Study Material XI Computer Science
Study Material XI Computer Science
Study Material XI Computer Science
FOR
ANNUAL EXAMINATION: 2022-23
CLASS-XI
SUBJECT- COMPUTER SCIENCE
FEATURES
CLASS- XI
SUB: COMPUTER SCIENCE (083)
Time Allowed: 3 Hours Maximum Marks: 70
General Instructions:
1. This question paper contains five sections, Section A to E.
2. All questions of a particular section must be attempted in the correct order.
3. Section A has 18 questions carrying 01 mark each.
4. Section B has 07 Very Short Answer type questions carrying 02 marks each.
5. Section C has 05 Short Answer type questions carrying 03 marks each.
6. Section D has 03 Long Answer type questions carrying 05 marks each.
7. Section E has 02 questions carrying 04 marks each. One internal choice is given in Q34
against part c only.
8. All programming questions are to be answered using Python Language only.
OR
5 (a) 7
6 (b) 4.0
7 (b) 4 times
8 (b) p=(500)
9 (d) All of these
10 (d) 26
11 (b) None
12 (b) Identity theft
13 (a) Plagiarism
14 (c) data privacy
15 (b) Black hat hackers
16 (b) software
17 (c) A is True but R is False
18 (a) Both A and R are true and R is the correct explanation for A
19 Internal memory is usually chips or modules that you attach directly to the
motherboard. Internal Memory is a circular disc that continuously rotates as the
computer accesses its data.
External memory is the additional that is used to store huge data/information for
future use. It often comes in the form of USB flash drives; CD, DVD, and other
optical discs; and portable hard drives.
20 (a) (4468)10 = ( 100010001011000 )16
OR
The major factors about the reason behind plagiarism.
i. Being lazy
ii. Lack of enforcement
iii. Fear of failure
iv. Not having enough knowledge
v. Lack of management skill
(Any two or any other relevant answers)
26
27 st1=input("Enter a string:")
st2=st1[::-1]
if st1==st2:
print("Palindrome")
else:
print("Not a Palindrome")
OR
a) 'All'
b) 'd All'
c) ' '
28 No_call=int(input("Enter total number of calls:"))
if No_call>1000:
Bill_Amt=(No_call-1000)*7.50+500*4.50+400*2.50
elif No_call>500:
Bill_Amt=(No_call-500)*4.50+400*2.50
elif No_call>100:
Bill_Amt=(No_call-100)*2.50
else:
Bill_Amt=0
print("Total Billing Amount of", No_call , "calls is", Bill_Amt)
OR
st1=input("Enter a string:")
st2=""
for i in st1:
if i in ['a','e','i','o','u','A','E','I','O','U']:
st2=st2+'#'
else:
st2=st2+i
print("Old string is", st1)
print("New string is", st2)
29 a) 'All'
b) 'd All'
c) ' and AllLoves One'
30 (a) There are two types of footprints are as follows:
(i) Active footprint – Which are formed by your online activity you do
knowingly.
(ii) Passive footprint – Which are formed by any and every activity that you
perform online and you do not even know about it .
General Instructions :
1. This question paper contains five sections : Section A to E .
2. All questions are compulsory .
3. Section A have 18 questions carrying 01 mark each .
4. Section B has 07 Very Short Answer type questions carrying 02 marks each .
5. Section C has 05 Short Answer type questions carrying 03 marks each .
6. Section D has 03 Long Answer type questions carrying 05 marks each .
7. Section E has 02 questions carrying 04 marks each . One internal choice is given in
Q34 against part (iii) only .
6. All programming questions are to be answered using Python Language only .
Question Marks
SECTION - A
No. Allocated
1 State True or False 1
(A+0).(A.1.A’)
Identify the statement from the list below that will produce the
result as [25, 43, 13, 45, 90]
T = (100,101,-89,45)
print(sum(T)) #Statement 1
print(T.sort()) #Statement 2
x, y, z, w = T #Statement 3
print(sorted(T)) #Statement 4
(a) Statement 1
(b) Statement 2
(c) Statement 3
(d) Statement 4
15 It is a small text file on the user’s computer where visited 1
websites store own information about a user .
25=Val
for I in the range(0,Val)
if I%2=0:
print( I+1)
Else:
print (I-1)
L = [1,2,3,4,5,6,2,3,4]
del L[2]
L.remove(4)
L.pop(3)
print(L)
L.append(9)
L.insert(3,10)
print(L)
OR
Predict the output of the Python code given below:
L = [100,50,60,90,40,10,30,20,80,70]
L.pop()
L.sort()
print(L)
L[3] = 50
L1 = L.count(200)
L.insert(0,L1)
print(L)
(a) X + 1 = X
(b) (A’)’ = A’
(c) A + A’ = 0
(d) (A + B)’ = A.B
22 What is SOC ? How is it different from CPU and why it is 2
considered for better development ?
23 What possible outputs(s) are expected to be displayed on 2
screen at the time of execution of the program from the
following code? Also specify the maximum values that can be
assigned to each of the variables Lower and Upper.
import random
AR=[20,30,40,50,60,70];
Lower =random.randint(1,3)
Upper =random.randint(2,4)
for K in range(Lower, Upper +1):
print (AR[K],end=”#“)
24 Nibedita has recently shifted to new city and new school . She 2
does not know many people in her new city and school . But all
of a sudden , someone is posting negative , demeaning
comments on her social networking profile , school site’s
forum etc.
She is also getting repeated mails from unknown people .
Everytime she goes online , she finds someone chasing her
online .
(a) What is this happening to Nibedita ?
(b) What action should she taken to stop them ?
OR
OR
a={}
a[2]=1
a[1]=[2,3,4]
print(a[1][1])
Example :
OUTPUT :
{'i': 3, ' ': 3, 'l': 1, 'k': 1, 'e': 1, 'p': 2, 'y': 1, 't': 1, 'h': 1, 'o': 2, 'n': 2,
'r': 2, 'g': 2, 'a': 1, 'm': 2}
str="Exam@7PM"
m=""
for i in range(0,len(str)):
if(str[i].isupper()):
m=m+str[i].lower()
elif str[i].islower():
m=m+str[i].upper()
else:
m=m+"#"
print(m)
OR
Text = "Pattern123"
L=len(Text)
ntext= ""
for i in range(0,L):
if Text[i].isupper():
ntext = ntext + Text[i].lower()
elif Text[i].isalpha():
ntext=ntext + Text[i].upper()
else:
ntext=ntext + '@'
print(ntext)
Example :
OUTPUT :
29 (a) What can be done to reduce the risk of identity theft ? Write 3
any two ways .
(b) Enumerate any two disability issues while teaching and
using computers .
(c) Differentiate between open source and open data .
30 Write the program in Python to shift the negative numbers to 3
right and the positive numbers to left so that the resultant list
will be as follows :
Example :
New List : [1, 16, 5, -6, -3, -17, -15, -3, -2]
OR
Example :
OUTPUT :
SECTION - D
31 (a) Write a Python Program to input an integer number from 3
the user and find the sum of digits of that integer number .
Example :
OUTPUT :
Sum of digits : 12
(b) Write a Python Program to print the Fibonacci series for nth
number of terms . 2
Example :
OUTPUT :
0 1 1 2 3 5 8
32 (a) Write a python program to input a string having some digits 3+2
and alphabets and calculate the sum of digits and alphabets
present in that string .
For example :
Output :
OR
OR
Example :
OUTPUT :
SECTION - E
34 Yagnesh a fruit seller, who sales the seasonal fruits . 1+1+2
Total_Fruits = [ ]
Summer_Fruits = ['Mango' , 'Papaya' , 'Watermelon',
'Pineapple', 'Litchi']
Winter_Fruits = ['Orange' , 'Pear', 'Pomegranate', 'Kiwi' ,
'Pineapple']
print("Summer Season Fruits :", Summer_Fruits)
print("Winter Season Fruits :", Winter_Fruits)
Total_Fruits.append(sumwin_Fruits)
Rainy_Fruits = ['Jamun','Peaches','Cherries']
Total_Fruits________________ #Statement1
print("The Fruitseller has : ",Total_Fruits)
print()
print("One of the Rainy season Fruit : ",
Total_Fruits[1][1]) #Statement2
print()
__________________ #Statement3
(iii) At the end of each day , he sales all of his fruits and he
returns back home with empty Fruit basket and smiley face .
Write an appropriate statement in Statement5 to empty his
Fruit basket . Write an appropriate statement to destroy the
basket also .
(ii) The program that tracks the usage of the system without the
knowledge of the owner is __________________.
OR
21 (a) X + 1 = 1 2
(b) (A’)’ = A
(c) A + A’ = 1
(d) (A + B)’ = A’ . B’
(½ mark for each correct answer)
22 Most of the major components of a mobile system are integrated on a 2
single chip which is called as system on a chip (SOC) . A SOC not only
consists of the mobile phone’s CPU , but all the other components such as
GPU , display processor , video processor , etc. These chips required less
power compared to other alternatives .
(b) She must immediately bring it into the notice of her parents and school
authorities . And she must report this cyber crime to local police with the
help of her parents .
OR
(a) This is happening because third party cookies saved his search
preferences and now websites are posting advertisements based on his
preferences .
(b) Now Robin can delete all the previous history and cookies stored on
his computer . This would stop websites posting advertisements .
OR
SECTION – C
26 (a) 3 3
(b)
str = input("Enter any string :")
freq = {}
for i in str :
if i in freq:
freq[i] += 1
else :
freq[i] = 1
print(freq)
27 eXAM##pm 3
(1.5 marks for correctly writing eXAM and 1.5 marks for correctly writing
##pm)
OR
pATTERN@@@
(1.5 marks for correctly writing pATTE and 1.5 marks for correctly
writing RN@@@)
(c) The term ‘open source’ is applicable to software , which means source
code of a software is freely available and user can make changes in it and
reuse it .
The term ‘open data’ is applicable to data that is freely available for
everyone to use without any licensing or copyright requirements .
OR
SECTION – D
31 (a) 5
num = int(input("Enter number :"))
sum = 0
numm = num
while numm != 0 :
digit = numm % 10
numm = numm // 10
sum += digit
print("Sum of digits :", sum)
(1/2 mark for accepting an integer value from an user)
(1/2 mark for correct initialization)
(1 mark for correct iteration)
(1 mark for correct updation )
(1/2 mark for correct display of sum)
(b)
num = int(input("Enter how many terms :"))
first = 0
second = 1
print(first, end = ' ')
print(second, end = ' ')
for a in range(1, num-1):
third = first + second
print(third, end = ' ')
first , second = second , third
32 (a) 5
string = input("Enter a string:")
countd=countl=0
for i in string:
if i.isalpha():
countl += 1
elif i.isdigit():
countd += 1
print("The total number of digits : ", countd)
print("The total number of alphabets :", countl)
(a)
Original_string = input("Enter a string :")
Reverse_string = ''
for i in range(len(Original_string)-1,-1,-1):
Reverse_string = Reverse_string + Original_string[i]
if Original_string == Reverse_string:
print(Original_string , "is a Pallindrome String")
else:
print(Original_string , "is not a Pallindrome String")
(b)
['WZ-1', 'New Ganga Nagar', 'New Delhi']
16
-1
,New Ganga Nagar,New Delhi
33 (a) popitem() method removes the item that was last inserted into the 5
dictionary .
(b)
names = [ ]
dept = [ ]
salary = [ ]
details = {'Emp Name' : names , 'Department' : dept , 'Salary' : salary}
for i in range(3) :
N = input("Enter Employee name :")
names.append(N)
D = input("Enter Employee Department : ")
dept.append(D)
S = int(input("Enter Employee Salary : "))
salary.append(S)
for key , val in details.items() :
print(key , ' : ' , val)
(1/2 mark for correct initialization)
(1/2 mark for correct declaration of dictionary)
(1 mark for correct iteration)
(1 mark for correct input from user)
(1 mark for correct display of dictionary)
OR
(b)
dct1 = {1 : 100 , 2 : 200 , 3 : 300}
dct2 = {1 : 300 , 2 : 200 , 5 : 400}
dct3 = dict(dct1)
dct3.update(dct2)
for i , j in dct1.items():
for x , y in dct2.items():
if i == x :
dct3[i] = (j + y)
print("The resultant dictionary :", dct3)
SECTION – E
34 (i) Total_Fruits.insert(1,Rainy_Fruits) 4
(ii) Peaches
OR
(iii) Summer_Fruits.sort()
Winter_Fruits.sort(reverse = True)
(ii) Spyware
Music and movies are two of the most well-known forms of entertainment that
suffer from significant amounts of _______ and using some other author’s work
without giving credit to the author is the act of __________.
Q17 and 18 are ASSERTION AND REASONING based questions. Make the
correct choice as
a. Both A and R are true and R is the correct explanation of A
b. Both A and R are true and R is not the correct explanation of A
c. A is True but R is False
d. A is False but R is True
17. Assertion(A) : Dictionaries are mutable. 1
Reason(R) : Contents of the dictionary can not be changed after it has been
created.
18. Assertion(A) : Python is a Cross-platform language. 1
Reason(R): Python code can run on a variety of platforms.
Section B
19. Manish and Saina both have their own laptops. Manish is able to work in English 2
and Indian languages like Telugu, Bengali, Assamese etc. in his laptop whereas
Saina’s laptop supports all languages like German, Hindi, English, etc. Identify
and explain the difference in encoding schemes of their computers.
20. Do the following conversions: 2
i. (10.75)8=( )10
ii. (B2F)16=( )8
OR
24. Observe the following code very carefully and rewrite it after removing any/all 2
syntactical errors with each correction underlined.
MAX=4
a=int(input'Enter the value of a:')
b= int(input'Enter the value of b:")
if(a>b)
MAX=5
MY_MESSAGE=MAX
for x in range(0, MY_MESSAGE)
print(x)
OR
WAP in python to generate a random floating number between 45.0 and 95.0.
Print this number along with its nearest integer greater than it.
25. What can be done to reduce the risk of identity theft? Write any two ways. 2
OR
Many Inventors, designers, developers and authors can not protect the ideas they
have developed. Intellectual Property Rights have been established to prevent
others from wrongly profiting from their creations or inventions. Elaborate the
concept of Intellectual Property Rights.
Section C
26. Draw a flowchart to calculate and display the factorial of a number. 3
27. WAP to accept a string and display total number of consonants. 3
OR
Consider the code given below
Str="CBSE-xi@2023"
New_str=" "
for i in range(len(Str)):
if i%2==0:
New_str=New_str+Str[i+1]
elif(Str[i].isupper()):
New_str=New_str+Str[i].lower()
else:
New_str=New_str+"#"
print("The New string:",New_str)
OR
A company decided to give bonus to employee according to following criteria:
Time period of Service Bonus
More than 10 years 10%
>=6 and <=10 8%
Less than 6 years 5%
Ask user for their salary and years of service and print the net bonus amount.
29. WAP to accept a list L of integers and put Positive and Negative numbers in 3
Separate Lists.
For example:
if L =[1,-2,3,-4,5] , the output should be:
Element in Positive List is : [1, 3, 5]
Element in Negative List is : [-2, -4]
30. a. Match the Column: 3
Column A Column B
1. Plagiarism a) Fakers, by offering special rewards or money prize
asked for personal information, such as bank account
information
2. Hacking b) Copy and paste information from the Internet into
your report and then organise it
3. Credit card fraud c) The trail that is created when a person uses the Internet.
4. Digital Foot Print d) Breaking into computers to read private emails and
other files
b. i. _____mean authentication of any electronic record by a subscriber by means of
an electronic method.
ii. _____ is made when information is collected from the user without the
person knowing this is happening.
Section D
31. Sanjay wants to create a dictionary of odd numbers between 1 and 10 in python, 5
where the key is the odd numbers and the value is the corresponding number in
words. As a friend of Sanjay, help him to write code snippet for the following
operations.
i) create the dictionary with name ODD containing following numbers and
words
number word
1 One
3 Three
5 Five
7 Seven
9 Nine
ii) to display the keys
iii) Check if 7 is present or not
iv) Retrieve the value corresponding to the key 9
v) Delete the item from the dictionary corresponding to the key 9
32. Question consider the following string 5
str1='python program'
i) Compare the outputs of statement 1 and statement 2
print(str1[-1:1].upper()+str1[-3:-1]+str1[-1].lower())
print(str1[-3::1].upper())
ii) Give the output
print('abcdef'.find('cd') == 'cd' in 'abcdef')
iii) Formulate the code to accept a string and display each word and it’s length.
33. Criminal activities or offences carried out in a digital environment can be 5
considered as cybercrime. In such crimes, either the computer itself is the target
or the computer is used as a tool to commit a crime. Cybercrimes are carried out
against either an individual, or a group, or an organisation or even against a
country, with the intent to directly or indirectly cause physical harm, financial loss
or mental harassment. (1+1+1+1+1)
Based on the above information, answer the following questions.
(i) What is/are the object(s) of crime?
(ii) Given an example of cyber crime.
(iii) What do you mean by hacker?
(iv) Name two most common cyber crimes.
(v) Where is most series computer crimes committed?
OR
Raman asked his friend Raju to suggest him software for video editing. Raju
asked Raman whether he wanted to buy the software or use it freely. Raman is not
interested in buying. Help Raju to find a solution for his friend by answering the
following questions. (1+1+2+1)
a. State the difference between free software and Open Source software.
b. Write the full forms of GNU and FSF.
c. Name a FOSS for
i. video editing software ii. Browser
d. Explain about GPL.
Section E
34. a) Rewrite the following code using the while loop: 4
n=1
for a in range(-500,-99,100): # statement 1
print(n)
n=n*10+1
b) Analyze the number of times the loop will run if statement 1 is replaced by the
following statement
in above code in (a)
for a in range (100,-99,-500):
35. Ashis is writing a python code in which he needs to calculate mean, median and 4
mode of a list having values [22,13,28,13,22,25,7,13,25]. Suggest a suitable code
in Python to:
i. import module to calculate mean, median and mode.
ii. What will be the output of mean, median and mode ?
OR
Mahendra is writing a Python code in which he needs to remove values and
sublists within a list. His friend has suggested del and pop. Differentiate between
del statement and pop function with an example.
******
Marking Scheme
Sample Question Paper 2022-2023
Class : XI
Subject: Computer Science(Theory)
Max. Time: 3 Hours Max. Marks: 70
Note: This question paper contains five sections, Section A to E.
General Instructions:
1. This question paper contains five sections, Section A to E.
2. All questions of a particular section must be attempted in the correct order.
3. SECTION A has 18 Objective Type Questions of 1 mark each.
4. SECTION B has 07 Very Short Answer Type Questions carrying 02 marks each.
5. SECTION C has 05 Short Answer Type Questions carrying 03 marks each.
6. SECTION D has 03 Long Short Answer Type Questions carrying 05 marks each.
7. SECTION E has 02 Questions carrying 04 marks each. One Internal choice is given in Q35
against part c only.
8. All programming questions are to be answered using Python Language only.
Section A
1. b. ALU 1
2. a. Ubuntu 1
3. b. CD ROM 1
4. c. Utility software 1
5. c. print("Hello" + 123) 1
6. c. a=2 b=1 1
7. b) for days in monthDays: 1
print(days)
8. d. None of these 1
9. {'A': 'Apple', 'B': 'Bat', 'C': 'Cat', 'D': 'Doll'} 1
10. [9, 7, 8, 3, 5, 4] 1
11. c. 2ndName 1
12. d. All of these 1
13. b. Identity theft 1
14. c. Copyright 1
15. c. Ethical- ii,iii and Non-Ethical- i, iv 1
16. Copyright infringement, Plagiarism 1
17. c. A is True but R is False 1
18. a. Both A and R are true and R is the correct explanation of A 1
Section B
19. Manish’s laptop uses ISCII encoding scheme that represents various languages 2
that are written and spoken in India. ISCII follows single encoding schema, which
allows for easy transliteration between various writing systems.
Saina’s laptop uses Unicode encoding scheme and it incorporates all the
characters of every written language of the world irrespective of device, operating
system and software application.
20. i. (10.75)8=(8.953125 )10 2
ii. (B2F)16=( 5457)8
OR
In interactive mode, instructions are given in front of python prompt in python
Shell. Python carries out the given instructions and shows the result there itself.
In script mode, python instructions are stored in a file generally with the .py
extension and executed together in one go. The saved instructions are known as
python script or python program.
21. 2
OR
ser=int(input("Enter the time period of service"))
sal =int(input("Enter your salary"))
if ser > 10:
b=10/100*sal
if ser >=6 and ser <=10:
b = 8/100*sal
if ser < 6:
b = 5/100*sal
print("Bonus is ", b)
29. NumList = [] 3
Positive = []
Negative = []
for j in range(Number):
if(NumList[j] >= 0):
Positive.append(NumList[j])
else:
Negative.append(NumList[j])
Identify a specific cybercrime (selecting from the above box) for each of the
following situations: (1+1+1+1+1)
1. A person complains that somebody has created a fake profile on the
Facebook and is defaming his/her character with comments and
pictures.
2. A person complains that Rs. 4.50 lacs have been withdrawn online
from his/her account by using net banking in two consecutive days.
3. A person complains that somebody has cracked the password of his/her
computer system and stolen valuable data and information.
4. A person complains he/she is getting threatening messages by email,
text or through comments on a social networking page.
5. A person complains several times he/she connect to a website, when
open his/her e-mail account, then found number of unwanted mails
have come to inbox.
OR
Anup asked his friend Deepak to suggest him software for image editing.
Deepak asked Anup whether he wanted to buy the software or use it freely.
Anup is not interested in buying. Help Deepak to find a solution for his
friend by answering the following questions. (1+1+2+1)
a. State the difference between License and Open-Source License.
b. Name two popular categories of Public Licenses.
c. Name a FOSS for
i. Image editing software
ii. Browser
d. Explain Software Piracy.
Section E
34. a) Rewrite the following code using the for loop: 4
i=100
while (i>0):
print(i)
i-=3
b) Rewrite the following code fragments using while loops:
Min=0
Max=0
if num < 0:
Min = num
Max = 0
for i in range(Min, Max + 1):
sum+=i
35. a) Biren is working on a project in which he needs to see the constant pi 4
and statistical function mean. Suggest a suitable code in python to:
i) import only pi and all statistical functions from appropriate module.
ii) To print value of an expression given below using appropriate import
function:
E=mc2
b) Sumedha is writing a python code in which she needs to add values and
sublists with in a list, her friend has suggested two functions- append
and insert. Differentiate between these two functions with an example.
DAV PUBLIC SCHOOLS, ODISHA ZONE
CLASS: XI COMPUTER SCIENCE
MARKING SCHEME
Time: 3HRS. F. Marks:70
General Instructions:
1. This question paper contains five sections, Section A to E.
2. All questions of a particular section must be attempted in the correct order.
3. SECTION A has 18 Objective Type Questions of 1 mark each.
4. SECTION B has 07 Very Short Answer Type Questions carrying 02 marks each.
5. SECTION C has 05 Short Answer Type Questions carrying 03 marks each.
6. SECTION D has 03 Long Short Answer Type Questions carrying 05 marks each.
7. SECTION E has 02 Questions carrying 04 marks each. One Internal choice is given
in Q35 against part C only.
8. All programming questions are to be answered using Python Language only.
Section A
1. c) Software 1
2. b) System Software 1
3. c) Utility Program 1
4. a) ALU 1
5. a) ApplicAtion 1
6. c) 3 1
7. d) none of the mentioned 1
8. b) t[3] = 45 1
9. b) {1,”A”,2”B”} 1
10. c) I,3 1
11. c) Tax+pay 1
12. a) A list of all Indian President names 1
13. b) Cyber Stalking 1
14. a) Cyber ethics 1
15. b) an old computer 1
16. a) (a) – (ii) ; b) (b) – (iv) ; c) (c) – (i) ; d) (d) – (iii) 1
Q17 and 18 are ASSERTION AND REASONING based questions.
Make the correct choice as
a. Both A and R are true and R is the correct explanation of A
b. Both A and R are true and R is not the correct explanation of A
c. A is True but R is False
d. A is False but R is True
17. d. A is False but R is True 1
18. a. Both A and R are true and R is the correct explanation of A 1
Section B
19. (i) HOTS (ii) Main 2
72 79 84 83 77 97 105 110
20. Do the following Conversion: 2
(i) (A5CD)16 = (1010010111001101)2
(ii) (110011.110)2 = (63.6)8
OR
Compiler Interpreter
Compiler converts source code Interpreter translates one line at a time
into machine code in one go instead of the whole program at one
go.
once translated the compiler is interpreter is always needed whenever
not needed a source code is to be executed.
21. 2
Identify a specific cybercrime (selecting from the above box) for each of
the following situations: (1+1+1+1+1)
1. Cyberstalking
2. Bank Fraud
3. Hacking
4. Cyberbullying
5. Spam
OR
(1+1+2+1)
a. Licenses are provided by the author by sharing their copyrighted
work with others whereas Open-Source Licenses does not need
special permission from the author.
b. GPL-General Public License, CC-Creative Common
c. i. Image editing-GIMP, etc ii. Browser-Netscape Navigator etc
d. Software Piracy is the unauthorized use or distribution of the
software.
Section E
34. a) Rewrite the following code using the for loop: 4
for i in range(100,0,-3):
if i>0:
print(i)
b) Rewrite the following code fragments using while loops:
num=int(input("enter num value:"))
min=0
max=0
sum=0
if num<0:
min=num
max=0
while min<=max:
sum+=min
min+=1
35. a) 4
i) from math import pi
import statistics
ii) import math
E=math.pow((m*c),2)
b)
append() insert()
def adds an item at the end of insert an item at defined
the list index
eg L1=[.Hello.,.and.] L1=[.Hello.,.and.]
L2 = [’Good’, ’Morning’] L2 = [’Good’, ’Morning’]
L1.append(L2) L1.insert(0,L2)
print(L1) print(L1)
Output: Output:
[[.Hello.,.and.,[’Good’, [ [’Good’,
.Morning’]] ’Morning’],.Hello.,.and.]
DAV PUBLIC SCHOOLS, ODISHA ZONE
SAMPLE QUESTION PAPER ( 2022-23)
CLASS- XI
SUB : COMPUTER SCIENCE
Time Allowed: 3 Hours Maximum Marks : 70
General Instructions :
1. This question paper contains five sections, Section A to E.
2. All questions are compulsory.
3. Section A have 18 questions carrying 01 mark each.
4. Section B has 07 Very Short Answer type questions carrying 02 marks each. 5. Section C has 05 Short
Answer type questions carrying 03 marks each. 6. Section D has 03 Long Answer type questions
carrying 05 marks each. 7. Section E has 02 questions carrying 04 marks each.
5. One internal choice is given in Q34 against part c only.
6. All programming questions are to be answered using Python Language only.
SECTION-A
2 ASCII is a _____ bit code while extended ASCII is a _____ bit code. 1
4 Write the corresponding python expression for the following mathematical expression: 1
√𝑎2 +𝑏 2 + 𝑐 2
a) Interactive mode
b) Script mode
c) Both interactive and script mofe
d) None of the above
Page 1 of 9
6 Consider the following code and predict the output 1
Flowers=(“ROSE”,”LOTUS”,”LILY”,”LAVENDER”,”HIBISCUS”)
(a,b,c,d,e)=Flowe
rs
print(a[2]+c)
a. R L I L Y b. SLILY
c. LHIBISCUS d. SLAVENDER
7 m1={'J':"JAN",'F':"FEB",'M':"MAR",'A':"APR",'N':"MAY"} 1
m2=m1.copy()
m3=m2
m2['M']="MARCH"
print(m1['M'],m2['M'],m3['M'])
d) if (1):
print(‘hello’)
Page 2 of 9
a) TRUE , TRUE
b) FALSE , TRUE
c) TRUE
d) FALSE
12 Select which among the following is not a Net Etiquette related to the use of Digital 1
Technology?
a. Be ethical b. Be respectful
c. Be responsible d. Be independent
13 1
14 1
15 Many people create videos on YouTube by using content from other’s videos. lnfer 1
which
Intellectual Property Right is being violated in this case?
a. Copyright Infringement b. Trademark
c. Copyright d. Patent
16 1
Read the words given below:
Q17 and 18 are ASSERTION AND REASONING based questions. A statement of Assertion (A) is
followed by a statement of Reason (R ).
Mark the correct choice as
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
Page 3 of 9
17 Assertion(A) : In Python, when a break statement is encountered inside a loop, the loop is 1
immediately terminated, and the program control transfer to the next statement following
the loop.
Reason(R) : else clause of a python loop executes when the break statement terminates the
loop .
SECTION-B
19 Mr. Rehan has recently installed a new operating system on his computer. 2
a) Specify any two activities/functions performed by operating system as a resource
manager.
b) Identify two utility programs used by an operating system.
b) A=bool(0)
B=bool(1)
print(A==false)
print(B==True)
or
c) print(“Hello”+2)
print(“Hello” + “2”)
print(“Hello” * 2
d) pi=3.14
print(type(pi))
print(pi//(int("5")/float("3.0")))
22 Find possible o/p (s) at the time of execution of the program from the following code? 1
Also specify the maximum values of variables Lower and Upper. ½+
import random as r ½
AR=[20, 30, 40, 50, 60, 70]
Lower =r.randint(1,3)
Upper =r.randint(2,4)
for K in range(Lower, Upper +1):
print (AR[K],end=”#“)
(i) 10#40#70# (ii) 30#40#50#
(iii) 50#60#70# (iv) 40#50#70#
Page 4 of 9
23 Using the given values x,y,z evaluate the following : 1
1
(a) (x >= y ) and ( not ( z ==y ) ) or ( z < x )) for X =5 y=6 z = 20
(b) a , b = (x or ( y and z)) , (( x or y) and z) for x = True , y = False , z=False
(c)
24 Draw logic circuit diagram for the following expression: Y= ab + b’c + c’a’ 2
25 Which type of error occurs when you execute the following code fragments ? 2
(a) Syntax Error
(b) Name Error
(c) Vale Error
(d) Type Error
(i) Fruit=apple
(ii) int(‘11.23’)
(iii) 2=6
(iv) ‘abc’+4-4
OR
SECTION-C
28 Write a program to find the sum of the series : s=1 + x + x2 +x 3 +……..xn (Input the
value of x and n) 3
29 Write a function in python named SwapHalfList(Array), which accepts a list Array of numbers and 2+1
swaps the elements of 1st Half of the list with the 2nd Half of the list ONLY if the sum of 1st Half is
greater than 2nd Half of the list.
Sample Input Data of the list:
Array= [ 100, 200, 300, 40, 50, 60],
Output Arr = [40, 50, 60, 100, 200, 300]
Page 5 of 9
30 Write a program to find the grade of the when grades are allocated as given in the table 3
below.
SECTION-D
31 SUNAINA wants to maintain the record of her monthly budget in the form of a 5
dictionary in Python The dictionary should Store item name as the key and its price as
the value. Write code snippet for the following
i) create the dictionary with name BUDGET containing following items
and price
Item price
Rice 1000
Wheat flour 1500
Oil 1500
Dal 800
(b) Lst=['English','Physics','Chemistry','Maths']
print(Lst[::-2])
print(Lst[-3])
print(Lst[-2:-4])
print(Lst[3:])
Page 6 of 9
33 In a leading cybercrime case, the Joint Academic Network (JANET) was hacked by 5
the accused, after which he denied access to the authorized users by changing
passwords along with deleting and adding files. Making it look like he was
authorized personnel, he made changes in the BSNL computer database in their
internet users’ accounts. When the CBl carried out investigations after registering a
cybercrime case against the accused, they found that the broadband Internet was being
used without any authorization. The accused used to hack into the server from various
cities like Chennai and Bangalore, amongst others. This investigation was carried out
after the Press Information Bureau, Chennai, filed a complaint. In the verdict by the
Additional Chief Metropolitan Magistrate, Egmore, Chennai, the accused from
Bangalore would be sent to prison for a year and will have to pay a fine of Rs 5,000
under Section 420 IPC and Section 66 of the IT Act. (1+1+1+1+1)
OR
Rakesh asked his friend Akash to suggest him software for Image editing. Akash
asked Rakesh whether he wanted to buy the software or use it freely. Rakesh is not
interested in buying. Help Akash to find a solution for his friend by answering the
following questions. (1+1+2+1)
a. State the difference between License and Open Source License.
b. Name two popular categories of Public Licenses.
c. Name a FOSS for
i. Image editing software
ii. Browser
Explain Software Piracy
SECTION-E
34 Ishika joined as a new programmer of the Company “Sai Pvt. Ltd.”. She has been instructed 4
to maintain the database of the Employee. The different tasks assigned to her are as follows:
• If a new Employee gets appointed then she is going to add the employee
details like Employeeid,EmployeeName and salary to the database.
• If any employee tenders resignation, then she is going to delete that employee
record from the database.
• During any meeting, she is going to present the current employeedetails in front
of the whole administrative body.
She is writing a program.As programmer,help her to successfully execute the code.
print("WelcomeToSaiPvt.Ltd.")
Page 7 of 9
Record= #Statement1
print("1.AddanEmployeeRecord","\n2.DeleteanEmployeeRecord","\n3.
DisplayCurrentEmployeeRecords")
ch='y'
Line=0
While ch=='y':
choice = int(input("Enter your choice (1/2/3):"))
ifchoice== 1:
empid = input("Enter Employee Id: ")
ename=input("EnterEmployeeName:")
esal=float(input("EnterEmployeeSalary:"))
Details= [empid,ename,esal]
Record #Statement2
elif choice==2:
if Record!=[]:
eid=input("Enterthe Employeeidthatyou wantstodelete:")
for I in Record:
Line+=1
if eid==i[0]:
____________#Statement3
Line=0
else:
print("Sorry!Nosuchrecordexists")elifchoice== 3:
if_________________________ #Statement4
print("Opps!No records available !!!!!")
else:
for :#Statement5
print(i)
ch=input("Do you want to continue(y/n):")
a) Ishika is going to create an empty list named as “Record” in which she will store the
employees ’details. Write the Statement1 for her.
b) Fill the blank in Statement2 that will enable her to add the details as a sublist at
theendofthenestedList“Record”.
c) After receiving the resignation letter of an employee she will delete the record
ofthat employee based on his/her Employee Id. What will be the suitable code
segment for this in Statement3?
e) Help Ishika to display the current records of the database by writing a suitable loop
in Statement5.
Page 8 of 9
35 Reena of Class-XI was reading an article in the Newspaper. The article was 4
containingsome grammatical errors. Then Reena thought of correcting the grammatical
errors aswell as to have fun by playing with the words and characters present in the article.
Asshe belongs to the Computer Science stream, she wrote a Python program to do
thesame. But in some parts, she had confusion. As a Computer Programmer, can you
helpReenafortheabovepurpose?
str1="computer science"
uc=0
print (str1. ( )) # Line 1
print (str1.upper()) # Line 2
print (str1. _ ()) # Line 3
str2=str1.lstrip("com")
for a in str1:
if a.isupper(): # Line 4
uc+=1
print ("Number of uppercase characters in the string are : ",uc)
print (str2)
Page 9 of 9
SAMPLE QUESTION PAPER ( 2022-23)
CLASS- XI
SUB :COMPUTER SCIENCE
MARKING SCHEME
SECTION-A
S.NO. Question Marks
1 (a) ROM ½
(b) Hard Disk ½
2 ASCII is a __7___ bit code while extended ASCII is a ___8__ bit code. ½+½
3 a) Distributive Law 1
4 1
math.sqrt(a*a + b*b + c*c)
5 a) Interactive mode 1
6 a) b. SLILY 1
9 a) 2 1
10 d) 19.25 1
11 b )FALSE , TRUE 1
12 a) PYTHON 1
13 2, Spam 1
14 Digital Footprint 1
15 a. Copyright Infringement 1
16 Adware,Malvertising 1
1
Adware may collect user or browsing information to display customized banners or popup
advertisements while the program is running. However, if this data iscollected or sold to third
parties without the user's knowledge and authorization, it is classified as spyware, also known
as malvertising.
SECTION-B
19 a) Memory Management,ProcessManagement,StorageManagement,Memory 2
management, File Management,Device Management ( any two )
b) Disk cleanup,Disk Defragmenter, Backup, Anti virus etc. (Any two )
20 NAND and NOR gates are called universal gates. They can represent all operations. 2
Or
3 types of logical operators are available ? NOT , AND , OR
b) A=bool(0)
B=bool(1)
print(A==false)
print(B==True)
or
c) print(“Hello”+2)
print(“Hello” + “2”)
print(“Hello” * 2
d) pi=3.14
print(type(pi))
print(pi//(int("5")/float("3.0"))) # no error
(a) False
(b) a = True, b = False
2
(ii) int(‘11.23’) #Value Error
(iii) 2=6 # Syntax Error
½+½
(iv) ‘abc’+4-4 # Type Error
SECTION-C
26 Write Python expressions to represent the following situations: 1
1
a) Find the square root of the sum of 8 and 43
1
b) Find the integral part of the quotient when 100 is divided by 32
c) Weight is greater than or equal to 115 but less than 125
27 Correct flowchart 3
28 Write a program to find the sum of the series : s=1 + x + x2 +x 3 +……..xn (Input the
value of x and n) 3
30 Write a program to find the grade of the when grades are allocated as given in the 3
table below.
Percentage of Marks Grade
Above 90% A
80% to less than 90% B
70% to less than 80% C
60% to less than 70% D
Below 60% E
Percentage of the marks obtained by the student is input to the program.
SECTION-D
31 i) Budget={‘Ricel’:1000,’Wheat flour’’:1500,’Oil’:1500,’Dal’:800} 5
ii) print(len(Budget))
iii) Budget[‘Sugar’]=200
iv) Budget[‘Oil’]= Budget[‘Oil’]+50
v)print(max(Budget.items()))
32 ['g', 'i', 'v', 'e', 'i', 't', '@', 'T', 'r', 'y', '!'] 3
(a) ['G', 'I', 'V', 'E', 'I', 'T', 't', '@', 'R', 'Y', 'y']
3
(b) ['Maths', 'Physics'] 2
Physics
[]
['Maths']
33 (1+1+1+1+1) 5
a. Non-ethical hacker
b. individual
c. When the CBI carried out investigations after registering a cybercrime caseagainst the
accused, they found that the broadband Internet was being used without any
authorization. The accused used to hack into the server from various cities like Chennai
and Bangalore, amongst others.
d. The attacker changed passwords along with deleting and adding files sothat he can
blackmail the victim to pay for getting access to the data.
e. The act provides a legal framework for electronic governance by giving recognition to
electronic records and digital signatures. The act outlines cybercrimes and penalties for
them.
OR (1+1+2+1)
a. Licenses are provided by the author by sharing their copyrighted work with
others whereas Open Source Licenses does not need special permission fromthe author.
b. GPL-General Public License, CC-Creative Common
c. i. Image editing-GIMP, etc ii. Browser-Netscape Navigator etc
Software Piracy is the unauthorized use or distribution of the software.
SECTION-E
34 Answer: 4
a) Record = [ ] or Record = eval(input())
b) Record.append(Details)
c) Record.pop(Line-1) or del Record[Line-1]
d)Record == [ ]
OR
len(Record) == 0 :
a) e) for i in Record :
35 Answer:- 4
a) str1.capitalize( )
b) COMPUTER SCIENCE
c) str1.title ( )
d) The code is used to check whether the character is an uppercase character
or not.
e) puter science
4
SET NO – 01
Roll No. Candidates must write the Set No. on
the title page of the answer book.
CLASS- XI
SUB : COMPUTER SCIENCE(083)
Max. Time: 3 Hours Max. Marks: 70
Note: This question paper contains five sections, Section A to E.
General Instructions:
1. This question paper contains five sections, Section A to E.
2. All questions of a particular section must be attempted in the correct order.
3. SECTION A has 18 Objective Type Questions of 1 mark each.
4. SECTION B has 07 Very Short Answer Type Questions carrying 02 marks each.
5. SECTION C has 05 Short Answer Type Questions carrying 03 marks each.
6. SECTION D has 03 Long Short Answer Type Questions carrying 05 marks each.
7. SECTION E has 02 Questions carrying 04 marks each. One Internal choice is
given in Q35 against part c only.
8. All programming questions are to be answered using Python Language only.
12. Abdul got a call from a unknown number. The caller introduced him as Bank 1
officer and asked PIN, OTP and some details for updating his ATM card.
Which of the following is not suggested for Abdul?
a) Mumbai#Cuttack#Kolkata#Delhi b) Cuttack#Kolkata#Delhi#
c) Cuttack#Kolkata# d) Cuttack#Kolkata# Mumbai#
21. E-waste management is becoming a greatest issue in the society. Discus the 2
impacts of e-waste on the environment.
OR
Shreyansh got good marks in all subjects. His father gifted him a laptop. He
would like to make Shreyansh aware of health hazards associated with excess
use of laptop. Help his father to list the points which he should discuss with
Shreyansh.
OR
Draw a logic circuit for : (AB + C‟ )‟
SECTION C
26. Draw a flowchart to ad and display all the even numbers between 1 and 20. 3
27. Consider the code given below. 3
Find and write the output of the following Python code:
OR
Write a program to print the following pattern:
12345
1234
123
12
1
28. Write a program that accepts a string, counts and prints the number of 3
uppercase vowels in the string.
OR
Write a program that accepts a string and checks whether it is a palindrome or
not.
29. Write a program to read a list of numbers and create another list which 3
store half of each even number and double of each odd number in the list.
For example: if list is containing [3,5,6,2,7,4,5,8]
then new list should contain [6,10,3,1,14,2,10,4]
OR
In last Computer Science class teacher discussed regarding different types of
software and their uses. Sara is a mediocre student need revision of every
chapter to understand the concept properly. Many questions crop up in his
mind. Please help her to get the answers of the following questions. (1+1+1+2)
a) Name two open-source Operating System
b) Expand FOSS
c) What do you mean by Free software?
d) Categorize the following software into Proprietary or Open-Source.
i) VLC media player ii) Ms-Office iii) GIMP iv) Adobe Photoshop
SECTION E
34. a) Rewrite the following code using while loop: 4
No=int(input(„Enter a number : ‟)) # Line1
L=int(No/2)+1
for i in range(2, L):
R=No%i
if R==0:
*******
21. • It pollutes air through the emission of gases and 1 mark for Sumita Arora
fumes in the atmosphere. each ( XI ),P.No.-
• It pollutes soil when dumped into landfills by correct 555
seeping harmful chemicals into the soil. point.
• It pollutes water by releasing the particles into the
water of sea, rivers, ponds or lakes.
OR
Hazards associated with excessive use of laptop are:
1 mark for
• Headache and eyes strain. each
• Distraction from studies. correct
• Wastage of time. point.
Is count
even ?
OR
for i in range(5,0,-1):
for j in range(1, i+1):
print(j, end =' ' )
print()
*****
CLASS- XI
SUB : COMPUTER SCIENCE(083)
Max. Time: 3 Hours Max. Marks: 70
Note: This question paper contains five sections, Section A to E.
General Instructions:
1. This question paper contains five sections, Section A to E.
2. All questions of a particular section must be attempted in the correct order.
3. SECTION A has 18 Objective Type Questions of 1 mark each.
4. SECTION B has 07 Very Short Answer Type Questions carrying 02 marks each.
5. SECTION C has 05 Short Answer Type Questions carrying 03 marks each.
6. SECTION D has 03 Long Short Answer Type Questions carrying 05 marks each.
7. SECTION E has 02 Questions carrying 04 marks each. One Internal choice is
given in Q35 against part c only.
8. All programming questions are to be answered using Python Language only.
a) 1 b)2 c) Error d) 0
9. A category of software which spies on your computers different activities is: 1
a) De-ware b) Freeware c) Utilities d) Spyware
a) {„a‟:3,‟b‟:8,‟c‟:9,‟d‟:7} b) {„a‟:3,‟d‟:7‟b‟:8,‟c‟:9}
c) {‟c‟:9,‟b‟:8,‟d‟:7,„a‟:3,} d) {„a‟:3,‟b‟:8,‟d‟:7}
12. The original code written by a programmer is known as ---------------- 1
13. Identify an invalid identifier : 1
a) Omg5 b)_ Ram
c) Sum*3 d) C2_1q
14. Which of the function can increase the number of elements of a list by more than 1
one?
1
a) append( ) b) extend( ) c) insert ( ) d) pop( )
15. It occurs when an attacker, appearing as a trusted entity, dupes a entity into 1
opening an email, instant message, or text message.
a) phishing b) crime c) plagiarism ( ) d) hacking
16. Which of the following digital footprints can be created without the user‟s 1
consent?
import random
data = [„Bhubaneswar‟, „Cuttack‟, „Kolkata‟, „Puri‟]
k=random.randint (2,4)
for j in range(k, k+1):
print (data[j-1], end=‟#‟)
a) Bhubaneswar#Cuttack#Kolkata#Puri b) Cuttack#Kolkata#Puri#
c) Cuttack#Kolkata# d) Cuttack#Kolkata#
Bhubaneswar#
21. Now a days E-waste management is a burning issue in the society. Discus the 2
impacts of e-waste on the environment.
OR
Suresh has got good marks in his exams. His father gifted him a laptop. He would
like to make Suresh aware of different health issues associated with excess use of
laptop. Suggest some basic precaution points which he should discuss with
Suresh.
22. Evaluate the expressions. 2
OR
Draw a logic circuit for : (AB + C‟ )‟
SECTION C
26. Draw a flowchart to ad and display all the even numbers starting from 1 to 20. 3
27. Find and write the output of the following Python code: 3
OR
Write a program to print the following pattern:
12345
1234
123
12
1
28. Write a program that accepts a string, counts and prints the number of lowercase 3
vowels in the string.
OR
Write a program that accepts a string and checks whether it is a palindrome or not.
30. WAP to create a dictionary named year whose keys are month names and values 3
are
their corresponding number of days.
SECTION D
31 Rabina a student of Class XI has been assigned the responsibility of Class Monitorship. 5
She is honest, hardworking and sincere. Her class teacher is very much happy with her
sincerity and has full faith on Rabina. She gave her a Register named “STUDENTS
MARK ENTRY” to maintain the students‟ names along with their 5 subject marks.
Rabina is good in programming. So, she has written a program to create a dictionary to
maintain the register for storing names and marks obtained in 5 subjects by the students
of her class. Help Rabina to write this program to complete her assigned work.
print("STUDENTS MARK ENTRY REGISTER")
Register = ________________ #Statement1
n = int(input("How many students are there : "))
ch = „y‟
for i in range(n):
sname = input("Enter name of the student :")
Tot_Marks = [ ]
for j in range(5) :
mark = float(input("Enter marks :"))
Tot_Marks.append(mark)
Register________________ #Statement2
MyRegister = _____________ #Statement3
print("Register Contains the following Records : ")
for______________MyRegister: #Statement4
print( key , " : ", value)
while ch == 'y':
name = input("Enter the name of student whose marks you wants to retrieve : ")
if name in Register.keys() :
print(______________) #Statement5
else :
Write a Python program to input a sentence in the lowercase. Convert the first
letter of each word of the sentence in uppercase and display the new sentence.
Write a Python program to input a sentence in the lowercase. Convert the first
letter of each word of the sentence in uppercase and display the new sentence.
e. What should AMIT do before he downloads something from internet next time?
SECTION E
34 Ishika joined as a new programmer of the Company “Sai Pvt. Ltd.”. She has been 4
instructed to maintain the database of the Employee. The different tasks assigned
to her are as follows:
If a new Employee gets appointed then she is going to add the employee
details like Employee id, Employee Name and salary to the database.
If any employee tenders resignation, then she is going to delete that
employee record from the database.
During any meeting, she is going to present the current employee details in
front of the whole administrative body.
To perform all these above assigned work, she is writing a program. As a
programmer, help her to successfully execute the code.
print("Welcome To Sai Pvt. Ltd.")
Record = _______________ #Statement1
print("1. Add an Employee Record " , "\n2. Delete an Employee Record " , "\n3.
Display Current Employee Records ")
ch = 'y'
Line = 0
while ch == 'y' :
21. It pollutes air through the emission of gases and 1 mark for Sumita Arora
fumes in the atmosphere. each ( XI ),P.No.-239
It pollutes soil when dumped into landfills by correct
seeping harmful chemicals into the soil. point.
It pollutes water by releasing the particles into the
water of sea, rivers, ponds or lakes.
OR
Hazards associated with excessive use of laptop are:
1 mark for
Headache and eyes strain. each
Distraction from studies. correct
Wastage of time. point.
Is count
even ?
OR
for i in range(5,0,-1):
for j in range(1, i+1):
print(j, end =' ' )
print()
45
2 UNIT-2 9 3 4 2 2
15
3 UNIT-3 5 1 1 0 1
70 1 x 18 = 2x7= 3x5= 4x2= 5x3=
18 14 15 8 15
MARK
NO. OF QUESTIONS 18 7 5 2 3
General Instructions:
The question paper contains no of pages 9.
15 minutes cooling time has been allotted to read this question paper
only and do not write any answer on the answer book during this
period.
This question paper contains five sections, Section A to E.
All questions are compulsory.
Section A have 18 questions carrying 01 mark each.
Section B has 07 Very Short Answer type questions carrying 02
marks each.
Section C has 05 Short Answer type questions carrying 03 marks
each.
Section D has 03 Long Answer type questions carrying 05 marks
each.
Section E has 02 questions carrying 04 marks each
All programming questions are to be answered using Python
Language only.
Q.N. Section - A
This section consists of 18 Questions ( 1-18 ).Each question carries 1 mark.
(1x18 = 18)
1 When ever the computer is started or a software application is launched , the
required program is loaded into __________ for processing .
a) ROM
SAMPLE PAPER /COMP. SC-XI/SET - I/22-23 Page 1 of 6
b) CPU
c) RAM
d) CU
2 A high speed memory is placed in between CPU and primary memory is known
as ___________.
a) ROM
b) RAM
c) Secondary memory
d) Cache Memory
3 Which of the following will occupy more memory space ?
a) 1111( binary number )
b) A2 ( Hexadecimal number system )
c) 12 ( octal number system )
d) None of the above )
4 Octal representation of the following binary number is _________
1111.0101
a) 17.25
b) 17.24
c) 17.26
d) 17.27
5 Write the output of the following code:
L = list( www.csiplearninghub.com)
print(L[20:-1])
a) [„c‟,‟o‟]
b) [„c‟,‟o‟,‟m‟]
c) (com)
d) Error
6 Which of the following statement is correct in accessing each element of string ?
a)
a= “Learning”
while(i):
print(i)
b)
a= “Learning”
for i in a:
print(i)
a) a only.
b) b only.
c) both a and b.
d) None of the above .
7 Write the output of the following :
A =( 23, 34 , 65 , 20 , 5 )
a. TRUE
b.
TRUE
FALSE
c.
FALSE
TRUE
d.
TRUE
FALSE
TRUE
a. Output a b. output b c. output c d. output d
str1="hello"
c=0
for x in str1:
if(x!="l"):
c=c+1
else:
pass
print(c)
A. 2
B. 0
C. 4
D. 3
SECTION-B
This section consists of 7 Questions ( 19 - 25 ). Each question carries 2
marks. ( 7x 2 = 14)
19 What is the utility of these software?
(a) disk fragmentor (b) backup software
20 What are various categories of software?
OR
Write the full form of the following :
i. EPROM
ii. EEPROM
21
What is the difference between cloud computing and mobile computing ?
22 What is the output display by using the following statement and explain .
print('Bye' == 'BYE')
23 i. (446)8 = ( ) 16
ii. ( 47.5)8 = ( ) 10
24 What will be the output of the following ?
(a) 87 // 5 (b) (87//5.0) = = (87//5)
(c) 87 // 5.0 (d) 17 % 5.0
25 WAP to print the following series –
OR
Write the Name of some common type of built in exception in python ?
28 WAP that searches for prime numbers from 15 through 25.
29 Write logical expressions corresponding to the following statements in
Python and evaluate the expressions (assuming variables num1, num2, num3,
first, middle, last are already having meaningful values):
a : –3 , b: 3j , c: 2+0j ,
d : [1 , 2 , 3 ] , e: ( 3 , 4 , 5 ) f:13.0
OR
What are cookies ? How are they used by websites to track you ?
SECTION-D
Section D has 03 long Answer type questions carrying 05 marks each.This
section consists of 3 Questions ( 31 - 33 ) (5 x 3 = 15)
(1) Once he got the message in Whatsapp that CBSE is announcing the result of
class XII tomorrow at 12:00 pm. He forwarded the message to his few friends.
But later he came to know that no such announcement was there in CBSE
official web-site.
(2) He is visiting several web-sites.
(3) He is getting abuse messages from an unknown number due to which he is
thinking of quarreling with that person.
(4) He registered himself in one website by giving his email id and phone number
but later his friend told him about the concept of digital footprint. He is now
thinking about canceling the registration so that his personal information can
be deleted from that website.
(5) He uploaded one video in his youtube channel where he used one background
music downloaded from somewhere on Internet
a. In case (1), he is violating :
A. net etiquettes B. Communication etiquettes
C. copy right D. None of the above
OR
Based on the following code answer the questions
import ___________________ #1
AR=[20,30,40,50,60,70]
FROM=random.randint(1,3)
TO=random.randint(2,4)
for K in range(FROM,TO+1):
print (AR[K],end=”#“)
i. What module should be imported To execute the above code #1?
ii. What will be the maximum value of the variables FROM and TO?
iii. What will be the minimum value of the variables FROM and TO?
iv. What possible outputs(s) are expected to be displayed on screen at the
time of execution of the program ?
a. 10#40#70# B. 30#40#50#.
C. 50#60#70# D. 40#50#70#
v. What is the default return type for rand command
SECTION-E
10M 0 0 0 3 4 12
1 UNIT 1
45M 2 2 4 3 9 6
2 UNIT 2
15M 1 0 1 1 5 6
3 UNIT 3
MARKS 70 3 2 5 7 18 35
ANNEXURE -B
1 of | 1 0
DAV PUBLIC SCHOOLS, ODISHA ZONE
SAMPLE PAPERS , SUBJECT : Computer Science , CLASS : XI
QUESTION WISE ANALYSIS
Sl No Chapters / units (R), (U), (A), (H), (E)
1 Unit - 1 R
2 Unit - 1 R
3 Unit - 1 A
4 Unit - 1 R
5 Unit - 2 A
6 Unit - 2 R
7 Unit - 2 R
8 Unit - 2 R
9 Unit - 2 R
10 Unit - 2 A
11 Unit - 3 A
12 Unit - 3 R
13 Unit - 3 R
14 Unit - 3 R
15 Unit - 3 R
16 Unit - 3 A
2 of | 1 0
17 Unit - 3 R
21 Flow of control A
22 Flow of control R
25 Flow of control E
26 List E
27 Flow of control E
28 Flow of control E
29 Flow of control A
31 list A
32 Flow of control E
33 list A
34 Flow of control E
35 list E
3 of | 1 0
ANNEXURE –C
DAV PUBLIC SCHOOLS, ODISHA ZONE
NAME OF THE EXAMH, SAMPLE PAERS , SUBJECT . COMP. SC CLASS :
XI
MARKING SCHEME
QSTN ANSWER KEY PAGE NO. OF
NO NCERT TEXT
BOOK/
EXAMPLAR
1 c Sample paper
modified
2 d Sample paper
modified
3 b Sample paper
modified
4 B Sample paper
modified
5 a Sample paper
modified
6. b Sample paper
modified
7 c Sample paper
modified
8 b Sample paper
modified
9 d Sample paper
modified
10 c Sample paper
modified
11 c Sample paper
modified
12. d Sample paper
modified
13. c Sample paper
modified
4 of | 1 0
14 a Sample paper
modified
15. d Sample paper
modified
16 C Sample paper
modified
17. d Sample paper
modified
18. b. Both A and R are true but R is not the correct Sample paper
explanation of A. modified
19. (a) disk fragmentor: A file is fragmented when it Sample paper
becomes too large for your computer to store in a single modified
location on a disk. When this happens, your computer
splits the file up and stores in pieces. You can use
fragmented files, but it takes your computer longer to
access them.
(b) Backup software: This utility program facilitates
the backing-up of disk. Back-up means duplicating the
disk information so that in case of any damage or data-
loss, this backed-up data may be used.
20. Software are classified into following categories – Sample paper
(i) System Software modified
a. Operating System
b. Language Processor
(ii) Application Software
a. Packages
b. Utilities
c. Customized software
d. Developer Tools
OR
(iii) NameError
(iv) IndexError
(v) ImportError
6 of | 1 0
28. for a in range ( 15,25) : Sample paper
k=0 modified
for i in range (2 , a// 2 +1 ) :
if ( a % i = = 0 ) :
k = k +1
if ( k = = 0 ) :
print( a)
c. B
d. C
e. A
32. n=int(input( “enter the limit”)) Sample paper
s=0 modified
for i in range(1,n+1);
print(“enter “, i )
a= int(input(“number”))
s= s+a
avg=s/n
print(s)
print(avg)
OR
st
a= int(input(“enter 1 number”))
7 of | 1 0
b= int(input(“enter 2nd number”))
if a%b = = 0 :
print(a, “ is fully divisible b “, b)
else :
print(a, “ is not fully divisible b “, b)
OR
a. random
b. 3,4
c. 1,2
d. 30#40#50#.
e. double
(d) list.sort( )
(e) list=list*2
8 of | 1 0