5102

1 mark for each correct conversion


SECTION E
33. classxi = dict () 5
n = int(input("Enter total number of section in xi class"))
i=1
while i <= n :
a = input ("enter section :")
b = input ("enter class teacher name :")
classxi[a]= b
i = i+1
print ("Class", "\t", "Section","\t", "Teacher Name")
for i in classxi :
print ("XI", "\t", i, "\t", classxi[i])

output:
34
Enter total number of section in xi class2
enter section :Science
enter class teacher name :Sunil
enter section :Humanities
enter class teacher name :Jyoti
Class Section Teacher Name
XI Science Sunil
XI Huminities Jyoti

3 mark for correct python code and 2 mark for output and documentation.
34. a. len(str) 5
b. str.capitalize( )
c. str.upper( )
d. ch.isalnum( )
e. str.replace()

1 mark for each correct string function

35. Open Software and Proprietary Software 5


Open source software (OSS) is software that is distributed with its source code,
making it available for use, modification, and distribution with its original rights.

Proprietary software is any software that is copyrighted and bears limits against
use, distribution and modification that are imposed by its publisher, vendor or
developer. Proprietary software remains the property of its owner/creator and is
used by end-users/organizations under predefined conditions.

OR

Active and Passive Digital Footprint


Active digital footprints are created when a user, for the purpose of sharing
information about oneself by means of websites or social media, deliberately. An
"active digital footprint" includes data that you intentionally submit online. Sending
an email contributes to your active digital footprint, since you expect the data be
seen and/or saved by another person. The more email you send, the more your
digital footprint grows.

A passive digital footprint is created when data is collected without the owner
knowing. A more personal aspect of your passive digital footprint is your search
history, which is saved by some search engines while you are logged in.

21/2 mark for each correct definition

******************************

35

You might also like