Professional Documents
Culture Documents
Section A Total
Questi
on No.
1 i. True 1
ii. False
½ mark for each correct answer
2 legend() 1
1 mark for correct answer
3. 20 1
1 mark for the correct answer
4 print(Sample.tail(3)) 1
1 mark for the correct usage of head()
5 print(S1*S2) 1
1 mark for the correct print() statement
6 statistical 1
1 mark for the correct answer
7 URL 1
1 mark for the correct answer
8 web page 1
1 mark for the correct answer
9 Mesh 1
1 mark for the correct answer
10 Row 1
1 mark for the correct answer
11 Date Function 1
1 mark for the correct answer
12 Phishing scam 1
1 mark for the correct answer
13 Del 1
1 mark for the correct answer
14 Scam 1
1 mark for the correct answer
15 a. Home page 1
1 mark for the correct answer
1
16 cookies 1
1 mark for the correct answer
17 Buy environmentally friendly electronics Donate used electronics 1
to social programs Reuse , refurbish electronics
Recycling e-waste
Any other correct answer to be considered
1 mark for stating option “a” as correct answer ½ mark for stating
option “b” as correct answer
(iv) d. print(emp.columns)
1 mark for the correct answer
(v) b. emp [‘Performance’]=[’A’,’A’,’B’,’A’,’B’]
1 mark for the correct answer
23 (i) b. Both (iii) and (iv) 4
2
4
1 mark for stating option b as correct answer
½ mark for stating d as correct answer
(ii) b.
OR
a. select instr('Computer' ,'ter);
b. select left('Computer',4);
1 mark for each correct answer of part (a) , (b)
30 i. sports[‘Winner’]=[‘Ashoka’,’Raman’,’Shivaji’, ‘Tagore’] 2
ii. sports.loc[‘S5’]=[ ‘s5’ , 5 ,’Handball’, 20]
1 mark for each correct answer
31 a. PPP: Point to Point Protocol 2
b. HTTPs: Hyper Text Transfer Protocol secured
c. VoIP: Voice over Internet Protocol
d. PAN: Personal Area Network
These include :
1. No copyright violation: we should not use copyrighted materials
without the permission of the creator or owner. We should give
proper credit to owners/creators of open source
content when using them.
2. Avoid cyber bullying: Avoid any insulting, degrading or
intimidating online behaviour like repeated
posting of rumours, giving threats online,
posting the victim’s personal information,
or comments aimed to publicly ridicule a victim. Or any
4
other relevant answer.
1 marks for definition of Net Etiquettes
1 mark each for the example with explanation
33 We call this type of activity as Eavesdropping 2
Precautions we can take in this :
• Alert employees.
• Round the clock control over physical access by outsiders to the
area to be protected.
• Continuous supervision/observation of all service personnel
allowed into the area for repairs or to make alterations.
• Thorough inspection by a qualified technical countermeasures
specialist of all new furnishings, decorations, or equipment
brought into the area.
1 mark for naming the activity
1 mark for mentioning any one risk .
34 a. will give the output as: 3
[10,20,25,50,10,20,25,50]
These are targeted and simple forms of phishing emails designed to get
victims to purchase gift cards, or to give up personal email or phone
numbers. The "email compromise" gets its name because the attacker
mimics the email of a known sender.
Or any other relevant example
OR
6
38 import pandas as pd 5
d1={'T_NO':[1,2,3,4],
'Name':["Pavan","Pulkita","Sugandha","Sahil"],'PB1':[90,85,
70,69], 'PB2':[80,75,72,71]}
toppers=pd.DataFrame(d1) print(toppers)
toppers['Total'] = toppers['PB1']+ toppers ['PB2']
print("Maximum scores are : " ,
max(toppers['PB1']), max(toppers['PB2']))
39 i) dayname(date(curdate())) 5
ii) ltrim(“ Python“)
iii) monthname(date(dob))
iv) instr(“Information
Technology”,”information”)
v) pow(a,b)
1 mark for each correct answer
OR
7
40 5
i) Most suitable layout according to distance is : 1 mark for an
appropriate cable layout