0% found this document useful (0 votes)
3 views5 pages

set 3 - qp

This document is a practice paper for Class XI Computer Science, covering various topics in Python programming and computer science concepts. It consists of five sections with a total of 70 marks, including multiple-choice questions, short answer questions, and programming tasks. The paper emphasizes the use of Python for programming questions and includes topics such as data structures, cyber security, and basic programming constructs.

Uploaded by

mosespauline82
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
3 views5 pages

set 3 - qp

This document is a practice paper for Class XI Computer Science, covering various topics in Python programming and computer science concepts. It consists of five sections with a total of 70 marks, including multiple-choice questions, short answer questions, and programming tasks. The paper emphasizes the use of Python for programming questions and includes topics such as data structures, cyber security, and basic programming constructs.

Uploaded by

mosespauline82
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 5

Class: XI Session: 2022-23 Computer Science (083)

Practice Paper-3 (Theory)


Maximum Marks: 70 Time Allowed: 3 hours

General Instructions:
1. This question paper contains five sections, Section A to E.
2. All questions are compulsory.
3. Section A have 18 questions carrying 01 mark each.
4. Section B has 07 Very Short Answer type questions carrying 02
marks each.
5. Section C has 05 Short Answer type questions carrying 03 marks
each.
6. Section D has 03 Long Answer type questions carrying 05 marks
each.
7. Section E has 02 questions carrying 04 marks each. One internal
choice is given in
Q35 against part c only.
8. All programming questions are to be answered using Python
Language only.

SECTION: A
Q.No Question Marks

1. Components that provide internal storage to the CPU is: 1


(a) Registers (b) Program Counters
Controller (d) Internal Chips
2. The boolean expression of following logic circuit is : 1

(a) (A+B).C'+B (b) A'B'+C+B'A


(c) A.B.C+(B'+C').A (d) A+B+C'(A+B)
3. Full form of OMR is: 1
(a) Optical Mark Reading (b) Optical Mark Recognition
(c) Optical Mark Reader (d) Optical Mark Resolution
4. Which of the following is not valid string in Python? 1
(a) “Hello” (b) ‘Hello’
(c) “Hello’ (d) None of the Above
5. What shape represents a decision in a flow chart? 1
(a)Oval (b) Diamond (c) Rectangle (d) Arrow
6. What will be the output of above Python code? 1
abc="6/4"
print("abc")
(a) 1 (b) 6/4 (c) 1.5 (d) abc
7. Which of the following will give "Simon" as output? 1
If str1="Hari,Simon,Vinod"
(a) print(str1[-7:-12]) (b) print(str1[-11:-7])
(c) print(str1[-11:-6]) (d) print(str1[-7:-11])
8. What is identity theft? 1
9. Accessing of data in a dictionary is done through : 1
(a)Index (b) value (c) key (d) cell number
10. Which of the following will be the output of the operation? 1
L1=[1,2]
L2=[3,4]
(L1 + L2)*2
(a) [2,4,6,8] (b) [1,2,3,4,1,2,3,4] (c) [1,3,4,4] (d) [3,4,1,2]
11. Which of the following can add a list of elements to a list? 1
(a) append() (b) extend() (c) add() (d) none of these
12. Which of the following is not a type of cyber criminals? 1
(a) Unauthorized account access (b) Email spoofing and spamming
(c) Mass attack using Trojans as botnets (d) Report vulnerability in any system

13. Which of the following can be termed as Cyber Bullying: 1


a) Posting Rumors online
b) Posting hate speech
c) Posting sexual remarks
d) All the above
14. How many asterisks does the following code 1
fragment print?
a=3
while a < 20:
print('*')
a += 1
(a)16 (b) 17 (c) 18 (d) 20
15. What is the output of the following? 1
>>>print('INDIA'.capitalize())
16. ‘Python is an interpreted high level language’. What does it mean to you? 1
Q17 and 18 are ASSERTION AND REASONING based questions. Mark the
correct
choice as
(a) Both A and R are true and R is the correct explanation for A
(k) Both A and R are true and R is not the correct explanation for A
(l) A is True but R is False
(m) A is false but R is True
17. Assertion (A) : Comments are non-executable statements that enable the users to 1
understand the program logic.
Reason (R) : They are basically statements used to put remarks. The comments
are used to explain the code and to make it more informative for the users.
Pick an appropriate statement from the given options:
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true and R is not the correct explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
18. Assertion (A) : In Python, the tuple is an immutable collection of data. 1
Reason (R) : It means that any change or alteration in data, is mentioned in the
same place. The updated collection will be use the same address for its storage.
Pick an appropriate statement from the given options:
(a) Both A and R are true and R is the correct explanation of A.
(b) Both A and R are true and R is not the correct explanation of A.
(c) A is true but R is false.
(d) A is false but R is true.
SECTION : B
19. What is output from the following code : 2
(i)range(6) (iii)range(5,20,4)
(ii)range(7,10) (iv)range (12,1,-2)
20. How the pop ( ) function is different from remove( ) function working with list in 2
python ?
OR
What will be the output of the following python code:
(i) a = [12,14,16,18,10]
print(a[-1:1:-2])
(ii) d = {'Name':'Ravi', 'Marks':90}
e = {'Age':16, 'Marks':95}
d.update(e)
print(d)
21. How the internet security is a major issue? Write any two solutions of internet 2
security threats.
22. What is mutable and immutable data objects in Python? Name any one of each 2
type.
23. Identify the valid and invalid identifiers 2
MyDiary, 1num, File123, _Clear, Mynameisking, while, Your.story, If
24. (i)Name the popular micro blogging social networking website 2
ii)To protect a computer from virus, you should install --------- in your computer.
A. backup wizard B. disk cleanup
C. antivirus D. disk defragmenter
25. What will be the output of the following Python code? 2
>>>x,y=5,10
>>>x,y=y,x
>>>x,y
a) 5,10 b) 10,10 c) 10,5 d) 5,5
OR
What will be the output of the following code
(i) List1=[13,18,16,16,13,18]
print(List1.index(16))
(ii) Strg=”computer”
print(Strg[ 0: 8 : 2]
SECTION: C
26. Convert the following numbers into their equivalent numbers. 3
(i) (29.75)10 = (………….)2 (ii) (A4B)16 = (… ............. )10
(iii) (1234)8 = (… ........ )16
27. Write a Python program to calculate bonus as the following criteria using if- elif 3
statement :
If salary between bonus
0 to 25000 25% of salary
25001 to 35000 15% of salary
35001 to 50000 10% of salary
50001 to 75000 05 % of salary
75001 and above nil
OR
What is difference between break and continue statement in Python explain with
example.

28. Go through the program of dictionary in python given below and predict the 3
output of program.
Student={"RollNo":10 , "Name":"Kuku" , "Class":11 , "Age":15}
T=len(Student)
Elm=Student.get("Name")
mylist=Student.items()
print("Length=",T)
print("Specific Element=",Elm)
print("My List=",mylist)
29. Find the output of the following code: 3
>>> L=["These", "are", "a", ["few", "words"], "that", "we", "will", "use"]
>>> print (L[3:4])
>>> print (L[1:4:-1])
>>> print ("few" in L)
>>> print (L[0::2])
>>> print (L[4:])
>>> print (L)
OR
te a program to check number of ‘H’ present in a string:
ALPS HEALS WITHOUT HURTING”
output will be displayed as:
Total number of ‘H’ is: 4
30. Consider the Following conversation and answer the question 3
Person 1:- What’s your name?
Person 2:- Radha
Person 1:- What is the name of your first school?
Person 2 :- Army Public School
Person 1 :- What are your Father and Mother name?
Person 2 :- Krishna and Sarita
Person 1 :- Who is your favorite actor or actress?
Person 2 :- Amitabh
Person 1:- What is the name of your pet animal?
Person 2 :- Tommy
Person 1 :- Where were you born and when?
Person 2:- Ajmer on 15 March 2002
Person 1 :- May I use your Laptop for online banking for fees payment
Person 2 :- Sure
(i) Who may be Victim of Cyber Crime Person1, Person 2 or both?
Justifyyour answer
(ii) Who is doing Ethical Hacking person1 or person2? Justify your Answer
(iii) Person 2 was using Key Logger software in his computer. What is it?
SECTION: D
31. Write a Python program to input 10 numbers to store in the list and print the 2+2
third largest number. For example, if the entered numbers in the list are List are
36, 25, 14, - 951, 75, - 85, 654, 88, 9521, 657, then output will be
The third largest number is : 654
32. What will be the output of the following code 4
i. type(34)
ii. a, b=10,20
a, b= b, a+b
print(a, b)
iii. a=20 + 4j
print(a.real + a.imag)
iv. print(10,20,30, sep=’*’,end=’@’)
SECTION: E
33. What will be the output of the following: 5
(a) [11, 14, 18, 10, 15]
(b) ['P', 'Y', 'T', 'H', 'O', 'N']
(c) L1.insert(0,12)
(d) L1.sort()
(e) L1.remove(14)
(f) L1.append(5)
(g) L2.pop()
(h) L1+L2
(i) L1.extend([12,16,18])
(j) L1*2
34. A code snippet using a dictionary is shown below and What will be the output of 5
the following :
dt={“Apple”:50, “Orange”:40, “Banana”:30 , “Mango”:80}
print(len(dt)) #Statement 1
print(dt.keys()) #Statement 2
print(dt.items()) #Statement 3
print(dt.popitem()) #Statement 4
print(dt.get("Banana")) #Statement5
Evaluate output of all statements.

35. a) What do you mean by Cyber safety? 1+2+2


b) What are different types of threats to computer security?
c) What is the need for secure password? How can one make a strong password?

You might also like