You are on page 1of 7
Roll No. — Code : 112122 Cs-A Please check that this question paper contains 26 questions and 7 pages. CLASS-XI COMPUTER SCIENCE (083) ANNUAL EXAM (2021-22) Time allowed : 2 hours Maximum Marks : 35 General Instructions : 1. This question paper contains three sections. Section A, Section B & Section-C. 2, Section-A has 12 MCQs of 1 mark each and any 8 are to be answered. 3. Section-B is divided into two parts - Part-I and Part-I. * Part-I has 7 questions of 2 marks each. Out of 7 questions any 5 are to be answered. * Part-II has 5 questions of 3 marks each. Out of 5 questions any 4 are to be answered. 4, Section-C has 2 questions of 5 marks each and any 1 is to be answered. 5. All programming questions are to be answered using Python language only. Section-A This section consists of 12 questions (1 to 12). Attempt any 8 questions from this section. Choose the best possible option. 1. Identify the output of the following Python statements : 1 x = |(10.0, 11.0], (23.0, 12.0], [13.0, 14.0, 15.0]] y = x{2][0] print(y) (a) 12.0 (b) 13.0 (ce) Error (@) 15.0 Consider a declaration L1 = 15, ‘Python’, ‘3.14’, ‘Program’ Data type of L1 is (a) list (b) tuple (©) dictionary (d) string Given a Tuple tupl= (10, 20, 30, 40, 50, 60, 70, 80, 90) What will be the output of print (tupl [3:7:-2) ? (a) (40, 50, 60, 70) ) 0 (©) Error (a) (40, 60) What is the output of following code : ‘T=(200] print(T*2**3) (a) Syntax error (b) (64000000,) (c) [200, 200, 200, 200, 200, 200, 200, 200] (d) [400] [400] [400] Which of these about a dictionary is false ? (a) The values of a dictionary can be accessed using keys (b) The keys of a dictionary can be accessed using values (©) Dictionaries aren't ordered (d) Dictionaries are mutable Consider the dictionary : D1=(M’:20, ‘T:30, ‘W’:40, print (40 in D1) (a) Error (b) True (c) False @ 2 10, 1. Identify the output of the following Python statements. 1 >>>importmath >>>math.ceil(120.2)-math.floor(-2340.7) (a) 2461 (b) -2260 (c) 2462 (d) 2460 Based on the following code answer the questions 1 import random num=(20,30,40,50,60,70} s-random.randint(1,3) e=random.randint(2,4) for j in range(s, e+1) print(numl{j],end="#") What possible output(s) are expected to be displayed on screen at the time of execution of the program ? (a) 10#40#70# (b) 30#40#50# (ce) 50#60#70# (a) 40#50#70# _ is the term for data that exists as a result of action and communication online that can in some way be traced back to an individual. 1 (a) Cyber Security (b) Cyber Bullying (c) Digital footprint (d) Eavesdropping Identify the incorrect method of disposing off e-waste : 1 (a) Giving away e-waste to certified e-waste recycler. (b) Donating your outdated technology. (©) Burning the e-waste in open ground. (d) Giving back your e-waste back to the electronic company. In which year India’s IT Act came into existence ? 1 (a) 2003 (b) 2001 (c) 2008 (a) 2000 12, Jitin is suffering from hearing impairment. He finds it difficult to hear what the teacher and his friends are trying to convey. Due to this he lacks interest in his studies. His father told this problem to his class teacher. Which one of the following is an appropriate measures that the school should take to help him ? 1 (a) The school should arrange teacher for special needs children who can interact with Jitin in sign language. (b) School need not take any action as Jitin should be able to understand after some time. (c) School can ask his parents to attend school daily to explain him. (d) School should arrange loud speakers for Jitin. Section-B Part-I Part-I has 7 questions of 2 marks each. Out of 7 questions any 5 are to be answered. 13. Write a program in Python to accept an integer value from the user. Print the last digit of number if the number entered is even, otherwise print its 3rd multiple. 2 14. What will be the output of the following Python code ? 2 str1=“Books are the best friends” print(str1[len(str1[-5:-2)):len(str1[13:)].upper0)) 15. What will be the output of the following Python code ? 2 List1=[23,34,45,56,67] List1[0),List1[3 |+List1[4|,List1[0] print (List) print (List1[2:3]) 16. What will be the output of the following Python code ? pl = (10,12, 23, 55, 23, 55, 18, 65, 65, 12, 39] 2 p2 =[] for x in pl if x not in p2: p2.append(x) print(p2) 17, 18, 19, Part-II has 5 questions of 3 marks each. Out of 5 questions any 4 are to be What will be the output for the following Python statements ? >>oT1=(2,3,4,5) >>>T2=(1,2,3) >>>T3=T1+T2 >>>T3.index(3,4) >>>print (3 in T3) What will be the output for the following Python statements ? >>> d=(L:one’, 2:Two', 3:"Three’} >>> da=d >>> d8=d.copy() >>> d[1]=First’ >>> print (42) >>> print (43) Write code in python for the following : (To import only cos function from respective module (ii) To find absolute value of number -123.5 (use proper import statement to import the respective module). Section-B Part-II answered. 20. 21 Rewrite the following code using while loops only for x in range (12) for y in range (10): print (xy, sep=) Write a program in Python to accept two lists from the user. Merge two lists and display them in descending order. 22. 23, 24, This 25. Write a program to accept an integer tuple from user and display count of even and odd numbers in the tuple. 3 Write a program to accept a string and count number of times a character appears in the string using dictionary. 3 For example : if the string is “good morning everyone” then output should be : (g:2, ‘o's4, ‘As, 62, ‘m1, °-2, ‘W':3, V1, ‘e:3, Wel, ‘y) Write a program to generate 5 random numbers between 10 and 20. The program should find the mean and median of these numbers 3 Section-C Case Study Based Questions section has 2 questions of 5 marks each and any 1 is to be answered. Raveesh is a student of 2nd year of engineering. He has got an assignment to create a blog on several reasons of gender bias. He was not able to do the needed exercise and surfed the data and reports from the net. He has used copyrighted data including images, text, video from copyrighted website without seeking any consent. Also he has installed some software without purchasing their licence. When he was about to submit his project with report blog he told his friend also to complete the project in this easy way. His friend refused to do so and told him that it is cheating to prepare blogs like this. He told him about copyright, GPL and suggested to use open source software. Answer following questions based on the above : (i) Raveesh has copied data from website without consent. Name the term that describes the act of presenting someone else’s work as his own. 1 (ii) Give an example of copyright infringement. 1 (iii) Friend of Raveesh has suggested him to use open source software. Explain the term open source software. 1 (iv) His friend told him about IPR. Explain the IPR. 1 (v) Expand the term GPL. 1 26. Arun is a student of IT. He carries his laptop to his college and allows students to work on it. He shares the password of his email with some of his close friends. From past few days, he noticed that he is receiving some abrupt emails. His facebook account has started showing some abrupt posts with his name. His computer has started showing unnecessary advertisements which cause a lot of inconvenience. He also feels that his account is being operated by someone else as his friends are receiving money demanding mails from his email. He discussed the issue with his IT teacher and his teacher told that his email account is hacked, and someone is using his accounts. Based on the above case, answer the following questions (a) Suggest any two safety measures he should use to protect his computer from cyber threats. 2 (b) Arun is facing the problem of unnecessary advertisement popups on his computer. Explain whether his computer is being attacked by Trojan Horse or adware with appropriate reason. 1 (c) Explain the term hacking. 1 (d) Arun is facing the problem of identity theft. What is identity theft ? 1 oo3

You might also like