Resource 20230216201018 G11 Computer Sci. (Exam Capsule)

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

GRADE XI

FINAL TERM (2022-2023)


SUBJECT: COMPUTER SCIENCE (083) (THEORY)
EXAM CAPSULE
Time Allowed: 3 Hours Maximum Marks: 70

GENERAL INSTRUCTIONS:
1. This question paper contains five sections, Section A to E.
2. All questions are compulsory.
3. Section A has 18 questions carrying 01 mark each.
4. Section B has 7Very short Answer type questions carrying 02 marks each.
5. Section C has 05 Short Answer type questions, carrying 03 marks each.
6. Section D has 03 Long Answer type questions, carrying 05 marks each.
7. Section E has 02 questions, carrying 04 marks each.

SECTION- A (1 MARK EACH)

1. Which of the following is True regarding lists in Python? 1


A. Lists are immutable.
B. Size of the lists must be specified before its initialisation
C. Elements of lists are stored in contagious memory location.
D. size (list1) command is used to find the size of lists.
2. What will be the output of below Python code? 1

list1=[8,0,9,5]

print(list1[::-1])

A. [5,9,0,8]
B. [8,0,9]
C. [8,0,9,5]
D. [0,9,5]
3. The marks of a student on 6 subjects are stored in a list, list1=[80,66,94,87,99,95]. How can the
student's average mark be calculated? 1

A. print(avg(list1))
B. print(sum(list1)/len(list1))
C. print(sum(list1)/sizeof(list1))
D. print(total(list1)/len(list1))
4. What will be the output of above Python code? 1

str1="6/4"

print("str1")
A. 1
B. 6/4
C. 1.5
D. str1
5. Which of the following is False? 1
A. String is immutable.
B. capitalize() function in string is used to return a string by converting the whole given string into
uppercase.
C. lower() function in string is used to return a string by converting the whole given string into
lowercase.
D. String is mutable.
6. What will be the output of below Python code? 1
str1="poWer"

str1.upper()

print(str1)
A. POWER
B. Power
C. power
D. poWer
7. Choose the correct option with respect to Python. 1
A. Both tuples and lists are immutable.
B. Tuples are immutable while lists are mutable.
C. Both tuples and lists are mutable.
D. Tuples are mutable while lists are immutable.
8. What will be the output of below Python code? 1
tuple1=(5,1,7,6,2)
tuple1.pop(2)
print(tuple1)

A. (5,1,6,2)

B. (5,1,7,6)
C. (5,1,7,6,2)
D. Error
9. Which of the following options will not result in an error when performed on tuples in Python where
tupl=(5,2,7,0,3)? 1

A. tupl[1]=2
B. tupl.append(2)
C. tupl1=tupl+tupl
D. tupl.sort()
10. Which of the following statements create a dictionary? 1
a) d = {}
b) d = {“john”:40, “peter”:45}
c) d = {40:”john”, 45:”peter”}
d) All of the mentioned
11. What will be the output of the following Python code snippet? 1

1. d = {"john":40, "peter":45}

a) “john”, 40, 45, and “peter”


b) “john” and “peter”
c) 40 and 45
d) d = (40:”john”, 45:”peter”)
12. Suppose d = {“john”:40, “peter”:45}, to delete the entry for “john” what command do we use? 1
a) d.delete(“john”:40)
b) d.delete(“john”)
c) del d[“john”]
d) del d(“john”:40)
13. Suppose d = {“john”:40, “peter”:45}. To obtain the number of entries in dictionary which command
do we use? 1
a) d.size()
b) len(d)
c) size(d)
d) d.len()
14. The binary equivalent of decimal number 98 is 1
a) 1111001
b) 1110001
c) 1110100
d) 1100010
15 What is the value of the binary number 101? 1
a) 3
b) 6
c) 5
d) 101
16 The binary number 10101 is equivalent to decimal number ............. 1
a) 21
b) 12
c) 19
d) 27
Q17 and 18 are ASSERTION AND REASONING-based questions. Mark the correct choice as
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True.
17. Assertion (A): Cyber safety refers to the safe and responsible use of the internet so as to ensure
safety and security of personal information and not posing threat to anyone else’s information.
Reason (R): It involves gaining knowledge about possible threats to personal safety and security
risks for the information along with measures to prevent and counter them. 1
18. Assertion (A): pandas is an open source Python library which offers high performance, easy-to-use
data structures and data analysis tools.
Reason (R): Professionals and developers are using the pandas library in data science and machine
learning. 1

SECTION-B (2 MARKS EACH)


19. Draw a flowchart to find the largest of three numbers A, B and C. 2
20. What is the difference between a keyword and identifier? 2
21. What is the difference between assignment operator and equality operator? Explain with example. 2
22. What are binary operators? Give examples of arithmetic binary operators. 2
23. What would be the output of the following code? 2

a=3+5/8
b= int (3+5/8)
c=3+float (5/8)
d=3+float (5)/8
print (a, b, c, d)
24. Convert the following: 2

a) A6 to decimal

25. Draw a logical circuits diagram of the following Algebra. 2

a) (x+y).(x’+z’).(y+z)

SECTION-C (03 MARKS EACH)

26. Write a program to obtain three numbers and write its


output. 3

27. Find the errors in the following code and rewrite correct code.
Num=int(input ”enter number 1”) 3

If Num>2
Print(Num+1)
Else
Print(Num+3)

28. Explain Statement flow control using diagrams. 3

29. State DeMorgan’s first Law of Boolean Algebra and verify it using truth
table. 3

30. Write a program to check if all the elements of a tuple are in descending order or not. 3

SECTION-D (5 MARKS EACH)

31. Explain the following terms: 5

a. Phishing b) Plagiarism c) Identity theft d) Cyber crime e) cyber bulling.

32. What do you mean by python list ? explain how to create a access lists in python. 5

33. Write a program to read two numbers and an arithmetic operator and displays the computed result. 5

SECTION–E (4 MARKS EACH)

34. CASE STUDY QUESTION: 4

Attempt any 4 questions from the question given below


Suppose a list is given as
Example = [‘h’,’e’,’l’,’l’,’o’]
ANSWER THE QUESTIONS BASED ON THE LIST
1. What is len (list Example) ?
1. a) 5
2. b) 4
3. c) None
4. d) Error
2. What is Example [-1] ?
1. a) Error
2. b) None
3. c) ‘o’
4. d) ‘h’
3. Which function can be used to add one more element at the end of the list ?
1. a) append()
2. b) insert()
3. c) add()
4. d) insertinto()
4. What will be the output for the following:
Example[2: : 2]
1. a) [‘h’,’e’,’l’,’l’,’o’]
2. b) [’e’,’l’,’l’,’o’]
3. c) [’l’,’l’,’o’]
4. d) [’l’, ’o’]
5. Which function will delete all the elements of the list ?
1. a) del
2. b) drop()
3. c) clear()
4. d) remove()
35. Case Study-2 ` 4
Parminder recently celebrated his 14th birthay. On his birthday he got to know about Facebook. He
learn how social networking sites help people to meet their friends and discuss things online. He also
found that he is now eligible to open a Facebook account. He creates his profile on Facebook and
starts connecting with his friends.
Within a few days, he befriends many people he knows and many people he does not know. After
some time he starts getting negative comments on his posts. He also finds that his pictures are being
shared online on objectionable websites.
Based on the given information, answer the questions given below. Attempt any four questions
1) Identify the type of cybercrime Parminder is a victim of.
2) After hearing about his ordeal, the school decides to publish a set of moral principles that
determines the appropriate behavior of students while using the internet. The school is referring to
__________
3) Write a safety measure to be taken by Parminder to avoid threats from unknown people in the
future.
4) Parmider decides to make a list of common safety precautions to be taken when online. Write any
two points that Parmider should include in his list.
5) Why are privacy settings so important in social networking sites?

You might also like