0% found this document useful (0 votes)
78 views7 pages

Computer Final Year Paper

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
78 views7 pages

Computer Final Year Paper

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 7
RollNo. Code : 1123-24 CS~A Please check that this question paper contains 36 questions and 12 printed pages. CLASS-XI COMPUTER SCIENCE (083) ANNUAL EXAM (2023-24) Time allowed : 3 hours Maximum Marks : 70 General Instructions : 1. This question paper contains five sections, Section A to E. 2 All questions are compulsory. 3. Section A has 18 questions carrying 1 mark each. 4. Section B has 7 Very Short Answer type questions carrying 2 5. Section C has 5 Short Answer type questions carrying 3 6. Section D has 2 questions carrying 4 marks each. ion E has 3 questions carrying 5 marks each. All programming questions are to be answered using Section-A. 1. Select the reason for invalidity of My25! (a) Beginning with Upj (b) Having more thi (c) Having a special (d) Having digits *Statement 1 *Statement 2 *Statey Print(i, end=’ *) ) abeder (©) infinitely printing ‘a’ e- q 1 15. ‘The purpose of cyber cells in police station is fa) To report any eyber crime () To teach eyber safety measures to students a (c) “To make general people aware about eyber crimes m,, (4) To teach people about the uses of anti virus software Gs.) Select the option which is True after studying the following statement z from math.import ceil 5 (@) from statement is used to import only the function ceil instead of all the 10, 2 functions from the math module. 10, 20, 30, 40 (b) rom statement is used to import all the functions from the math module > 18, 20, 4 ee eterna ss inert - ; me (@) from statement is used to import all the functions from all the modules. 30, 44 nd ia Reasonit Mark the correct 13. Select the incorrect statement 1 12) Proper disposal of e-waste helps prevent pollution and publie health problem b) If old electronic devices are still fully functional, they ean\ beldaal orgs E-waste can be disca d with other recyclable waste. (d) [fan electronic device is too old or too damaged to donat a responsible e-waste recycler Select the output from the given options : names = ("Yashwant”, “Jaya”, “Kamal”, “Hing arint/sorted(names)) ) (Yashwant’, ‘Jaya’, Kamal (R) : M *= N is same as M= M* N (Hina’, Jaya’, 1? (Hina, ‘ 4s) 18’ Assertion (A) : A pseudocode is considered as a non-formal language that hel programmers to write algorithm. It is a detailed description of instructions, Reasoning (R) : It can be executed directly by the computer. 5 Section-B between ASCII and UNICC DE encoding schemes. oR Systems (Os) er interfaces. the error(s) if any, and underline each co rect lon; following logic cireuit following code : Kavya’:10000, Lalit’:25000, account{”Joy”}=28000 Find he PU oF he pay marks = (Bl0'96, Bay del marks\"Eoo') print(marks) marks.clear() print(marks) Select possible output to by following code ? Also specie cuPityed on the variables Lower and Upper <= vals ia aes oe i fatioed ta cack ag import random 2 num=(20,30,40,50,60,70), Lower = random.randist2, 4) Upper =random.randith2, 4) for K in range(Lower, Uj print (num(K), (a) 50@60@ {© 106208 Jemarks for the following al in quantity a for ¥ val fc (< bede 3 rintival) te ae rot) p “a by Dest (gua WORT 297 Le dents. If age is above or equal to 1g, then display a message “You are cigibie Os | ioe college”. Commie display the number of students who are not eligible for college. BS so nget hh ee ‘ ‘ cal ae » ob i Write the o soi g) General Ea ory) ct cantly GY Creative Commons (6c) or a Property is lgally protected through patente, Section-C a Write a ai it a string and replace all upper case lett 1 Beautiful gARen here is a Seautiful glededen Solend 6 and <8 champ’ >4 and ) Explain the term malware Name the authority that has been established to resolve disputes arising from cyber crimes. (a) Rohan has received an email that asked to update his personal details through a form, After filling the form he notices that his bank account has been debited by a huge amount. Identify the phishing method in which a fake or forged is used and the user presumes it to be from an authentic source. email addre (e) What is the need of IT Act in India ? 2 OR Aman went on a picnic with his family. He was excited t his friend Sujeet. He uploaded selected images on a Sujeet can see them. After two-three days he deleted that social networking site. But after deletion also ii photographs. Help Aman to get answers for the following answers so that he can understand it ‘a) How could Aman's frit (b) Can somebody else (c) Had these images (d) Define passive (e) Give examples

You might also like