class11 sample of computer science
SAMPLE PAPER
COMPUTER SCIENCE
BLUE PRINT (COMPUTER SCIENCE XI-CS 2021 ) | ||||||
SESSION ENDING EXAMINATION 2020-21 | ||||||
CLASS:- XI | ||||||
Unit Name | PART - A | Part - B | Total(Marks) | |||
Section I | Section II | Section I | Section II | Section III | ||
Weightage of Question (Marks) | Weightage of Question (Marks) | |||||
1 | 4 | 2 | 3 | 5 | ||
Computer Systems and Organisation | 4 | 0 | 3 | 0 | 0 | 10 |
Computational Thinking and Programming - 1 | 8 | 2 | 5 | 3 | 2 | 45 |
Society, Law and Ethics | 3 | 0 | 2 | 1 | 1 | 15 |
Total (No. of Questions) | 15 | 2 | 10 | 4 | 3 | 70 |
Question No. | 1-21 (15+06 Choices) | 22-23 | 24-33 | 34-37 | 38-40 | |
General Instruction :- 1. Question paper contains two parts A and B. 2. Both Part A and Part B have choices. 3. Part-A has 2 sections: a. Section – I is short answer questions(Attempt 15 out of 21 questions). b. Section – II has two case studies questions. Each case study has 4 case-based subparts. An examinee is to attempt any 4 out of the 5 subparts. 4. Part - B is Descriptive Paper. 5. Part- B has three sections a. Section-I is short answer questions of 2 marks each in which two question have internal options. b. Section-II is long answer questions of 3 marks each in which two questions have internal options. c. Section-III is very long answer questions of 5 marks each in which one question has internal option. | ||||||
SET-I
Part-A | ||||||||||||
Section-I Attempt any 15 questions from question no 1 to 21. | ||||||||||||
1. | _________ is the part of the CPU that performs the arithmetic operations. | 1 | ||||||||||
2. | A nibble in computer memory is a group of _______.
| 1 | ||||||||||
3. | What is IPO cycle? | 1 | ||||||||||
4. | Which gates are known as universal gates? | 1 | ||||||||||
5. | “Unicode is the superset of all other character sets that have been encoded”. (Above statement is True or False). | 1 | ||||||||||
6. | Prove that X.(X+Y) = X by truth table method. | 1 | ||||||||||
7. | _______ is simply a sequence of steps for completing a task. | 1 | ||||||||||
8. | Is python a case sensitive language? | 1 | ||||||||||
9. | To increase the value of k five times using an assignment operator, the correct expression will be :
| 1 | ||||||||||
10. | Which of the following is an invalid identifier:
| 1 | ||||||||||
11. | What value will be returned, if x=math.floor(24.6)?
| 1 | ||||||||||
12. | Consider the loop given below. What will be the final value of I after the loop ? for I in range (11) : break | 1 | ||||||||||
13. | The _______ statement forms the selection construct in Python. | 1 | ||||||||||
14. | What will be the result of the expression “Class”+ “XI” * 2
| 1 | ||||||||||
15. | Varun wants to delete an element from the list whose value is known to him, he is confused with these list functions clear( ), pop( ) , remove( ) and del, which function he should use from these to remove an element matching a given value from the list. | 1 | ||||||||||
16. | Write any two characteristics of tuple. | 1 | ||||||||||
17. | _______ is a self-replicating virus and creates its multiple copies to eat up the entire memory of the computer. | 1 | ||||||||||
18. | What is plagiarism? | 1 | ||||||||||
19. | Discarded electrical or electronic devices are known as _______ . | 1 | ||||||||||
20. | Which is an example of an open source software
| 1 | ||||||||||
21. | Which cyber law in India deals with cyber-crimes? | 1 | ||||||||||
Section-II Both the Case study based questions are compulsory. Attempt any 4 sub parts from each question. Each question carries 1 mark | ||||||||||||
22. | Observe the following code of python and answer the question followed (any four) : x = ____ (input (“Enter value of x :” )) #line 1 st = “I love python” # line 2 print(len(st)) # line 3 f = list(st) # line 4 print(st) # line 5 st[7] = ‘P’ # line 6 having error
| 4 | ||||||||||
23. | What does each of the following expressions evaluate to? Suppose that L is the list having : L= [“These”, [“are”, “a”, “few”, “words”], “that”, “we”, “will”, “use”]
| 4 | ||||||||||
Part-B | ||||||||||||
Section-I | ||||||||||||
24. | Define System software and application software? | 2 | ||||||||||
25. | Convert the followings:- i) (146)8 = ( )10 (ii) (A2C)16 = ( )2 OR Write a note on ASCII and ISCII codes. | 2 | ||||||||||
26. | Write the equivalent Boolean expression for the given Logic Circuit : | 2 | ||||||||||
27. | Write one feature and one limitation of Python language. | 2 | ||||||||||
28. | Find error in the following code(if any) and correct code by rewriting code and underline the correction;- x= int(“Enter value of x:”) for i in range[0,10]: if x=>y: Print x+i | 2 | ||||||||||
29. | What is Run time error? Give examples. OR Explain use of % and //operators with example? | 2 | ||||||||||
30. | Differentiate between break and continue statement. Use appropriate examples. | 2 | ||||||||||
31. | Write two methods to delete an element from a dictionary with example. | 2 | ||||||||||
32. | What is Intellectual property? Give some examples of Intellectual properties. | 2 | ||||||||||
33. | What can be done to reduce the risk of identity theft ? Write any two ways. | 2 | ||||||||||
Section-II | ||||||||||||
34. | write a program to which accept SalesAmount from user then calculate and print discount amount per following criteria : Sales Amount Discount Less than 1000 5% of Sales Amount 1001 to 3000 7% of sales Amount More than 3000 10% of Sales Amount (e.g. if Sales amount is 800 then Discount amount would be 800*5/100 i.e 40) OR Write a program to print grade of a student as per input percentage as per criteria given below:-
| 3 | ||||||||||
35. | Find and write the output of the following python code : s = “C Vaccine#2021” k=len(s) m="" for i in range(0,k): if(s[i].isupper()): m=m+s[i].lower() elif(s[i].isalpha()): m=m+s[i].upper() elif(s[i].isdigit()): m=m+s[i-1] else: m=m+'@' print(m) | 3 | ||||||||||
36. | Answer the following questions :
x=0 while(x < 15): print(x) x = x +2
for x in [6,4,3,2,1]: print(x+10) | 2+1 | ||||||||||
37. | What are the benefits of e-Waste Recycling? OR Write at least three ethics to use social networking sites? | 3 | ||||||||||
Section-III | ||||||||||||
38. | Write a Python program to input 10 student names and their marks in a dictionary as a key value pair then print the names of those students who secures marks more than 60. | 5 | ||||||||||
39. | (i) Write a program to check whether a given integer is Prime or not. (ii) Write a program to check whether input year is a leap or not. OR
Example: Input list: [2,5,6,8,11,15,20,30] Output List: [1,10,3,4,22,30,10,15]
| 3+2 | ||||||||||
40. | Read the following situation and give answer after understanding it :
| 2+1+2= (5) |
*********END OF QUESTION PAPER********
ANSWER KEY
Part-A | |||||||||||
Section-I Attempt any 15 questions from question no 1 to 21. | |||||||||||
1. | _________ is the part of the CPU that performs the arithmetic operations. Ans: Arithmetic Logic Unit (ALU) 1 mark for correct answer | ||||||||||
2. | A nibble in computer memory is a group of _______.
Ans : 4 bits 1 mark for correct answer | ||||||||||
3. | What is IPO cycle? Ans : A computer takes input in the form of data and generate output in the form of information. This process of converting data into some meaningful information is called IPO cycle. ½ mark for each correct answer | ||||||||||
4. | Which gates are known as universal gates? Ans : NAND & NOR . 1 mark for correct answer | ||||||||||
5. | “Unicode is the superset of all other character sets that have been encoded”. Above statement is True or False). Ans : True 1 mark for correct answer | ||||||||||
6. | Prove that X.(X+Y) = X by truth table method. 1 mark for correct prove | ||||||||||
7. | A _______ is simply a sequence of steps for completing a task. Ans : Algorithm 1 mark for correct answer | ||||||||||
8. | Is python a case sensitive language ? Ans : Yes, 1 mark for correct answer | ||||||||||
9. | To increase the value of k five times using an augmented assignment operator, the correct expression will be
Ans : (ii) k*=5 1 mark for correct answer | ||||||||||
10. | Which of the following is an invalid identifier:
Ans : ‘ C. 2_myday 1 mark for correct answer | ||||||||||
11. | What value will be returned, if x=math.floor(24.6)?
1 mark for correct answer | ||||||||||
12. | Consider the loop given below. What will be the final value of I after the loop ? for I in range (11) : break Ans : 0 1 mark for correct answer | ||||||||||
13. | The _______ statement forms the selection construct in Python. Ans : if 1 mark for correct answer | ||||||||||
14. | What will be the result of the expression “Class”+ “XI” * 2
Ans : ‘ClassXIXI’ 1 mark for correct answer | ||||||||||
15. | Varun wants to delete an element from the list whose value is known to him, he is confused with these list functions clear( ), pop( ) , remove( ) and del, which function he should use from these to remove an element matching a given value from the list. Ans : remove( ) 1 mark for correct answer | ||||||||||
16. | Write any two characteristics of tuple. Ans: 1. Tuple is sequence of data value, 2. It is immutable data type ½ Mark for each correct characteristics | ||||||||||
17. | _______ is a self-replicating virus and creates its multiple copies to eat up the entire memory of the computer. Ans : WORM (1 mark for correct answer) | ||||||||||
18. | What is plagiarism ? Ans : Plagiarism is stealing someone else’s intellectual work and representing it as you own work without citing the source of information. 1 mark for correct answer | ||||||||||
19. | Discarded electrical or electronic devices are known as _______ . Ans : E-Waste 1 mark for correct answer | ||||||||||
20. | Which is an example of an open source software
Ans (d) Mozilla Firefox 1 mark for correct answer | ||||||||||
21. | Which cyber law in India deals with cyber-crimes? Ans : IT act 2000 1 mark forr correct answer | ||||||||||
Section-II Both the Case study based questions are compulsory. Attempt any 4 sub parts from each question. Each question carries 1 mark | |||||||||||
22. | Observe the following code of python and answer the question followed (any four) : x = ____ (input (“Enter value of x :” )) #line 1 st = “I love python” # line 2 print(len(st)) # line 3 f = list(st) # line 4 print(st) # line 5 st[7] = ‘P’ # line 6 having error
Ans : i) x = float (input (“Enter value of x :” )) ii) 13 iii) List iv) print(st.title()) v) string is immutable and a character on an index cann’t be changed this way. ( 1 Mark for each correct answer) | ||||||||||
23. | What does each of the following expressions evaluate to ? Suppose that L is the list having : [“These”, [“are”, “a”, “few”, “words”], “that”, “we”, “will”, “use”]
Answer : i) ['are”, “few”] ii) True iii) ['These', 'are', 'a', 'few', 'words'] iv) ['that', 'will']
1 Mark for each correct answer/output | ||||||||||
Part-B | |||||||||||
Section-I | |||||||||||
24. | Define System software and application software? Ans : There are broadly two categories of software :
Application Software : An application software is the set of programs necessary to carry out operation for a specified application. 1 mark for each correct category and explanation | ||||||||||
25. | Convert the followings:- i) (146)8 = ( )10 (ii) (A2C)16 = ( )2 Ans : i) 102 ii) 101000101100 (1 mark for each correct conversion) OR Write a note on ASCII and ISCII codes. (1 mark for each correct explanation) | ||||||||||
26. | Write the equivalent Boolean expression for given Logic Circuit : Ans : (P+Q’)(Q+R’) 1 mark for each correct expression | ||||||||||
27. | Write one feature and one limitation of Python language. (1 Mark for correct feature and 1 Mark for limitation) | ||||||||||
28. | Find error in the following code(if any) and correct code by rewriting code and underline the correction;- Ans: x= int(input(“Enter value of x:”) for i in range(0,10): if x>=y: print(x+i) ½ mark for each correction | ||||||||||
29. | Define Run time error? Give example. (1 mark for correct definition and 1 mark for example) OR Explain use of % and //operators with example? (1 mark for correct explanation of operator and 1 mark for example) | ||||||||||
30. | Differentiate between break and continue statement. Use appropriate examples.. (1 Mark for correct difference and 1 Mark for the example) | ||||||||||
31. | Which are the two ways to delete elements from a dictionary? Give example of any one way. Ans: For deleting element from a dictionary we can use either del statement, pop( ) function and popitem( ) function. The del statement can be used as follows : del <dictionary>[<key>] person={“sal”:20000, ‘age’:29, ‘Name’: “Manoj”} del person[‘age’] (1 mark for correct ways to delete one mark for any correct example) | ||||||||||
32. | What is Intellectual property? Give some examples of digital properties. (1 Mark for explaining Intellectual property and 1 mark for examples) | ||||||||||
33. | What can be done to reduce the risk of identity theft? Write any two ways. Ans : i) Use of unique ids to protect your devices and accounts. ii) Using bio-metric protection. (1 mark for each any correct way to reduce risk) | ||||||||||
Section-I | |||||||||||
34. | Write a program to which accept SalesAmount from user then calculate and print discount amount per following criteria : Sales Amount Discount Less than 1000 5% of Sales Amount 1001 to 3000 7% of sales Amount More than 3000 10% of Sales Amount (e.g. if Sales amount is 800 then Discount amount would be 800*5/100 i.e 40) 1 mark for input & output, 2 marks for conditions & calculating discount OR Write a program to print grade of a student as per input percentage as per criteria given below:-
1 mark for input & output, 2 marks for conditions & calculating grade or (Any correct code program to do the given task is accepted, step marking for the code as per board scheme) | ||||||||||
35. | Find and write the output of the following python code : s = “C Vaccine#2021” k=len(s) m="" for i in range(0,k): if(s[i].isupper()): m=m+s[i].lower() elif(s[i].isalpha()): m=m+s[i].upper() elif(s[i].isdigit()): m=m+s[i-1] else: m=m+'@' print(m) Answer : c@vACCINE@#202 (1 mark for character correctly, 1 mark for digit and 1 mark for rest character) | ||||||||||
36. | Answer the following questions :
x=0 while(x < 15): print(x) x = x +2 Answer : for x in range(0,15,2): print(x) (2 mark for any correct conversion)
for x in [6,4,3,2,1]: print(x+10) Answer : 5 (1 mark for correct answer) | ||||||||||
37. | What are the benefits of e-Waste Recycling ? (1 Mark for each correct benefit) OR Write at least three ethics to use social networking sites? (1 Mark for each ethics) | ||||||||||
38 | Write a Python program to input 10 student name and their marks in a dictionary as key value pair then print the names of those students who secures marks more than 60. 2 marks for input and creating dictionary 1 marks for correct loop for search 1 marks for checking condition 1 marks for output (Any correct code program to do the given task is accepted) | ||||||||||
39. | (i) Write a program to check whether given integer is Prime or not.(3) (ii) Write a program to check whether input year is a leap or not. (2) Any correct code program to do the given task is accepted, step marking for the code as per board scheme) OR
Example: Input list: [2,5,6,8,11,15,20,30] Output List: [1,10,3,4,22,30,10,15]
Any correct code program to do the given task is accepted, step marking for the code as per board scheme) | ||||||||||
40. | Read the following situation and give answer after understanding it : i) Manoj is preparing a project on “Digital India Initiative”. He got information from the internet. He downloaded web pages and images containing information on “Digital India Initiative”. He used these data and images in his project without quoting the source, Is Manoj has committed any cyber crime, if yes name the crime and give justification. ii) Manoj received an e mail from SBI department. On clicking on it, he was taken to a site designed to imitate an official-looking website, such as SBI. He uploaded some important information on it. Identify and explain the cybercrime being discussed in the scenario. iii) Explain any two ways in which technology can help students with disabilities. Ans : i) Yes, Manoj is doing Plagiarism because he is using someone else’s work and showing as he have done this work. (1/2 Mark for say yes, ½ for correct identification as crime, 1 mark for explanations)
(1 mark for correct crime naming )
Screen reader Eye Tracking Mouse Conversion of local language to Braille (1 mark for correct way) |
*********END********
SET-II
Q.No | Part-A | Marks |
Section-I (Attempt any 15 questions from question no 1 to 21.) | ||
1 | 2 GB = ___ Bytes. | 1 |
2 | Which one is valid relational operator in Python
| 1 |
3 | Which of the following can be used as valid variable identifiers in Python? i) 4th Sum ii) Total iii) Number# iv) -Data | 1 |
4 | Identify the mutable data types?
| 1 |
5 | ____________ is the read only memory that stores some pre-written instructions. | 1 |
6 | Name any 2 secondary storage devices? | 1 |
7 | The ________ operator in Boolean algebra performs OR operation. | 1 |
8 | Which of the following fall under utilities software? (i)Text editor (ii) backup (iii) Disk defragmenter (iv) All of the above | 1 |
9 | A ________ is a program that appears harmless but actually performs malicious functions. | 1 |
10 | What will be the output of the following? print(17//4) print(len(str(17//4))) | 1 |
11 | What is the output of the below program? x,y=7,2 x,y,x=x+1,y+3,x+10 print(x,y) | 1 |
12 | Name the python library need to be imported to invoke following function
| 1 |
13 | Which cyber law in India deals with cyber-crimes? | 1 |
14 | Write logical expression for the following: “Age between 18 to 35” | 1 |
15 | t1=(2,3,4,5,6) print(t1.index(4)) output is
| 1 |
16 | Define cyber bullying. | 1 |
17 | Copying programs written by other programmers and claiming them as your own could be an act of __________________. | 1 |
18 | Full form of ASCII. | 1 |
19 | Find the error in the following code: x,y=10 | 1 |
20 | Consider the string str=”Green Revolution”. Write statement in Python to implement the following: -to check whether the string contains ‘vol’ or not? | 1 |
21 | Name of any two open source soft wares. | 1 |
Section-II Both the case study based questions are compulsory. Attempt any 4 subparts from each question. Each question carries 1 mark. | ||
22 | Kids Elementary Technologies help nursery children to improve their handwriting and writing skills such as word formation, recognition of lower and uppercase letters and small sentences formation. A program has been written by the programmer that should prompt the child to type some sentence(s) followed by “enter”. It should then print the original sentence(s) and the following statistics relating to the sentence(s): ->number of words ->number of characters (including white space & punctuation) ->percentage of characters that are alphanumeric. Help the programmer to complete the program, by filling correct statements in the blanks. s=input("Enter a sentence : ") number_of_words =1 number_of_characters = _____________ statement1 p=_______________________ statement2 al_num=0 for i in s: if _____________________ : statement3 al_num+=1 if i==' ': number_of_words+=___________ statement4 p= __________________ statement5 print("number of words are : ",number_of_words) print("number of characters are : ",number_of_characters) print("percentage of characters that are alphanumeric is : ",p,"%") Write statements for the following:
| 4 |
23 | Mr Shyam is trying to develop a program based on list manipulations. He is supposed to add/remove elements in the list, Help him to write the most appropriate list method to perform the following tasks in the list (attempt any 4 out of the following): Name of list is Marks=[10,20,30,40,50,60] a)delete an element value 20 from the list. b)get the position of an element 40 in the list c)delete the 3rd element from the list d)add single element 70 at the end of the list e) add another list [80,90,100] at the end of the list. | 4 |
Part-B | ||
Section-I | ||
24 | Write any two differences between an interpreter and a compiler. | 2 |
25 | Perform the following conversions:
| 2 |
26 | Verify the following using truth table: X+Y.Z=(X+Y).(X+Z) OR Draw logic circuit for following expression: (A+B)’. (B’+C) | 2 |
27 | Convert the following for loop into while loop: for k in range(10,20,5): print (k) | 2 |
28 | Rewrite the following code after removing syntax error and underline the correction: x=int(“Enter value for x:”) for y in range[0,11]: if x=y print(x+y) Else: Print x-y | 2 |
29 | What is meant by the terms Cyber Crime & Cyber Forensics? | 2 |
30 | Ms Smitha has many electronic gadgets which are not usable due to outdated hardware and software. Help her to find 2 best ways to dispose the used electronic gadgets. | 2 |
31 | Differentiate between a list & a tuple with example. OR Differentiate between pop() & remove() functions of a list with examples. | 2 |
32 | Predict the output of the following code: x=1 if x>3: if x>4: print(‘a’) else: print(‘b’) elif x<2: if (x!=0): print(‘c’) print(‘d’) | 2 |
33 | Write a program to check whether a given integer is even or odd. | 2 |
Section II | ||
34 | Write a program in python to generate the terms of the Fibonacci series up to nth term. Program should ask the user to enter the value of ‘n’. OR Write a program to input a number and generate the mathematical table of that number only if that number is divisible by 2. | 3 |
35 | Write a program in python to read a string and count the number of vowels and consonants in the string separately. | 3 |
36 | Write a program in python to display the square of an element if it is an integer and change the case if the element is a string. List contains both integers and strings. If the List L is : [10, “FUN”, 40, “FEW”, 50, “FULL”] The final list should be: [100, “fun”, 1600, “few”, 2500, “full”] | 3 |
37 | Write any 3 methods to prevent Identity theft? OR Define the following terms:
| 3 |
Section-III | ||
38 | Write a program to exchange the first half elements of the list with the second half elements of list assuming the list is having even number of elements. If List L is : [10,20,30,40,50,60], then final list must be : [40,50,60,10,20,30] OR
| 5 |
39 | Write a program in python to input five state names and their capital in a Dictionary as a Key Value pair, then ask the user to enter state and print its capital if found in a dictionary, otherwise print message “State not found in dictionary”. | 5 |
40 | a) Explain gender and disability issues briefly while teaching and using computers. b) What should I do, if I have already responded to a phishing email and fear I may be victim of identity theft ? | 2+3=5 |
ANSWER KEY
Q.No | Answer/Marking Scheme | Marks |
1 | 2147483648 | 1 |
2 | (iii) = = | 1 |
3 | ii) Total | 1 |
4 | (i)List | 1 |
5 | ROM | 1 |
6 | 1 mark for writing names of any 2 secondary storage devices.(1/2 mark for one) | 1 |
7 | + | 1 |
8 | (iv) All of the above | 1 |
9 | Trojan horse | 1 |
10 | 4 1 | 1 |
11 | Output: 17 5 | 1 |
12 | (i)math (ii)random | 1 |
13 | Information Technology Act 2000 or Information Technology Amended Act 2008 | 1 |
14 | age>=18 and age<=35 | 1 |
15 | (iv) 2 | 1 |
16 | 1 mark for correct definition | 1 |
17 | Plagiarism | 1 |
18 | ASCII (American Standard code for Information Interchange) | 1 |
19 | There should be one more value on right hand side . x,y=10,20 | 1 |
20 | ‘vol’ in str | 1 |
21 | 1 mark for any two . ½ mark for one | 1 |
22 |
| 4 |
23 | a)marks.remove(20) b)marks.index(40) c) marks.pop(2)/del marks[2] d)marks.append(70) e)marks.extend([80,90,100]) or marks+[80,90,100] | 4 |
24 | 2 marks for writing at least 2 correct differences. 1 mark for one difference | 2 |
25 | 1. (1111010) 2. (315) | 2 |
26 | 2 marks for correct verification using the truth table. Or 2 marks for correct logic circuit | 2 |
27 | k=10 While (k<20): print(k) k+=5 | 2 |
28 | x=int(input(“Enter value for x:”)) for y in range(0,11): if x==y : print(x+y) else: print (x-y) (1/2 mark for each correction) | 2 |
29 | Any criminal act that is facilitated by the use of electronic gadgets (computer, laptop, mobile, etc.) involving communications or information systems through internet is called cybercrime. Cyber Forensics is an electronic discovery technique used to determine and reveal criminal evidence. (1 mark for each correct answer) | 2 |
30 |
(2 marks for any 2 points) | 2 |
31 | 2 marks for the correct differences. | 2 |
32 | c d | 2 |
33 | ½ mark to read a number and convert it into integer. 1 mark for the correct condition statement of the program ½ mark for printing the output .
| 2 |
34 | ½ mark for reading the value of n (no. of terms to be generated) in int format ½ mark for initializing the starting values ½ mark for using the loop correctly 1 mark for the correct logic of the program ½ mark for printing the output OR ½ mark for reading the value of n in int format 1 mark for using the loop correctly ½ mark for condition the loop correctly 1/2 mark for the correct logic of the program ½ mark for printing the output | 3 |
35 | Full marks for correct program. partial marks for partial correct | 3 |
36 | 3 marks for the correct program and using the appropriate functions. | 3 |
37 | 3 marks for writing any 3 correct methods. 1 mark for 1 method Or 1 mark for each definition | 3 |
38 | 5 marks for the correct program. Or
| 5 |
39 | Full marks for correct program. partial marks for partial correct statements | 5 |
40 | a)1 mark for gender issue, 1 mark for disability issue b)1 mark for one solution. | 5 |
SET-III
PART-A |
| |
| Section-I Select the most appropriate option out of the options given for each question. Attempt any 15 questions from question no1 to 21 |
|
1 | Which of the following is valid arithmetic operator in Python: (i) // (ii) (iii) < (iv) and | 1 |
2 | Which of the following can be used as valid variable identifiers in Python? i) 4th Sum ii) Total iii) Number# iv) _Data | 1 |
3 | Which symbol is used to write a single line comment and multiline comment? | 1 |
4 | Why operating system is needed for a computer? | 1 |
5 | What is the storage capacity of DVD? | 1 |
6 | Write one difference between Random access memory and Read only memory. | 1 |
7 | Define Eavesdropping. | 1 |
8 | Name the Python Library modules which need to be imported to invoke the following functions : randint() floor () | 1 |
9 | 2 GB = _____ Bytes | 1 |
10 | Identify the mutable and immutable data types?
| 1 |
11 | Write a Python Dictionary named student with keys 12101,12102,12103 and corresponding values as ‘Rahul’,’Ravi’,’Mahesh’ respectively | 1 |
12 | What is the length of the tuple t shown below? t=((((‘a’,1),’b’,’c’),’d’,2),’e’,3) print(len(t)) | 1 |
13 | Write one example of System Software and Application software. | 1 |
14 | If the following code is executed, what will be the output of the following code? str="KendriyaVidyalayaSangathan" print(str[8:13]) | 1 |
15 | Your friend Sunita complaints that somebody has created a fake profile on Twitter and defaming her character with abusive comments and pictures. Identify the type of cybercrime for these situations. | 1 |
16 | What is the value of the expression 4+2**5//10 | 1 |
17 | Which of the following is wrong dictionary declaration? (a) d= {“mon” : 1, “tue” : 2, “wed” : 3} (b) d= {1 : "mon", 2 : "tue",3 : "wed"} (c) d= {[1,2] : "hello"} (d) d= {(1,2) , "hello"} | 1 |
18 | Define Intellectual property right? | 1 |
19 | The practice of taking someone else's work or ideas and passing them off as one's own is known as _____________ | 1 |
20 | Define WORM virus. | 1 |
21 | What do you understand by the term debugging? | 1 |
Section-II Both the case study based questions are compulsory. Attempt any 4 subparts out of 5 from each question. Each question carries 1 mark. | ||
22. | Suggest appropriate functions for the following tasks – (a) To check whether the string contains only digits. (b) To find the occurrence of a string within another string. (c) To convert the first letter of a string to uppercase. (d) To convert all the letters of a string to upper case. (e) To remove all the white spaces from the beginning of a string. | 4
|
23. | Mr. Kushal is a learning software developer. He has been assigned the duty of analysing and finding output of the python program codes. He receives the following python statement of the list. K=[10,20, ‘BOOK’,30, 9.5, ‘ITEMS’, 40, 5, 35,90,75] Consider the above list help him to get the correct output the following statements:
| 4 |
PART-B | ||
Section-I | ||
24. | Write the following expressions using operators used in Python: i) x = a3+ b3 ii) A=πr(r+h) | 2 |
25. | Find and write the output of the following python code: for x in range(10,20): if( x % 2==0): continue print(x) | 2 |
26 | Rewrite the following code in python after removing all syntax error(s). Underline each correction done in the code. 30=To for K in range(0,To) IF k%4=0 print (K*4) else: print (K+3) | 2 |
27 | What is the difference between compiler and interpreter? | 2 |
28 | Draw a Logical Circuit Diagram for the following Boolean Expression: AB’+C’D | 2 |
29 | Convert the Following as Directed (i) (534) 10 =(?) 2 (ii) (110101011) 2 =(?) 8 | 2 |
30 | Write a program which accepts sale price and cost price and tell whether the shopkeeper is in profit, in loss or neither in profit nor in loss. OR Write a program which accepts an integer number whether it is a three digits number or not. | 2 |
31 | Rewrite the following program using for loop : sum=0 i=1 while (i<=10): sum=sum+i i=i+1 print(“sum=”,sum) | 2 |
32 | Rita has recently changed her school. Someone is posting negative and demeaning comments on her social networking profile. Every time she goes online, she finds someone chasing her.
| 2 |
33 | Define Digital Footprint and Computer Forensics . OR How can we protect our computer from cyber threats? (give only 2 points) | 2 |
Section-II | ||
34 | Find and write the output of the following python code: Msg="CompuTer" Msg1='' '' for i in range(0, len(Msg)): if Msg[i].isupper(): Msg1=Msg1+Msg[i].lower() elif i%2==0: Msg1=Msg1+'#' else: Msg1=Msg1+Msg[i].upper() print(Msg1) | 3 |
35 | Write a program to display Fibonacci series upto n terms OR Write a program to check whether an integer number input by a user is prime or not? | 3 |
36 | Write a Python program to sum all the even and odd numbers of a list. Sample List : [8, 2, 3, 0, 9] Sum of even numbers=10 Sum of odd numbers=12 | 3 |
37 | How can we hide our identity on the internet? (give only 3 points) OR State any 3 rules to be followed while working on social media. | 3 |
Section-III |
PART-A |
| |
| Section-I Select the most appropriate option out of the options given for each question. Attempt any 15 questions from question no1 to 21 |
|
1 | Which of the following is valid arithmetic operator in Python: (i) // (ii) (iii) < (iv) and | 1 |
2 | Which of the following can be used as valid variable identifiers in Python? i) 4th Sum ii) Total iii) Number# iv) _Data | 1 |
3 | Which symbol is used to write a single line comment and multiline comment? | 1 |
4 | Why operating system is needed for a computer? | 1 |
5 | What is the storage capacity of DVD? | 1 |
6 | Write one difference between Random access memory and Read only memory. | 1 |
7 | Define Eavesdropping. | 1 |
8 | Name the Python Library modules which need to be imported to invoke the following functions : randint() floor () | 1 |
9 | 2 GB = _____ Bytes | 1 |
10 | Identify the mutable and immutable data types?
| 1 |
11 | Write a Python Dictionary named student with keys 12101,12102,12103 and corresponding values as ‘Rahul’,’Ravi’,’Mahesh’ respectively | 1 |
12 | What is the length of the tuple t shown below? t=((((‘a’,1),’b’,’c’),’d’,2),’e’,3) print(len(t)) | 1 |
13 | Write one example of System Software and Application software. | 1 |
14 | If the following code is executed, what will be the output of the following code? str="KendriyaVidyalayaSangathan" print(str[8:13]) | 1 |
15 | Your friend Sunita complaints that somebody has created a fake profile on Twitter and defaming her character with abusive comments and pictures. Identify the type of cybercrime for these situations. | 1 |
16 | What is the value of the expression 4+2**5//10 | 1 |
17 | Which of the following is wrong dictionary declaration? (a) d= {“mon” : 1, “tue” : 2, “wed” : 3} (b) d= {1 : "mon", 2 : "tue",3 : "wed"} (c) d= {[1,2] : "hello"} (d) d= {(1,2) , "hello"} | 1 |
18 | Define Intellectual property right? | 1 |
19 | The practice of taking someone else's work or ideas and passing them off as one's own is known as _____________ | 1 |
20 | Define WORM virus. | 1 |
21 | What do you understand by the term debugging? | 1 |
Section-II Both the case study based questions are compulsory. Attempt any 4 subparts out of 5 from each question. Each question carries 1 mark. | ||
22. | Suggest appropriate functions for the following tasks – (a) To check whether the string contains only digits. (b) To find the occurrence of a string within another string. (c) To convert the first letter of a string to uppercase. (d) To convert all the letters of a string to upper case. (e) To remove all the white spaces from the beginning of a string. | 4
|
23. | Mr. Kushal is a learning software developer. He has been assigned the duty of analysing and finding output of the python program codes. He receives the following python statement of the list. K=[10,20, ‘BOOK’,30, 9.5, ‘ITEMS’, 40, 5, 35,90,75] Consider the above list help him to get the correct output the following statements:
| 4 |
PART-B | ||
Section-I | ||
24. | Write the following expressions using operators used in Python: i) x = a3+ b3 ii) A=πr(r+h) | 2 |
25. | Find and write the output of the following python code: for x in range(10,20): if( x % 2==0): continue print(x) | 2 |
26 | Rewrite the following code in python after removing all syntax error(s). Underline each correction done in the code. 30=To for K in range(0,To) IF k%4=0 print (K*4) else: print (K+3) | 2 |
27 | What is the difference between compiler and interpreter? | 2 |
28 | Draw a Logical Circuit Diagram for the following Boolean Expression: AB’+C’D | 2 |
29 | Convert the Following as Directed (i) (534) 10 =(?) 2 (ii) (110101011) 2 =(?) 8 | 2 |
30 | Write a program which accepts sale price and cost price and tell whether the shopkeeper is in profit, in loss or neither in profit nor in loss. OR Write a program which accepts an integer number whether it is a three digits number or not. | 2 |
31 | Rewrite the following program using for loop : sum=0 i=1 while (i<=10): sum=sum+i i=i+1 print(“sum=”,sum) | 2 |
32 | Rita has recently changed her school. Someone is posting negative and demeaning comments on her social networking profile. Every time she goes online, she finds someone chasing her.
| 2 |
33 | Define Digital Footprint and Computer Forensics . OR How can we protect our computer from cyber threats? (give only 2 points) | 2 |
Section-II | ||
34 | Find and write the output of the following python code: Msg="CompuTer" Msg1='' '' for i in range(0, len(Msg)): if Msg[i].isupper(): Msg1=Msg1+Msg[i].lower() elif i%2==0: Msg1=Msg1+'#' else: Msg1=Msg1+Msg[i].upper() print(Msg1) | 3 |
35 | Write a program to display Fibonacci series upto n terms OR Write a program to check whether an integer number input by a user is prime or not? | 3 |
36 | Write a Python program to sum all the even and odd numbers of a list. Sample List : [8, 2, 3, 0, 9] Sum of even numbers=10 Sum of odd numbers=12 | 3 |
37 | How can we hide our identity on the internet? (give only 3 points) OR State any 3 rules to be followed while working on social media. | 3 |
Section-III | ||
38 | Write a program which accepts 10 teachers' names and their subject as key value pairs in a dictionary and displays the name of those teachers whose subject is either English or Maths. OR
| 5 (3+2) |
39 |
What will be the output of following expression: print((A>B) and (B>C) or (C>A)) | 5 |
40 |
| 3+2=5 |
ANSWERV KEY
| PART-A |
|
| Section-I Select the most appropriate option out of the options given for each question. Attempt any 15 questions from question no1 to 21 |
|
1 | // | 1 |
2 | Total, _Data | 1 |
3 | # (Hash Symbol) for single line, Triple quotes for multi line comment | 1 |
4 | Because computer can’t work without operating system. Computer without operating system just like a car without petrol. | 1 |
5 | 4.7 GB | 1 |
6 | RAM is volatile whereas ROM is non-volatile. RAM is read-write memory whereas ROM is read only. 1 mark for any correct difference | 1 |
7 | Unauthorized monitoring of other people’s communication is called eavesdropping. 1 mark for correct definition | 1 |
8 | Random Math | 1 |
9 | 2GB= 2x1024x1024x1024 Bytes | 1 |
10 | List, Dictionary are Mutable, Tuple and String are Immutable | 1 |
11 | student={12101:'Rahul',12102:'Ravi',12103:'Mahesh' } | 1 |
12 | 3 | 1 |
13 | System Software: MS-Windows, Compiler, Interpreter Application Software: MS-Word, Excel | 1 |
14 | Vidya | 1 |
15 | Identity theft | 1 |
16 | 7 | 1 |
17 | (c) d= {[1,2] : "hello"} | 1 |
18 | Intellectual Property Rights are the rights of owner of information to decide how much information is to be exchanged, shared or distributed. Also it gives the owner a right to decide the price for doing (Exchanging / sharing / distributing) so. | 1 |
19 | Plagiarism | 1 |
20 | A worm is a self-replicating program which eats up the entire disk space or memory. A worm keeps on creating its copies until all the disk space or memory is filled. | 1 |
21 | Debugging is the process of detecting and removing of existing and potential errors (also called as 'bugs') in a software code that can cause it to behave unexpectedly or crash. | 1 |
Section-II Both the case study based questions are compulsory. Attempt any 4 subparts out of 5 from each question. Each question carries 1 mark. | ||
22. | (a) isdigit() (b) count() (c) capitalize() (d) upper() (e) lstrip() 1 mark for each | 4
|
23. |
1 mark for each | 4 |
| PART-B |
|
| Section-I |
|
24 |
1 mark for each | 2 |
25 | 19 2 marks for correct output | 2 |
26 | To=30 for K in range(0,To) : if k%4==0: print (K*4) else: print (K+3) ½ mark for each correction | 2 |
27 | 1 mark each for any 2 differences | 2 |
28 |
2 marks for correct circuit | 2 |
29 | (i) (534)10 = (10 0001 0110)2 (ii) (110101011)2 = (653)8 (1 mark for each) | 2 |
30 | sp=float(input(“enter sale price”)) cp=float (input (“cost price”)) if sp>cp: print(“Profit”) elif cp>sp: print(“loss”) else: print(“neither profit nor loss”) 1 mark for correct input 1 mark for correct if..elif.. OR num=int(input(“enter a no”)) if num>=100 and num<=999: print(“it is 3 digit integer”) else: print(“it is not a three digit integer’) Half mark for correct for input One and half mark for correct if...else (Any correct code program to do the given task should be accepted) | 2 |
31 | sum=0 for i in range(1,11): sum=sum+i print(“sum=”,sum) 1/2 mark for initializing 1 mark for correct loop 1/2 mark for display of output (Any other correct code of program to do the given task should also be accepted) | 2 |
32 |
| 2 |
33 | Digital foot print: are the records and traces of individual’s activities as they use internet. digital footprint are permanently stored. Computer Forensics or Digital forensics refers to methods used for interpretation of computer media for digital evidence. OR
(2 marks for any 2 correct points) | 2 |
Section-II | ||
34 | cO#P#t#R (3 marks for correct output or 1 and half marks for partial correct output) | 3 |
35 | nterms = int(input("How many terms? "))
n1, n2 = 0, 1 count = 0
# check if the number of terms is valid if nterms <= 0: print("Please enter a positive integer") elif nterms == 1: print("Fibonacci sequence upto",nterms,":") print(n1) else: print("Fibonacci sequence:") while count < nterms: print(n1) nth = n1 + n2 # update values n1 = n2 n2 = nth count += 1 1 mark for initializing 1 mark for while loop 1 mark for display of output (Any other correct code of program to do the given task should also be accepted) or #Write a program to check a number is prime or not num=int(input("Enter number ")) d=2 while d<=num: r=num%d if r==0: break else: d=d+1
if d==num: print("It is a prime number") else: print("It is not a prime number ")
half mark for input 1 and half mark for while loop and condition 1 mark for if else and print output (Any other correct code of program to do the given task should also be accepted) | 3 |
36 | numList = [8,2,3,0,7] Even_Sum = 0 Odd_Sum=0 for i in numlist: if(NumList[i] % 2 == 0): Even_Sum = Even_Sum + NumList[j] else: Odd_Sum = Odd_Sum + NumList[j]
print("\nThe Sum of Even Numbers in this List = ", Even_Sum) print("The Sum of Odd Numbers in this List = ", Odd_Sum) 1 mark for initializing 1 mark for checking condition 1 mark for display of output (Any other correct code of program to do the given task should also be accepted) | 3 |
37 | 1.Use Virtual Private Network (VPN) 2.Use Proxy (Torr Browser has proxy integrated in it) 3.Use Incognito Browsing
OR
1 mark for each | 3 |
Section-III | ||
38 | teacher={} for i in range(10): name=input("enter teacher name ") subject=input("enter subject ") teacher[name]=subject for key in teacher: if teacher[key]=="english" or teacher[key]=="maths": print("teacher name", key, "His subject :", teacher[key]) 2 and half marks for creating dictionary by taking input 2 and half marks for finding and printing maths and english teachers (Any other correct code of program to do the given task should also be accepted) or #program to remove vowel from string string=input("enter string") newstring=" " for ch in string: if ch not in "aieou": newstring+=ch print("string after removal of vowels ", newstring)
half mark for input 1 mark correct loop 1 mark for if..condition half mark for printing (Any other correct code of program to do the given task should also be accepted) #PROGRAM TO PRINT TABLE OF ANY NUMBER a=int(input("Enter number for table ")) for b in range(1,11) print(a*b) half mark for input 1 mark correct loop half mark for printing output (Any other correct code of program to do the given task should also be accepted) | 5 |
39 |
None
1 mark for each | 5 |
40 | 1 mark for definition, 1 mark for risks associated with e waste, 1 mark for recycle e-waste ideas. OR 1 mark for each disability issue. | 3+2 |
************ End of Marking Scheme ********************
Question No. | Part-A | Marks allocated |
Section-I Select the most appropriate option out of the options given for each question. Attempt any 15 questions from question no 1 to 21. | ||
1 | Find the valid identifier from the following a) break b) else c) Break d) My_Name | 1 |
2 | Given the lists L=[10,91,17,12,5,6] , write the output of print(L[:5]) | 1 |
3 | Expand RAM and ROM. | 1 |
4 | Identify the valid logical operator in Python from the following. a) ? b) < c) ** d) and | 1 |
5 | Suppose a tuple T is declared as T = (40, 22, 53, 39), which of the following is incorrect? a) print(T[2]) b) T[2] = -67
| 1 |
6 | Write a statement in Python to declare a dictionary whose keys are 1, 2, 3 and values are Monday, Tuesday and Wednesday respectively. | 1 |
7 | Write one mutable and one immutable data types name? | 1 |
8 | What will be the value of following code print(17%3) print(21//6) | 1 |
9 | What do you mean by e-Waste? | 1 |
10 | Full form of IPR | 1 |
11 | After practical, Atul left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atul. He sends inflammatory email messages to few of his classmates using Atul’s email account. Revaan’s activity is an example of which of the following cyber crime? Justify your answer. a) Hacking b) Identity theft c) Cyber bullying d) Plagiarism | 1 |
12 | After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying? a) You sent an email to your friend with a message saying that “I am sorry”. b) You sent a threatening message to your friend saying “Do not try to call or talk to me c) You created an embarrassing picture of your friend and uploaded on your account on a social networking site. d) All of the above | 1 |
13 | Expand ISCII . | 1 |
14 | Convert (31)10 = (?)2 | 1 |
15 | Write the name of universal gate(s). | 1 |
16 | Identify the data type of L: L = (‘Mon’, ‘23’, ‘hello’, ’60.5’) a. dictionary b. string c.tuple d. list | 1 |
17 | If the following code is executed, what will be the output of the following code? name="LetsWaitForGoodTimes" print(name[3:8]) | 1 |
18 | Write the two name of utility software. | 1 |
19 | What do you mean by Unicode? | 1 |
20 | Define Trojan Horse briefly. | 1 |
21 | Write the statement to import math module. | 1 |
Section-II Both the Case study based questions are compulsory. Attempt any 4 sub parts from each question. Each question carries 1 mark | ||
22 | The record of a student (Name, Roll No., Marks in five subjects and percentage of marks) is stored in the following list: (Any Four) student = ['Raman','A-36',[56,98,99,72,69],78.8] Write Python statements to print the following information from the list student using index number:- a) Percentage of the student b) Marks in the fifth subject c) Maximum marks of the student d) To add mobile number of student at the end of the list. e) Change the name of the student from ‘Raman’ to ‘Raghav’ | 4 |
23 | Shivi has stored contact numbers of her friends along with name in following format:-. D1= {‘Ram’:267287, ‘Sham’:234567, ‘Sita’: 987654, ‘Pooja’:231243} help her to do following task:
| 4 |
Part – B | ||||
Section-I | ||||
24 | Evaluate the following expressions: a) 16 * 13 + 4**2 // 5 b) 10 > 5 and 7 > 12 or not 18 > 3 | 2 | ||
25 | Write a program that inputs a number and checks number is negative, positive or Zero. OR Write a program to check whether input integer number is even or odd. | 2 | ||
26 | Write any two Ethics to use social networking sites. | 2 | ||
27 | Differentiate between application software and system software. OR What is operating system? Write any two functions of OS? | 2 | ||
28 | Rewrite the following code in python after removing all syntax error(s).Underline each correction done in the code x=integer(input('Enter 1 or 10')) if x=1: for x in range(1,11) Print(x) Else: for x in range[10,0,-1]: print(x) | 2 | ||
29 | State and Prove De Morgan’s Laws using Truth table. | 2 | ||
30 | What do you mean by Plagiarism? Write one example. | 2 | ||
31 | Write any two differences between Complier and interpreter. | 2 | ||
32 | Convert the following for loop code in to while loop. for x in range (1,100,2): Print(x) | 2 | ||
33 | What do you mean by logical errors? Explain with the help of suitable example | 2 | ||
Section- II | ||||
34 | Define the following terms:-
| 3 | ||
35 | Write a program in python to print Fibonacci series. 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55 | 3 | ||
37 | What will be the output of the following code segment: a. myList = [1,2,3,4,5,6,7,8,9,10] del myList[3:] print(myList) b. myList = [1,2,3,4,5,6,7,8,9,10] del myList[:5] print(myList) c. myList = [1,2,3,4,5,6,7,8,9,10] del myList[::2] print(myList) OR Consider the following string mySubject: mySubject = "Computer Science" What will be the output of the following string operations : i. print(mySubject[0:len(mySubject)]) ii. print(mySubject[-7:-1]) iii. print(mySubject[::2]) | 3 | ||
Section-III | ||||
38 | Write a program that accepts a 10 number in a list and find its average, also print which number is less than average, greater than average and equal to average. OR Write a python code to read a string and Count all lower case, upper case, digits, and special symbols from a given string Given: str1 = "P@#yn26at^&i5ve" Expected Outcome: Total counts of chars, digits, and symbols Chars = 8 Digits = 3 Symbol = 4 | 5 | ||
39 | Write a program to enter 10 names of employees and their salaries as input and store them in a dictionary and print the employee names and their salary of those employee whose salary is less than 50000. .(Note : Name of employees should be the key and salary should be value) | 5 | ||
40 |
| 2+2+1 |
*****END OF QUESTION PAPER*****
ANSWER KEY
Question No. | Part-A | Marks allocated |
Section-I Select the most appropriate option out of the options given for each question. Attempt any 15 questions from question no 1 to 21. | ||
1 | Find the valid identifier from the following a) break b) else c) Break d) My_Name Ans : c,d | 1 |
2 | Given the lists L=[10,91,17,12,5,6] , write the output of print(L[:5]) Ans : [10, 91, 17, 12, 5] | 1 |
3 | Expand RAM and ROM. Ans :Random Access Memory, Read Only Memory | 1 |
4 | Identify the valid logical operator in Python from the following. a) ? b) < c) ** d) and Ans : and | 1 |
5 | Suppose a tuple T is declared as T = (40, 22, 53, 39), which of the following is incorrect? a) print(T[1]) b) T[2] = -67
Ans : b | 1 |
6 | Write a statement in Python to declare a dictionary whose keys are 1, 2, 3 and values are Monday, Tuesday and Wednesday respectively. Ans : dict = {1:"Monday",2:"Tuesday",3:"Wednesday"} print(dict) | 1 |
7 | Write one mutable and one immutable data types name? Ans : Mutable data type : list, dictionary or any other correct type. Immutable data type : Tuple, String or any other correct type. | 1 |
8 | What will be the value of following code print(17%3) print(21//6) Ans : 17%3 = 2 21//6 = 3 | 1 |
9 | What do you mean by e-Waste? Ans : E-waste is electronic products that are unwanted, not working, and nearing or at the end of their “useful life.” Computers, televisions, VCRs, stereos, copiers, and fax machines are everyday electronic products. | 1 |
10 | Full form of IPR Ans : Intellectual Property Right | 1 |
11 | After practical, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime? Justify your answer. a) Hacking b) Identity theft c) Cyber bullying d) Plagiarism Ans : b | 1 |
12 | After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying? a) You sent an email to your friend with a message saying that “I am sorry”. b) You sent a threatening message to your friend saying “Do not try to call or talk to me”. c) You created an embarrassing picture of your friend and uploaded on your account on a social networking site d) All of the above Ans : A | 1 |
13 | Expand ISCII Ans : Indian Standard Code for information interchange | 1 |
14 | Convert (31)10 = (?)2 Ans : (11111)2 | 1 |
15 | Write the name of universal gate(s). Ans : NAND or NOR | 1 |
16 | Identify the type of L: L = (‘Mon’, ‘23’, ‘hello’, ’60.5’) a. dictionary b. string c.tuple d. list Ans : Tuple | 1 |
17 | If the following code is executed, what will be the output of the following code? name="LetsWaitForGoodTimes" print(name[3:8]) Ans : sWait | 1 |
18 | Write the two name of utility software..
Ans : ½ mark for each correct utility software | 1 |
19 | What do you mean by Unicode? Ans : 1 mark for correct definition | 1 |
20 | Define Trojan Horse briefly. Ans : 1 mark for correct definition | 1 |
21 | Write the statement to import math module Ans : import math | 1 |
Section-II Both the Case study based questions are compulsory. Attempt any 4 sub parts from each question. Each question carries 1 mark | ||
22 | The record of a student (Name, Roll No., Marks in five subjects and percentage of marks) is stored in the following list: (Any Four) stRecord = ['Raman','A-36',[56,98,99,72,69],78.8] Write Python statements to retrieve the following information from the list stRecord. a) Percentage of the student b) Marks in the fifth subject c) Maximum marks of the student d) To add mobile number of student at the end of the list. e) Change the name of the student from ‘Raman’ to ‘Raghav’ Ans : a) print(stRecord[3]) b) print(stRecord[2][4]) c) print(max(stRecord[2][:])) d) stRecord.append(“9988776655”) e) stRecord[0] = "Raghav" | 4 |
23 | Shivi has stored contact numbers of her friends along with name in following format:-. D1= {‘Ram’:267287, ‘Sham’:234567, ‘Sita’: 987654, ‘Pooja’:231243} help her to do following task:
(v) To remove sham and his contact number Ans : i) D1['Raju']=223333 ii) print(D1[‘Sita’] iii) print(D1.keys()) iv) D1[‘Pooja’]=567432 v) del D1['Sham'] | 4 |
| Part – B | |
Section-I | ||
24 | Evaluate the following expressions: a) 16 * 13 + 4**2 // 5 b) 10 > 5 and 7 > 12 or not 18 > 3 Ans : a) 211 b) False | 2 |
25 | Write a program that inputs a number and checks number is negative, positive or Zero. Ans : ½ marks for entering a number ½ marks for correct loop 1 marks for correct logic OR Write a program to check whether input integer number is even or odd. Ans : ½ marks for entering a number ½ marks for correct condition 1 marks for correct print and indentation | 2 |
26 | Write any two Ethics to use social networking sites. Ans : 1 mark for each correct ethics | 2 |
27 | Differentiate between application software and system software. OR What is operating system? Write any two functions of OS? Ans : 1 mark for each correct definition of application and system software. OR 1 mark for each correct definition of operating system. ½ mark for each correct function of OS. | 2 |
28 | Rewrite the following code in python after removing all syntax error(s).Underline each correction done in the code x=integer(input('Enter 1 or 10')) if x==1: for x in range(1,11) Print(x) Else: for x in range[10,0,‐1]: print(x) Ans : ½ mark for each correction (max 2 marks) | 2 |
29 | State and Prove De Morgan’s Laws using Truth table. Ans : full marks for correct proof | 2 |
30 | What do you mean by Plagiarism? Write one example. Ans : 1 mark for correct definition 1 mark for correct example | 2 |
31 | Write any two differences between Complier and interpreter. Ans : 1 mark for each correct difference | 2 | ||
32 | Convert the following for loop code in to while loop. for x in range (1,100,2): print(x) Ans ½ mark for correct initialisation 1 mark for correct while loop ½ mark for correct increment | 2 | ||
33 | What do you mean by logical errors? Explain with the help of suitable example Ans : 1 mark for definition,1 mark for example | 2 | ||
Section- II | ||||
34 | Define the following terms:-
Ans : 1 mark each for correct definition | 3 | ||
35 | Write a program in python to print Fibonacci series. 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55 Ans ½ mark for correct initialization 1 mark for correct loop 1 ½ mark for correct body of loop | 3 | ||
37 | What will be the output of the following code segment: a. myList = [1,2,3,4,5,6,7,8,9,10] del myList[3:] print(myList) b. myList = [1,2,3,4,5,6,7,8,9,10] del myList[:5] print(myList) c. myList = [1,2,3,4,5,6,7,8,9,10] del myList[::2] print(myList) Ans : a) [1, 2, 3] b) [6, 7, 8, 9, 10] c) [2, 4, 6, 8, 10] OR Consider the following string mySubject: mySubject = "Computer Science" What will be the output of the following string operations : i. print(mySubject[0:len(mySubject)]) ii. print(mySubject[-7:-1]) iii. print(mySubject[::2]) Ans : i. Computer Science ii. Scienc iii. Cmue cec | 3 | ||
Section-III | ||||
38 | Write a program that accepts a 10 number in a list and find its average, also print which number is less than average, greater than average and equal to average. Ans : 1 mark for accepting 10 mumbers 1 mark for finding average 1 mark each for correct condition of less than average, greater than average and equal to average. OR Write a python code to read a string and Count all lower case, upper case, digits, and special symbols from a given string Given: str1 = "P@#yn26at^&i5ve" Expected Outcome: Total counts of chars, digits, and symbols Chars = 8 Digits = 3 Symbol = 4 Ans : ½ mark for accepting the string 1 mark each for correct condition of lower case, upper case, digits and special symbols ½ mark for printing | 5 | ||
39 | Write a program to enter 10 names of employees and their salaries as input and store them in a dictionary and print the employee names and salary of those employee whose salary is less than 50000. (Note : Name of employees should be the key and salary should be value) Ans. 2 marks for entering 10 names of employees and store them in dictionary 1 mark for correct loop for checking whole dictionary 1 mark for correct condition 1 mark for printing the items of dictionary | 5 | ||
40 |
Ans : 1 mark for each way technology can help students with disabilities
Ans : 1 mark for each correct precaution
Ans : 1 mark for correct definition | 2 2 1 |
No comments:
If you have any doubt so you can comment me then i will 100% help you ,Through comment Chat