Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

The Pioneer School-CBSE

Nagercoil
Annual Exam Answer Key (2022-23)
Grade: XI C, D Max.Marks:70
Subject: Computer Science (083) Duration: 3 hours

SECTION A
1. (b) Input 1
2. (a) Human memory can retain information for a long times whereas computer’s memory 1

is temporary
3. (c) RAM 1
4. (b) Payroll 1
5. (a) Operating System 1
6. (b) 0011 1
7. (b) @book 1
8. (a) bool 1
9. (a) 40 1
10. (d) a=b=c=1,=2=3 1
11. (c) Assignment operator 1
12. (a) check whether a value is contained inside a sequence 1
13. (a) Looping 1
14. (a) Mutable 1
15. (c) The loop’s condition becomes false 1
16. (a) True 1
17. (c) (2, 4) 1
SECTION B
18. Find error in the following code(if any) and correct code by rewriting code and underline 3
the correction;-

1
19. Rewrite the following program after finding and correcting syntactical errors and 3

underlining it.

20. Find out the output of the Following – 3

15
14 50
21. Rewrite the following code in python after removing all syntax error(s). Underline each 3

correction done in the code.

22. Find output 3


27.5 -142.5 12.5
23. find output 3

122.0 11.0 14.0 9


24. How many times loop will execute: 3
10 Times
25. Identify these parts: 3

 function header – processNumber(x)


 function call – processNumber()
 arguments – 72, 54
 parameters – x,y
 function body – return x + 3
 main program – x=72, return x +3, y=54, res=processNumber(y)

2
SECTION C
26. 4

27. 4

28. Name the input or output device used to do the following: 5


(a) To output audio - Speaker
(b) To enter textual data - Keyboard
(c) To make hard copy of a text file - Scanner
(d) To display the data or information - Monitor
(e) To enter audio based command - Microphone
(f) To build 3D models – 3D Printer
(g) To use to read the cheque in the bank - MICR

3
29. 9

30. 9 – LEFT 5

1 – DOWN
C – OPEN
3 – CLOSE
F - UP
31. Give a short explanation about the following topics: 2

 Hacking –
Hacking is the act of identifying and then exploiting weaknesses in a computer
system or network, usually to gain unauthorized access to personal or
organizational data. Hacking is not always a malicious activity, but the term has
mostly negative connotations due to its association with cybercrime.
 Virus –
A computer virus is a kind of malicious computer program, which when
executed, replicates itself and inserts its own code.
 Firewall –
A firewall is a network security device that monitors traffic to or from your
network. It allows or blocks traffic based on a defined set of security rules.
 Plagiarism –
the act of copying another person's ideas, words or work and pretending they are
your own; something that has been copied in this way.

You might also like