0% found this document useful (0 votes)
127 views14 pages

SAMPLE PAPER-VII Class XI (Computer Science) SEE

The document provides a blueprint for the session ending exam in Computer Science for Class XI. It outlines the exam structure which includes 10 questions in various typologies. The questions will be from 4 units - Programming and Computational Thinking, Computer System Organization, Data Management, and Society, Law and Ethics with a focus on Cyber Safety. The total marks for the exam are 70.

Uploaded by

Deepika Aggarwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views14 pages

SAMPLE PAPER-VII Class XI (Computer Science) SEE

The document provides a blueprint for the session ending exam in Computer Science for Class XI. It outlines the exam structure which includes 10 questions in various typologies. The questions will be from 4 units - Programming and Computational Thinking, Computer System Organization, Data Management, and Society, Law and Ethics with a focus on Cyber Safety. The total marks for the exam are 70.

Uploaded by

Deepika Aggarwal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Session Ending Exam

XI- Computer Science (083)

BLUE PRINT

S. No Typology of Questions Very Short Short Short Long Long Total


Answer Answer-I Answer -II Answer Answer Marks
(VSA) (SA-I) (SA-II) (L.A.) (L.A.)
(1 mark) (2 marks) (3 marks) (4 (6
marks) marks)

1 Programing and 5 5 4 2 - 35
Computational Thinking
(Unit1)
2 CSO (Unit2) 2 4 -- – -- 10

3 Data Management (DM-1, 1 4 -- - 15


Unit 3) 1
4 Society, Law and Ethics 2 4 - - - 10
(SLE-1)- Cyber Safety
(Unit 4)
Total Marks 10 34 12 8 6 70
SAMPLE PAPER-VII
Session Ending Exam
CLASS XI Computer Science (083)

Time allowed: 3 hours] [Maximum marks: 70]

Instructions:
(i) Programming Language: PYTHON.
(ii) All Questions are compulsory within each section.

Q1 (a) What is the syntax to print output in a single line. 1

(b) List any two common datatypes used in python. 1

(c) Write main difference between list and tuple constructs of Python. 1

(d) Give any two example of Python runtime errors. 1

(e) Write the output produced by this program below:-


Words= ‘Hello World’
print((words.title())
print(words.replace (“World”, ‘Oswal’))
print(words.upper()) 2
print(words *2)
2
(f) Write a program to enter a number in python and print its octal and hexadecimal equivalent.
2
(g) Write a program to illustrate the difference between break and continue statements.
2
Q2 (a) What is a function call IN PYTHON? Give Example.
2
(b) Write a Python program to sort a list of elements using the bubble sort algorithm.
(c) What types of conditional structures are present in programming language? 3
How many of them are supported in python?
(d) Write a python program to receive the numbers from user through keyboard until user
Gives 0 (to end the input process), then the program calculate and display the sum of given
odd numbers and even numbers respectively.
e.g.
if the user gives the following sequence of numbers:
7 5 10 14 3 9 11 12
Then the output should be as follows: 4
The Sum of even numbers in given input sequence = 36
The Sum of odd numbers in given input sequence = 35
Q3 (a) Write Python statement for the following :
If variable sum is equal to 10 and total is less than 20, print the text string “Incorrect” using 1
if statement.
(b) Write pseudo-code / flowchart to input the year and to test and display whether the given 3
year is leap year or not?
3
(c) Write a program in Python to check a given String is Palindrome or not.
3
(d) Write a program in Python to create a dictionary from a string with frequency of letters
4
Q4 (a) What are dictionaries? Define keys(), values() and items() methods of dictionary.
1
(b) Define Software.
1
(c) What does a bus mean?
2
(d) Write two differences between Bluetooth and infrared
2
(e) What is the concept of Cloud Computing?
2
Q5 (a) Define Operating system. Give the names of any three operating systems.
(b) Draw XOR gate using minimum number of NAND gate.
OR 2
Convert Hexadecimal Number ( A2DE ) into its equivalent Octal Number.
2
(c) What are the advantages of using a DBMS?
2
(d) Differentiate between DDL and DML?
(e) A table "Animals" in a database has 3 columns and 10 records. What is the degree and 2
cardinality of this table?
Q6 (a) Write the SQL command to create the following table as Deptm with constraints.

Field Name Field Type Constraint


DEPTNO Integer NOT NULL PRIMARY KEY
DNAME Varchar(14) NOT NULL
LOC Varchar(13) 2
Salary Integer(5)

(b) Write a SQL command to add following column in above table Deptm.

Column Name Data Type Size Constraint Description 1


Address Varchar 40 Address of the Person
(c) Write SQL Commands for the questions form (i) to (vi) on the basis of table Teacher.
[6 X 1M]
Table : Teacher 6
No. Name Age Department Dateojjoin Salary Sex
1 Jugal 34 Computer 2007-02-10 12000 M
2 Shanti 31 History 2008-03-24 20000 F
3 Sandeep 32 Maths 2009-02-25 14000 M
4 Sangeeta 45 History 2007-04-15 20000 F
5 Rakesh 35 Computer 2007-05-17 21000 M

(i) To show all information about the teacher of History department in


descending order of their name .
(ii) To list the male teacher who are in Maths department.
(iii) To display Name, Salary, Age of all male teacher.
(iv) Update the Salary by increasing Rs. 1000 for female teacher.
(v) To Insert a new record in table Teacher with the following data : 9,
‘Raja’, 23, ‘Hindi’, ‘2005-08-19’,12675, ‘M’
(vi) Display the name of those teacher whose name started with alphabet ‘S’;

1
Q7 (a) What is cyber bullying .
1
(b) Write the appropriate usage of social networks.
2
(c) What is cyber safety? Why is it important?
2
(d) What Is Backup and Recovery? Is it necessary to take backup of data?
2
(e) Differentiate between adware and malware.
2
(f) List rules for safely browsing the web
Session Ending Exam
XI- Computer Science (083)

Time: 3hr MARKING SCHEME MM: 70

Q. No. Suggested / Expected Answer with Hint Marks

Q1 (a) What is the syntax to print output in a single line in Python. 1

Ans # use the named argument "end" to explicitly specify the end of line string

print("Hello World!", end = '')

(b) List any two common datatypes used in python. 1

Ans: Basic Data Types in Python

 Integers.
 Floating-Point Numbers.
 Complex Numbers.
 Strings.
 Boolean Type (any two )

(c) Write main difference between list and tuple constructs of Python. 1

Ans: The main difference between lists and a tuples is the fact that lists are mutable whereas
tuples are immutable. A mutable data type means that a python object of this type can be
modified.

(d) Give any two example of Python runtime errors. 1

Division by zero, performing an operation on incompatible types, trying to access a file


which Doesn’t exist or any other two example of Python runtime errors. (any two )

(e) Write the output produced by this program below:-


Words= ‘Hello World’
print((words.title())
print(words.replace (“World”, ‘Oswal’))
print(words.upper()) 2
print(words *2)
Ans: Hello World
Hello Oswal
HELLO OSWAL
HELLO OSWAL HELLO OSWAL
(f) Write a program to enter a number in python and print its octal and hexadecimal 2
equivalent.
Ans: num = int(input("enter a decimal number: "))
print("octal form is ", oct(num))
print("hexadecimal form is ", hex(num))

2
(g) Write a program to illustrate the difference between break and continue statements.
Ans: In Python, break statements are used to exit (or "break) a conditional loop that uses "for"
or "while". After the loop ends, the code will pick up from the line immediately following the
break statement. The continue statement is used to skip over certain parts of a loop. Here's an
example:
for y in range(7)
if (y==5):
continue or break
print(y)

2
Q2 (a) What is a function call IN PYTHON? Give Example.
Ans: Once we have defined a function, we can call it from another function, program
or even the Python prompt. To call a function, use the function name followed by parenthesis:

Example

def my_function():
print("Hello from a function")
my_function() #function call

2
(b) Write a Python program to sort a list of elements using the bubble sort algorithm.
Ans:
def bubbleSort(nlist):
for passnum in range(len(nlist)-1,0,-1):
for i in range(passnum):
if nlist[i]>nlist[i+1]:
temp = nlist[i]
nlist[i] = nlist[i+1]
nlist[i+1] = temp

nlist = [14,46,43,27,57,41,45,21,70]
bubbleSort(nlist)
print(nlist)

(c) What types of conditional structures are present in programming language? 3


How many of them are supported in python?
Ans: Decision Statements or selection statements are the statements which produce a
certain output based upon a condition.
Some decision statements commonly supported by all languages are:
(i) If…Else
This enables the programmer to provide different paths for the program flow depending on
certain conditions. . Syntax:
if (condition)
{
//statements to be executed;
}
else
{
//statements to be executed;
}
(ii) Nested If
You can have an ‘if’ statement within another ‘if’ statement. This is known as nested ‘if’. The
program flow will enter into the inner ‘if’ condition only if the outer ‘if’ condition is satisfied.
In general form nested ‘if’ will be of the form:
if (condition1)
{
//code to be executed if ondition1 is true
if (condition2)
{
//code to be executed if condition2 is true
}}
(iii) Switch
A switch statement is a type of selection control mechanism used to allow the value of a
variable or expression to change the control flow of program execution via a multiway
branch.

Python supports if…else and nested if.


(d) Write a python program to receive the numbers from user through keyboard until user
Gives 0 (to end the input process), then the program calculate and display the sum of given
odd numbers and even numbers respectively.
e.g.
if the user gives the following sequence of numbers:
7 5 10 14 3 9 11 12
Then the output should be as follows:
The Sum of even numbers in given input sequence = 36 4
The Sum of odd numbers in given input sequence = 35
Ans:
num_str = input("Input an integer (0 terminates):")
num_int=int(num_str)
even_sum=0
odd_sum=0

while num_int !=0:


num_str = input("Input an integer (0 terminates):")
num_int=int(num_str)
for num_int in num_str:
if num_int%2 == 0:
even_count += 1
else:
odd_count +=1

print("")
print("The Sum of even numbers in given input sequence = ", even_sum)
print("The Sum of odd numbers in given input sequence =", odd_sum)

Q3 (a) Write Python statement for the following :


If variable sum is equal to 10 and total is less than 20, print the text string “Incorrect” 1
using if statement.

Ans: if( (sum == 10) && (total < 20) ) print("incorrect");


(b) Write pseudo-code / flowchart to input the year and to test and display whether the 3
Given year is leap year or not?
Ans: PSEUDOCODE:
INPUT Y % Y= year
IF mod(Y,4)==0
IF mod(Y,100)==0
IF mod(Y,400)==0
PRINT ‘Y is leap year’
ELSE
PRINT ‘Y is NOT leap year’
END
ELSE
PRINT ‘Y is leap year’
END
ELSE
PRINT ‘Y is NOT leap year’
flowchart
3
(c) Write a program in Python to check a given String is Palindrome or not.
Ans:
string = input("Please enter your own String : ")

if(string == string[:: - 1]):


print("This is a Palindrome String")
else:
print("This is Not a Palindrome String")

3
(d) Write a program in Python to create a dictionary from a string with frequency of letters
Ans:
str=raw_input("Enter the string: ")
d={}
for i in str:
if i not in d:
d[i]=1
else:
d[i]+=1
print(d)

4
Q4 (a) What are dictionaries? Define keys(), values() and items() methods of dictionary.
Ans: A dictionary maps a set of objects (keys) to another set of objects (values). A Python
dictionary is a mapping of unique keys to values. Dictionaries are mutable, which means they can
be changed.

dict.keys() Returns list of dictionary dict's keys


dict.values() Returns list of dictionary dict's values
dict.items() Returns a list of dict's (key, value) tuple pairs
1
(b) Define Software.

Ans: Software is a collection of programs and related documentation


1
(c) What does a bus mean?
Ans: A bus is a group of conducting lines that caries data, address and control signals
between CPU and memory .
2
(d) Write two differences between Bluetooth and infrared
Ans:
Bluetooth Infrared
1. Not affected by physical inference Communication stops in presence of
interference
2. Range more than infrared Range less than Bluetooth
3. Bluetooth does not need a direct line Infrared needs a direct line of connection
of connection

2
(e) What is the concept of Cloud Computing?
Ans: Cloud computing refers to storing and accessing data and programs over the internet
instead of yours computer’s hard drive. The cloud is just a metaphor for the internet. To store
and access program over a cloud, you need access to a cloud. There are two types of clouds
1. Public cloud (Example Google Drive, icloud, Amazon cloud Drive) 2. Private cloud( Private
cloud consists of computing resources exclusively owned by one business or organization)

2
Q5 (a) Define Operating system. Give the names of any three operating systems.
Answer: Operating System is defined as a collection of programs that coordinates the
operations of computer hardware and software. It acts as a bridge or interface between user
and hardware. Operating system is a system software which is mandatory for all computer
systems to operate. It is a general purpose software. Some commonly used operating systems
are DOS,Windows, BOSS etc.

(b) Draw XOR gate using minimum number of NAND gate.

OR 2
Convert Hexadecimal Number ( A2DE ) into its equivalent Octal Number.
Ans:

OR
Hexadecimal to Octal

Hexadecimal = A 2 D E
101 001 110 111
Binary = = 1010001011011110 binary
0 0 1 0
Add leading zeros or remove leading zeros to group into sets of three binary digits.
Binary: 1010001011011110 = 001 010 001 011 011 110
00 01 00 01 01 11
Binary =
1 0 1 1 1 0
Octal = 1 2 1 3 3 6 = 121336 octal
2
(c) What are the advantages of using a DBMS?
Ans: Advantages of DBMS are:
1. Reduce data redundancy (duplication of data)
2. Control data inconsistency to a large extent
3. Database facilitate sharing of data
4. Enforce standards
5. Centralized databases can ensure data security.
2
(d) Differentiate between DDL and DML?
Ans: DDL and DML Comparison Chart
Basis for
DDL DML
Comparison
DDL is used to create the database DML is used to populate and
Basic
schema. manipulate database
Full Form Data Definition Language Data Manipulation Language
DML is further classified as
Classification DDL is not classified further. Procedural and Non-Procedural
DMLs.
CREATE, ALTER, DROP, TRUNCATE AND SELECT, INSERT, UPDATE, DELETE,
Commands
COMMENT and RENAME, etc. MERGE, CALL, etc.
(e) A table "Animals" in a database has 3 columns and 10 records. What is the degree and 2
cardinality of this table?
Ans: degree = 3 cardinality = 10

Q6 (a) Write the SQL command to create the following table as Deptm with constraints.

Field Name Field Type Constraint


DEPTNO Integer NOT NULL PRIMARY KEY
DNAME Varchar(14) NOT NULL
LOC Varchar(13) 2
Salary Integer(5)
Ans: Create table Deptm (DEPTNO integer primary key, DNAME varchar(14) NOT NULL,
LOC VARCHAR (14), Salary Integer(5));
2 Marks for writing correct query.

(b) Write a SQL command to add following column in above table Deptm.

Column Name Data Type Size Constraint Description 1


Address Varchar 40 Address of the Person
Ans: Alter table Deptm ADD ( Address Varchar(40)); 1 Marks for writing correct query.

(d) Write SQL Commands for the questions form (a) to (h) on the basis of table
Teacher. [6 X 1M]
Table : Teacher

No. Name Age Department Dateojjoin Salary Sex


1 Jugal 34 Computer 2007-02-10 12000 M 6
2 Shanti 31 History 2008-03-24 20000 F
3 Sandeep 32 Maths 2009-02-25 14000 M
4 Sangeeta 45 History 2007-04-15 20000 F
5 Rakesh 35 Computer 2007-05-17 21000 M

(vii) To show all information about the teacher of History department in


descending order of their name .
(viii) To list the male teacher who are in Maths department.
(ix) To display Name, Salary, Age of all male teacher.
(x) Update the Salary by increasing Rs. 1000 for female teacher.
(xi) To Insert a new record in table Teacher with the following data : 9,
‘Raja’, 23, ‘Hindi’, ‘2005-08-19’,12675, ‘M’
(xii) Display the name of those teacher whose name started with alphabet ‘S’;

Ans:
(i) SELECT * FROM TEACHER WHERE DEPARTMENT=’History’ ORDER BY Name
DESC;
(ii) SELECT * FROM TEACHER WHERE DEPARTMENT=’Maths’ AND SEX=’M’;
(iii) SELECT NAME, SALARY, AGE FROM TEACHER WHER SEX=’M’;
(iv) UPDATE TEACHER SET SALARY= SALARY+1000 WHERE SEX=’F’;
(v) INSERT INTO TEACHER VALUES (9, ‘Raja’, 23, ‘Hindi’, ‘2005-08-19’,12675, ‘M’
);
(vi) SELECT Name FORM TEACHER WHERE NAME LIKE ‘S%’;
1 Marks each for writing correct query.
1
Q7 (a) What is cyber bullying .
Ans: the use of electronic communication to bully a person, typically by sending
messages of an intimidating or threatening nature.
1
(b) Write the appropriate usage of social networks.
Ans: Audit yourself. Before applying for any jobs, take the time and perform a
personal web audit and see what information about you arises. Create a professional
profile. Show and tell. Be discreet. Be proactive.
2
(c) What is cyber safety? Why is it important?
Ans: Cyber safety is also called as internet safety. Importance of Internet safety in
between variety of information, personal data and property protection is really
important. Internet safety is more important for users while accessing online banking
services and shopping. The objective of this field is to limit computer crimes, especially
those associated with hacking and identity theft. The field of Cyber Safety attempts to
impede the threat of computer crimes through the protection of information and
corruption.

2
(d) What Is Backup and Recovery? Is it necessary to take backup of data?
Ans: Backup and recovery describes the process of creating and storing copies of
data that can be used to protect organizations against data loss. Recovery from a
backup typically involves restoring the data to the original location, or to an alternate
location where it can be used in place of the lost or damaged data.A proper backup
copy is stored in a separate system or medium, such as tape, from the primary data to
protect against the possibility of data loss due to primary hardware or software failure.
2
(e) Differentiate between adware and malware.
Ans: Malware is a combination of the words “Malicious” and “Software". Its an
umbrella term to describe any software that is used to cause harm or to steal/breach
data. (Trojans, worms, viruses, etc.)
Adware is a form of Malware that usually comes prepackaged with software that is
downloaded. It will mainly cause a lot of unwanted pop-ups and unclosable windows to
appear on your computer. These pop-ups often have links that will direct to harmful
sites, and scams.
2
(f) List rules for safely browsing the web
Ans:

 Keep Personal Information Professional and Limited.


 Keep Your Privacy Settings On.
 Make Sure Your Internet Connection is Secure. Use a firewall.
 Be Careful What You Download. .
 Choose Strong Passwords.
 Update your security software.

You might also like