[go: up one dir, main page]

100% found this document useful (1 vote)
722 views5 pages

DAV Centenary Public School, Paschim Enclave Sample Paper-1 Computer Science (083) Class XI Marks:35 Time:2 Hrs Instructions

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 5

DAV Centenary Public School, Paschim Enclave

Sample Paper-1
Computer Science (083)
Class XI
Marks:35 Time:2 hrs
Instructions:
1. The question paper will contain three sections -Section A,Section B & Section C.
2. Attempt any 8 questions out of 12 from Section A .
3. Attempt any 5 questions out of 7 from Part I of Section B.Each question carries 2
marks.
4. Attempt any 4 questions out of 5 from Part II of Section B, Each question carries 3
marks.
5. SectionC will have 2 questions of 5 marks each and any 1 question is to be answered
.
6. All programming questions are to be answered using python Language only.

Section A
Attempt any 8 out of 12 questions given below
1. Which is the write way to use the function pow of the math module.
a. Import math
print(pow.math(12,4)
b. import maths
print(maths.pow(12,4)
c. import math
print(math.pow(12,4)
d. from math import pow
print(math.pow(12,4)
2. Which of the statements among the following is incorrect with reference to a tuple?
tup=(10,20,30,50,70)
a. print(max(tup))
b. tup=tup+(90,)
c. tup[3]=40
d. print(tup*2)
3. What is the output when we execute list(“hello”)?
a. [‘h’,’e’,’l’,’l’,’o’]
b. [‘hello’]
c. [‘llo’]
d. [‘olleh’]
4. Suppose list1=[1,2,3,[7,8,9],10,20] , what will be the output of list1[3:4]?
a. 7,8,9
b. [7,8,9]
c. 7,8,9,10
d. [[7,8,9],10]
,
5. Which of the following function of random module will display floating point numbers between
0.0 to 1.0
a. randrange()
b. random()
c. randint()
d. choice()
6. What will be the output of the following code:
d1={"a":10,"b":2,"c":3}
str1=""
for i in d1:
str1=str1+str(d1[i])+" "
str2=str1[:-1]
print(str1)
print(str2)
print(str2[::-1])
a. 3,2
b. 3,2,10
c. 3,2,01
d. Error
7. Tanvi is a fashion designer and is running her studio in Green Park from quite some time.
After her success in her business, she now wants to register her brand name. Identify the
type that will be given to her brand name “QueenT”.
a. CopyRight
b. Trademark
c. Patent
d. Intellectual Property Right
8. Which of the following element make e-waste hazardous in nature?
a. Lead
b. Glass
c. Plastic
d. Iron
9. Which of the following will delet key :value pair for key=”tiger” in dictionary?
d1={“lion”:”wild”,”tiger”:”wild”, “cat”: “domestic”, “dog”: “domestic”}
a. del d1[“tiger”]
b. d1[“tiger”].delete()
c. delete(d1.[“tiger”])
d. del(d1.[“tiger”])
10. Social media news channels and advertisers that use our likes, shares and comments to
profile us and to serve up advertisements based on our interests is an example of …………..
a. Digital Footprints
b. Active footprints
c. Cookies
d. Cyber Stalking
11. ………………. is a cyber attack that uses disguised email as a weapon. The attacker
masquerade as a trusted entity of some kind and the goal is to trick the email recipient into
believing that the message is something they want.
a. Ransomware
b. Spamming
c. Phishing
d. Identity theft
12. What will be the output of the following code
Tp1=(15,11,17,16,12)
Tp1.pop(12)
print(Tp1)
a. (15,11,16,12)
b. (15,11,17,16)
c. (15,11,17,16
d. Error
Section B
Part-I
Attempt any 5 out of 7 questions from the following.
1. Explain the difference between extend and append function with the help of appropriate
examples.
2. Write a python program to take two integers from the user and prints a message saying if
the first number is divisible by second number or if it is not.
3. Name the built-in functions responsible for the following operations :
a. It will remove the first occurrence of the element from the list.
b. This function divides the string and returns the list .
c. Searches the string for a specified value and returns the position of where it was
found.
d. Function that will sort the tuple in ascending order.

4. Consider the following code


import random
print(100+random.randint(5,10),end=” “)
print(100+random.randint(5,10),end=” “)
print(100+random.randint(5,10),end=” “)
print(100+random.randint(5,10))
Find the suggested output options (i) to (iv) .Also, write the least value and highest value that
can be generated.
a. 102 105 104 105
b. 110 103 104 105
c. 105 107 105 110
d. 110 105 105 110

5. Determine the output of the following code:


s= ‘abracadabra’
x=[ ]
for i in range (len(s)):
a=s[i]
b=a.upper()
if a not in x and b not in x:
if a> ‘p’:
x.append(a.upper())
else:
x.append(a)
print(x)
6. Write a program to take a tuple from the user and insert all the odd elements from this tuple
into a list.
7. Write a program to create a dictionary whose key are “hardisk”,”pendrive” and “mouse” and
values are 5000,650 and 875. Write a statement to
1. Print all the keys
2. To delete key value pair-“mouse”,875
Part-II
Attempt any 4 questions out of 5 questions given below.

1. Write a code to take a list “R” from the user having 7 elements and adds 5 in all the odd
values and 10 in all even values of the list. Also display the list.
2. Write a function Lshift(Arr,n) in python which accepts a list Arr of numbers and n is a numeric
value by which all elements of the list are shifted to left.

Sample input Data of List:


Arr=[10,20,30,40,12,11] , n=2

Output:
Arr=[30,40,12,11,10,20]

3. Write a python program to input basic salary of an employee and calculate its gross salary
according to following:
Gross Salary=basic salary +HRA+ DA

Basic Salary <=10000 , HRA=20% , DA=80%


Basic Salary <=20000 , HRA=20% , DA=80%
Basic Salary >20000 , HRA=20% , DA=80%

4. a. Rewrite the following code in python after removing all syntax error(s). Underline each
correction done in the code: (2)
value=30
for val in range(0,value):
If val%4==0:
print(VAL *4)
ElseIf val %5==0:
print(Val+3)
Else
print(Val+10)

b.Can 10#40#70# be the output of the following code:


import random
ar=[20,30,40,50,60,70]
lower=random.randint(1,3)
upper-random.randint(2,4)
for k in range(lower,upper+1):
print(ar[k],end=”#”)
5. Results is a dictionary containing Name and Score of students in key:value pair.
Results={“A”:240, “B”:340, “C”:350, “D” :280, “E”:370}
Perform following operation on it:
a. Print the name of all the students having score score>250
Change marks of student “C” to 450.
b.
c.
Calculate average score in this class.
Add one more student with name “G” with score 290.
d.
Delete entry student “C” from it.
e.
Section C
Attempt any one Case Study out of the following.
1. Read the following and answer the questions that follows.
Great lake university is setting up its Academic School in Chennai and planning to set
up a network. The university has 3 Academic schools and one administration centre
as shown in the diagram below:

a. The university aims to protect the network from outside attacks .which of the following should
be used by the university. (1)
a. Anti-Virus
b. Firewall
c. Cookies
d. Proxy Server
b. The university has published a research paper on “Quantam Physics” Identify the type
that must be used for preventing it from unauthorized use. (1)
c. Company has hired some people which break into the security system of the company
and check its effectiveness? Who are these people?Also Define Grey hat hackers. (1)
d. What are some tips that must be followed by the company to protect data or to keep
information confidential? (2)
2. Shikha has created her facebook account which asked to her enter her basic
details. She has not used any advanced privacy setting . She updates her profile
every now and then.
Shikha plans a trip to Himachal Pradesh and uploads her geo located pictures of
the trip.
According to her situation answer the following questions.
a. Since Shikha has entered her email id in her details , she now receives emails from
companies directing her to fill some forms asking for personal details. What is this attack
known as? (1)
b. Shikha is involved with some friends in teasing a class mate. They pass nasty comments
on their class mate? Which type of cybercrime is this? (1)
c. By Sharing her geolocated pictures is Shikha leaving a digital foot print? If yes what is the
type of digital footprint left by her. (1)
d. What are netiquettes? Explain some netiquettes that must be followed by Shikha on
Social media? (1)

You might also like