You are on page 1of 5

KENDRIYA VIDYALAYA SANGATHAN, HYDERABAD REGION

SAMPLE PAPER SESSION ENDING EXAMINATION 2022


CLASS XI COMPUTER SCIENCE(083)
Maximum Marks: 35 Time: 2 Hours

General Instructions:

• The question paper is divided in to three sections – A, B and C


• Section A consists of 7 questions(1-7). Each question carries 2 marks
• Section B consists of 3 questions (8-10). Each question carries 3 marks.
• Section C consists of 3 questions (11-13). Each question carries 4 marks.
• Internal choices have been given for question numbers 7,8,12

1. A List L declared as 2M
L = [“banana” , True , “Python Programming”, 65]
Write output for the following python statements
(a) print(L[2][:3]) (1M)
(b) print(type(L[1])) (1M)

2. Read the following code and identify the statement/statements which results in to 2M
an error? Also explain the reason?
T = ("Hello", [11,56,23], (10,20,30),67,)
print(T + 34) # Statement 1
print(T * 2) # Statement 2
print(T +(78,)) # Statement 3
print(T * "Python") # Statement 4

3. Write output for the following code: 2M


MyDict = {"Vinay":45,"Raghav":56,"Megha":67,"Ramya":54}
temp = ""
val = 0
for key in MyDict:
if temp<key:
temp=key
for value in MyDict.values():
if val< value:
val = value
print(temp,val)

4. Name any 4 examples/activities that are considered as Digital footprints of an 2M


individual?

5. (i) Which of the following are used to protect Intellectual Property Rights? (1M) 2M
(a) Copyright
(b) Patent
(c) Trade Mark
(d) All of the above
(ii) Your friend Mr. Abhinav has recently created a social media account for him
and started using it. As he is new to social media, suggest him any two social
media etiquettes to be followed while Posting/Responding messages?(1M)

6. (i) A passive attack in which the attacker gains access to the communication 2M
medium and then listens to the communication which is hardly noticed by both
sender and receiver is known as? (1M)
(ii) An activity where an imposter uses an authentic looking email or web site to
trick recipients into giving out sensitive personal information is called? (1M)

7. (a)Write any 4 Benefits of e-Waste Recycling? 2M


(OR)
(b)Differentiate between Free software and Open source software

8. (a)Write output for the following program code: 3M


first = ("one",("python",("program")))
print(len(first))
print(first[1][1][:3])
second = (10,(20,(30,),40),50)
print(second[2])
(OR)
(b)Identify 3 correct statements from the following:
(i) Tuples are immutable i.e., you can not change elements of a tuple in
place
(ii) A tuple with a single element can not be created.
(iii) Lists can grow or shrink while tuples can not
(iv) If t1=(1,2,3) and t2=(4,5,6) then t1+t2 will be (1,2,3,4,5,6)
(v) If T = (10,20,30,40,50) then T.count() returns 5 as output

9. (i) Name Two gender issues that must be addressed to enforce gender equity in 3M
computer science education? (2M)
(ii) As per The Information Technology Amendment Act, 2008 ( IT Act 2008)
The maximum penalty for any damage to computers or computer systems is up
to? (1M)

10. (a)Read the following code: 3M


import math
import random
print(int(math.pow(random.randint(3,5),2)),end=',')
print(int(math.pow(random.randint(3,5),2)),end=',')
print(int(math.pow(random.randint(3,5),2)),end=',')
print(int(math.pow(random.randint(3,5),2)))

which of the following from (i) to (iv) are the possible outputs of the above code?
(2M)
(i) 9,16,16,36
(ii) 16,25,9,16
(iii) 25,25,9,9
(iv) 9,8,25,16

(b)Name the operator used in python to import all modules from packages? (1M)
11. Match the following 4M
(1) A self replicating program which (a)Trojan Horse
eats up the entire disk space or
memory.
(2) A Program that appears harmless (b)Cyber Bullying
but actually performs malicious
functions such as deleting or
damaging files.
(3) Programs that deliver unwanted (c)Worm
ads to your computer
(4) Harassing, demeaning, (d)Adware
embarrassing, defaming someone
using internet, mobile, social
networks etc.

12. Write a program to create a list of integers and then program has to display sum 4M
of all odd numbers and sum of all even numbers in the list .
(Example if list L has values [10,11,13,20,23,24] then program should display
output as:
Sum of Even numbers = 54
Sum of odd numbers = 47 )
13. (i) (a)Write output for the following program code: (2M) 4M
D = dict([['Name','Pavan'],['Class',10],['Fee',2400]])
for rec in D.keys():
print(rec,'->',D[rec],end=',')
print()
for rec in D.values():
print(rec,end=',')

(OR)
(b) Write output for the following program code: (2M)
D = {"Mahi":45,"Manoj":52,"Karan":67,"Diya":90,"Vital":87}
val = 0
for key in D:
if D[key]>val:
val = D[key]
print(val)
L = list(D.items())
print(len(L))

(ii) Can we use lists as keys in dictionary? Give reason? (1M)


(iii) Name the method that can be used to delete an element from a dictionary?
(1M)
KENDRIYA VIDYALAYA SANGATHAN, HYDERABAD REGION
SAMPLE PAPER SESSION ENDING EXAMINATION 2022
CLASS XI COMPUTER SCIENCE(083)
ANSWER KEY

1. Pyt 2M
<class 'bool'>
2. Statement 1 - + to be used with another tuple 2M
Statement 4 - * to be used with a number
3. Vinay 67 2M
4. Interactions on social media 2M
Friend circle on social media sites
Sites visited
Online purchases
Locations visited through facebook check-ins etc..
5. (i)All of the above 2M
(ii)Respect your Audience
Respect others sentiments
Use a Disclaimer
Be Authentic
Don’t pick fights online
Protect your identity etc..
Any two of the above
6. (i)Eavesdropping 2M
(ii)Phishing
7. (a) 2M
Allows for recovery of valuable precious metals
Protects public health and water quality
Creates jobs
Toxic waste
Saves landfill space
(b)
Free software means the software is freely accessible and can be freely used,
changed, improved, copied and distributed by all who wish to do so. And no
payment needed to be made for free software.
Opensource software on the other hand can be freely used but it does not have to
be free of charge. Here the important point is that in open source software the
source code is freely available to the customer.
8. (a) 2 3M
Pro
50

(b) (i) (iii) (iv)


9. (i)Under Representation 3M
Not Girl-Friendly work culture
(ii) 1 crore
10. (a)Options (ii) and (iii) are possible outputs 3M
(b) *
11. (1)---(c) 4M
(2)---(a)
(3)---(d)
(4)---(b)
12. L = eval(input("Enter list elements: ")) 4M
Even_sum=0
Odd_sum=0
for i in L:
if i%2==0:
Even_sum+=i
else:
Odd_sum+=i
print("Sum of even numbers = ",Even_sum)
print("Sum of odd numbers = ", Odd_sum)
13. (i)(a)Name ->Pavan,Class -> 10,Fee -> 2400, 4M
Pavan,10,2400,

(i)(b) 90
5
(ii)No. Keys of a dictionary should be of immutable type

(iii)pop()

You might also like