SAMPLE PAPER-VII Class XI (Computer Science) SEE
SAMPLE PAPER-VII Class XI (Computer Science) SEE
BLUE PRINT
1 Programing and 5 5 4 2 - 35
Computational Thinking
(Unit1)
2 CSO (Unit2) 2 4 -- – -- 10
Instructions:
(i) Programming Language: PYTHON.
(ii) All Questions are compulsory within each section.
(c) Write main difference between list and tuple constructs of Python. 1
(b) Write a SQL command to add following column in above table Deptm.
1
Q7 (a) What is cyber bullying .
1
(b) Write the appropriate usage of social networks.
2
(c) What is cyber safety? Why is it important?
2
(d) What Is Backup and Recovery? Is it necessary to take backup of data?
2
(e) Differentiate between adware and malware.
2
(f) List rules for safely browsing the web
Session Ending Exam
XI- Computer Science (083)
Ans # use the named argument "end" to explicitly specify the end of line string
Integers.
Floating-Point Numbers.
Complex Numbers.
Strings.
Boolean Type (any two )
(c) Write main difference between list and tuple constructs of Python. 1
Ans: The main difference between lists and a tuples is the fact that lists are mutable whereas
tuples are immutable. A mutable data type means that a python object of this type can be
modified.
2
(g) Write a program to illustrate the difference between break and continue statements.
Ans: In Python, break statements are used to exit (or "break) a conditional loop that uses "for"
or "while". After the loop ends, the code will pick up from the line immediately following the
break statement. The continue statement is used to skip over certain parts of a loop. Here's an
example:
for y in range(7)
if (y==5):
continue or break
print(y)
2
Q2 (a) What is a function call IN PYTHON? Give Example.
Ans: Once we have defined a function, we can call it from another function, program
or even the Python prompt. To call a function, use the function name followed by parenthesis:
Example
def my_function():
print("Hello from a function")
my_function() #function call
2
(b) Write a Python program to sort a list of elements using the bubble sort algorithm.
Ans:
def bubbleSort(nlist):
for passnum in range(len(nlist)-1,0,-1):
for i in range(passnum):
if nlist[i]>nlist[i+1]:
temp = nlist[i]
nlist[i] = nlist[i+1]
nlist[i+1] = temp
nlist = [14,46,43,27,57,41,45,21,70]
bubbleSort(nlist)
print(nlist)
print("")
print("The Sum of even numbers in given input sequence = ", even_sum)
print("The Sum of odd numbers in given input sequence =", odd_sum)
3
(d) Write a program in Python to create a dictionary from a string with frequency of letters
Ans:
str=raw_input("Enter the string: ")
d={}
for i in str:
if i not in d:
d[i]=1
else:
d[i]+=1
print(d)
4
Q4 (a) What are dictionaries? Define keys(), values() and items() methods of dictionary.
Ans: A dictionary maps a set of objects (keys) to another set of objects (values). A Python
dictionary is a mapping of unique keys to values. Dictionaries are mutable, which means they can
be changed.
2
(e) What is the concept of Cloud Computing?
Ans: Cloud computing refers to storing and accessing data and programs over the internet
instead of yours computer’s hard drive. The cloud is just a metaphor for the internet. To store
and access program over a cloud, you need access to a cloud. There are two types of clouds
1. Public cloud (Example Google Drive, icloud, Amazon cloud Drive) 2. Private cloud( Private
cloud consists of computing resources exclusively owned by one business or organization)
2
Q5 (a) Define Operating system. Give the names of any three operating systems.
Answer: Operating System is defined as a collection of programs that coordinates the
operations of computer hardware and software. It acts as a bridge or interface between user
and hardware. Operating system is a system software which is mandatory for all computer
systems to operate. It is a general purpose software. Some commonly used operating systems
are DOS,Windows, BOSS etc.
OR 2
Convert Hexadecimal Number ( A2DE ) into its equivalent Octal Number.
Ans:
OR
Hexadecimal to Octal
Hexadecimal = A 2 D E
101 001 110 111
Binary = = 1010001011011110 binary
0 0 1 0
Add leading zeros or remove leading zeros to group into sets of three binary digits.
Binary: 1010001011011110 = 001 010 001 011 011 110
00 01 00 01 01 11
Binary =
1 0 1 1 1 0
Octal = 1 2 1 3 3 6 = 121336 octal
2
(c) What are the advantages of using a DBMS?
Ans: Advantages of DBMS are:
1. Reduce data redundancy (duplication of data)
2. Control data inconsistency to a large extent
3. Database facilitate sharing of data
4. Enforce standards
5. Centralized databases can ensure data security.
2
(d) Differentiate between DDL and DML?
Ans: DDL and DML Comparison Chart
Basis for
DDL DML
Comparison
DDL is used to create the database DML is used to populate and
Basic
schema. manipulate database
Full Form Data Definition Language Data Manipulation Language
DML is further classified as
Classification DDL is not classified further. Procedural and Non-Procedural
DMLs.
CREATE, ALTER, DROP, TRUNCATE AND SELECT, INSERT, UPDATE, DELETE,
Commands
COMMENT and RENAME, etc. MERGE, CALL, etc.
(e) A table "Animals" in a database has 3 columns and 10 records. What is the degree and 2
cardinality of this table?
Ans: degree = 3 cardinality = 10
Q6 (a) Write the SQL command to create the following table as Deptm with constraints.
(b) Write a SQL command to add following column in above table Deptm.
(d) Write SQL Commands for the questions form (a) to (h) on the basis of table
Teacher. [6 X 1M]
Table : Teacher
Ans:
(i) SELECT * FROM TEACHER WHERE DEPARTMENT=’History’ ORDER BY Name
DESC;
(ii) SELECT * FROM TEACHER WHERE DEPARTMENT=’Maths’ AND SEX=’M’;
(iii) SELECT NAME, SALARY, AGE FROM TEACHER WHER SEX=’M’;
(iv) UPDATE TEACHER SET SALARY= SALARY+1000 WHERE SEX=’F’;
(v) INSERT INTO TEACHER VALUES (9, ‘Raja’, 23, ‘Hindi’, ‘2005-08-19’,12675, ‘M’
);
(vi) SELECT Name FORM TEACHER WHERE NAME LIKE ‘S%’;
1 Marks each for writing correct query.
1
Q7 (a) What is cyber bullying .
Ans: the use of electronic communication to bully a person, typically by sending
messages of an intimidating or threatening nature.
1
(b) Write the appropriate usage of social networks.
Ans: Audit yourself. Before applying for any jobs, take the time and perform a
personal web audit and see what information about you arises. Create a professional
profile. Show and tell. Be discreet. Be proactive.
2
(c) What is cyber safety? Why is it important?
Ans: Cyber safety is also called as internet safety. Importance of Internet safety in
between variety of information, personal data and property protection is really
important. Internet safety is more important for users while accessing online banking
services and shopping. The objective of this field is to limit computer crimes, especially
those associated with hacking and identity theft. The field of Cyber Safety attempts to
impede the threat of computer crimes through the protection of information and
corruption.
2
(d) What Is Backup and Recovery? Is it necessary to take backup of data?
Ans: Backup and recovery describes the process of creating and storing copies of
data that can be used to protect organizations against data loss. Recovery from a
backup typically involves restoring the data to the original location, or to an alternate
location where it can be used in place of the lost or damaged data.A proper backup
copy is stored in a separate system or medium, such as tape, from the primary data to
protect against the possibility of data loss due to primary hardware or software failure.
2
(e) Differentiate between adware and malware.
Ans: Malware is a combination of the words “Malicious” and “Software". Its an
umbrella term to describe any software that is used to cause harm or to steal/breach
data. (Trojans, worms, viruses, etc.)
Adware is a form of Malware that usually comes prepackaged with software that is
downloaded. It will mainly cause a lot of unwanted pop-ups and unclosable windows to
appear on your computer. These pop-ups often have links that will direct to harmful
sites, and scams.
2
(f) List rules for safely browsing the web
Ans: