Informatics Practice (065) - Practice Paper-1 - QP
Informatics Practice (065) - Practice Paper-1 - QP
General Instructions
Please check this question paper contains 37 questions.
All questions are compulsory. However, internal choices have been provided in
some questions. Attempt only one of the choices in such questions
The paper is divided into 5 Sections- A, B, C, D and E.
Section A consists of 21 questions (1 to 21). Each question carries 1 Mark.
Section B consists of 7 questions (22 to 28). Each question carries 2 Marks.
Section C consists of 4 questions (29 to 32). Each question carries 3 Marks.
Section D consists of 2 case study type questions (33 to 34). Each
question carries 4 Marks.
Section E consists of 3 questions (35 to 37). Each question carries 5 Marks.
All programming questions are to be answered using Python Language only.
In case of MCQ, text of the correct answer should also be written.
COMMON EXAMINATION
Class-12
Informatics Practices (065)
Roll No.: Maximum Marks: 70
Date: Time allowed: 3 hours
Q.No. Section- A(21 x 1= 21 Marks) Marks
1 State whether the following statement is True or False:- 1
A Dataframe object is value mutable
1 of 9
CHENNAI SAHODAYA SCHOOLS COMPLEX
9 State True/False:- 1
A CSV File is open in the same way as text file
10 Whenever we surf the internet using smart phones we leave a trail of data 1
reflecting the activities performed by us online, which is our _______
A. Digital Footprint B. Digital Activities
C. Online handprint D. Internet Activities.
11. Given a relation country (name, continent, population) which of the following 1
is a valid SQL statement?
A. SELECT continent, population FROM country GROUP BY continent
B. SELECT continent, SUM(population) FROM country GROUP BY
continent
C. SELECT name, population FROM country GROUP BY continent
D. SELECT name, SUM(population) FROM country GROUP BY
continent
12. In order to allow data transfer from server to the intended computers, which 1
network device is required in the lab to connect the computers?
A. Switch B. Hub
C. Router D. Gateway
13. In Python Pandas, while performing mathematical operations on series, index 1
matching is implemented and all missing values are filled in with _______by
default.
A. Null B. Blank
C. NaN D. Zero
14. By restricting the server and encrypting the data, a software company's server 1
is unethically accessed in order to obtain sensitive information. The attacker
blackmails the company to pay money for getting access to the data and
threatens to publish sensitive information unless price is paid. This kind of
attack is known as:
A. Phishing B. Identity Theft
C. Plagiarism D. Ransomware
2 of 9
CHENNAI SAHODAYA SCHOOLS COMPLEX
(A) Both Assertion (A) and Reason (R) are true, and Reason (R) is the correct
explanation of Assertion (A)
(B) Both Assertion (A) and Reason (R) are true, but Reason (R) is not the
correct explanation of Assertion (A)
(C) Assertion (A) is True, but Reason (R) is False
(D) Assertion (A) is False, but Reason (R) is True
20. Assertion (A):- To use the Pandas library in a Python program, one must 1
import it.
Reasoning (R): - The only alias name that can be used with the Pandas library
is pd.
21. Assertion (A) The bus topology is prone to data collisions. 1
Reason(R) In a bus topology, all devices share the same communication
medium, leading to data collisions when two devices transmit data
simultaneously.
SECTION -B (7 X 2=14 Marks )
22. (A) Write any two attributes of series. Also, give a suitable example to
support your answer.
OR 2
(B) How many ways you can access a rows from a DataFrame in
Python?
23. List any four benefits of E-Waste Management. 2
24. Consider the String: “Structured Query Language” . Write suitable SQL
queries for the following:
2
1. To Extract and display “Query” from the string.
2. Display the position of “Language” in the given string.
25. (A) What is the use of add-ons in web browser?
OR 2
Explain the importance of cookies.
(B)
26. What is the difference between the order by and group by clause when used
2
along with the select statement? Explain with an example.
3 of 9
CHENNAI SAHODAYA SCHOOLS COMPLEX
27. Shivani is using her internet connection to book a flight ticket. This classic
2
example of leaving a trail of web activities carried by her. What do we call this
type of activity? What is the risk involved by such kind of activity? How to
reduce risk associated with it?
28 (A) Punitha is writing a Python program to create a DataFrame using a list
2
of dictionaries. However, her code contains some mistakes. Identify the
errors, rewrite the correct code, and underline the corrections made.
Import Pandas
DF1 = {'SName': 'Ashwin ', 'Age': 15}
DF2 = {'SName': 'Vinod ', 'Age': 96}
DF3 = ('Name': 'Ayesha", 'Age': 28)
Stud_Info = [DF1,DF2,DF3]
df = pd.Dataframe(Stud Info)
print(df)
OR
(B) Complete the given Python code to get the required output(ignore the
dtype attribute)as
Output:
Name Marks
1 Aravind 98
2 Binu 100
3 Chetna 76
Python Code:
import ____________
Data = [[‘Aravind’, 98],[‘Binu’, 100], [__________]]
D=pd._____________(Data,________=[“Name”,”Marks”],
index=[____________])
print(D)
SECTION –C (4 x 3= 12 Marks)
29 The school offers wireless facility (wifi) to the Computer Science students of 3
Class XI. For communication, the network security staff of the school has a
registered URL schoolwifi.edu. On 17 September 2024, the following email
was mass distributed to all the Computer Science students of Class XI. The
email claimed that the password of the students was about to expire.
Instructions were given to go to URL to renew their password within 24 hours.
i. Do you find any discrepancy in this email?
ii. What will happen if the student clicks on the given URL?
iii. Is the email an example of cybercrime? If yes, then specify which type of
cybercrime is it. Justify your answer.
4 of 9
CHENNAI SAHODAYA SCHOOLS COMPLEX
AdNo Name
0 1848 Nidhi
1 1846 Gunjan
2 1850 Dimpi
3 1852 Sudhir
II. Write SQL Query to insert the following data in the Bookstore Table
11234, The blue umbrella, Ruskin Bond, 150, 1974.
Table 2:
REWARD which stores Person ID (PER_ID), Date reward (Date_
reward), Amount (AMOUNT) for various persons.
Table: Persons
PER_ID FIRST_NAME LAST_NAME PERSON_CITY
1 KAILASH VERMA MUMBAI
2 VINEET SHARMA KOLKATTA
3 VENKAT VERMA CHENNAI
4 KANISHK RAMAN AGRA
5 SUNDAR RAM USA
5 of 9
CHENNAI SAHODAYA SCHOOLS COMPLEX
Table: Reward
PER_ID DATE_REWARD AMOUNT
1 2023-05-11 2000
2 2020-02-11 5000
3 2024-04-02 3000
5 2024-11-11 4000
Write appropriate SQL queries for the following:
I. Change the person city of Mumbai to London in the table Persons.
II. List all Last name, date of the reward in the decreasing order of
date.
III. Display First name of the Person name along with their
corresponding city.
OR
Consider the CUSTOMERS TABLE having following
(B)
records:-
Table : Customers
ID NAME AGE ADDRESS AMOUNT
6 of 9
CHENNAI SAHODAYA SCHOOLS COMPLEX
34 (A) Shanu, who works as a game developer, has developed a database for his 4
company. This database includes a table GAMES whose column
(attribute) names are mentioned below:
GCODE : Shows the unique code for each game.
GAMES_NAME: Indicated the game's name.
TYPE: Specifies the type of the game.
PRIZE_MONEY: Lists the cost of the game.
Table : GAMES:
7 of 9
CHENNAI SAHODAYA SCHOOLS COMPLEX
Section-E (3 x 5 = 15 Marks)
35 XEED Private Ltd. Delhi is a company that deals with educational toys. They 5
have different divisions HR (AI), Sales (A2), Production (A3) and Marketing
(A4). The Layout of the Delhi branch is
HR(A1) SALES(A2)
PRODUCTION(A3) Marketing(A4)
II. Suggest the kind of network required ( out of LAN, MAN, WAN) for
connecting production (A3) with the Bangalore branch.
III. Which device can be used to connect the network of Delhi Branch to the
internet? This device should be able to receive data, analyse it and then
transmit it to the network.
IV. Suggest the placement of switch/hub, repeater with justification.
8 of 9
CHENNAI SAHODAYA SCHOOLS COMPLEX
-----------------------End of paper-----------------------------
9 of 9