0% found this document useful (0 votes)
27 views5 pages

Class XI (Computer Science)

This document is a question paper for Class XI Computer Science, consisting of 35 questions divided into 5 sections with varying marks. It covers topics such as Python programming, computer fundamentals, net etiquette, and logical expressions. Students are required to answer all programming questions using Python language only.

Uploaded by

happy sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views5 pages

Class XI (Computer Science)

This document is a question paper for Class XI Computer Science, consisting of 35 questions divided into 5 sections with varying marks. It covers topics such as Python programming, computer fundamentals, net etiquette, and logical expressions. Students are required to answer all programming questions using Python language only.

Uploaded by

happy sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Sarvodaya Public School

Class-XI
Subject: Computer Science (083)
Time allowed: 3 Hours Maximum Marks: 70
General Instructions:

Please check this question paper which contains 35 questions.


· The paper is divided into 5 Sections- A, B, C, D and E.
· Section A, consists of 18 questions (1 to 18). Each question carries 1 Mark.
· Section B, consists of 7 questions (19 to 25). Each question carries 2 Marks.
· Section C, consists of 5 questions (26 to 30). Each question carries 3 Marks.
· Section D, consists of 2 questions (31 to 32). Each question carries 4 Marks.
· Section E, consists of 3 questions (33 to 35). Each question carries 5 Marks.
· All programming questions are to be answered using Python Language only.

Section-A (18 Marks)


1. Python, a computer programming language is:
a. Low-level language b. Machine level language
c. Assembly level language d. High-level language

2. Which of the following are valid identifiers?


a. myname b. “Radha” c. 24.5 d. 24A

3. Stealing someone else’s intellectual work and representing it as own, is called___________.


a. IP Address b. Email Address c. Both of the above d. None of the above

4. What shape represents a decision in a flow chart?


a. Arrow b. Oval c. Diamond d. Rectangle

5. The default separator character of print ( ) is___________.


a. tab b. space c. newline d. dot

6. What is the primary function of the Operating System?


a. Managing hardware resources and providing user interface
b. Controlling User's Actions
c. storing data
d. Browsing the Internet

7. Which of the following is an example of cyber-crime?


a. Ethical Hacking b. Sharing Files Over Internet
c. Identity Theft d. Browsing social media

8. State true or false: A=4 and 4=A are interchangeably used in Python.
9. Which of the following is not a memory unit?
a. RAM b. ROM c. Register d. Bus

10. How many bytes are there in 1011 1001 0110 1110 numbers?
a. 1 b. 2 c. 4 d. 8

11. Which operator is used for floor division?


a. / b. // c. % d. None of the above

12. What will be the output for the following code?


y=7
z=3
y//=z
print(y)

a. 4 b. 3 c. 4 d. None of the above

13. Which of the following is no a type of error in Python?


a. KeyError b. ValueError c. ZeroDivisionError d. FloatingError

14. A netizen must follow:


a. Social Media Ettiquetes b. Communication Ettiquetes
c. Net Etiquettes d. All of the above

15. Which keyword is used to stop the loop before it has looped through all the
items?
a. Continue b. stop c. break d. exit

16. What will be the output?


a = 33
if a:
print(a)

a. False b. True c. a d. 33

Q17 and 18 are ASSERTION AND REASONING based questions.


Mark the correct choice as:
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
17. Assertion(A): Copyright, trademark, and patent are forms of intellectual property
protection.
Reason(R): To safeguard the innovation or creative work from duplicacy,
copyright, trademark and patent are granted to the creators.

18. Assertion(A): Python has a set of built in methods that you can use on strings.
Reason(R): All string methods return new values. They do not change the original
string.

Section-B (14 Marks)


19. What is the need of RAM? How does it differ from ROM?

20. Predict the output of the Python code given below:


n = 10
sum_even = 0
for i in range(1, n + 1):
if i % 2 == 0:
sum_even += i print(sum_even)

OR
Predict the output of the Python code given below:
n=5
factorial = 1
for i in range(1, n + 1):
factorial *= i
print(factorial)

21. Explain Net Etiquettes.


OR
What are the key communication etiquettes that individuals should follow in the
digital world to ensure effective online interaction?

22. Identify and correct the errors in the given code:


print("Hello, World')
x=5
y = 3 result = x + y print(result
OR

Identify and correct the errors in the given code:


name = "Abhay' age == 30
print("My name is", name, "and I am", age, "years old

23. What is statement? What is the significance of an empty statement?


24. Why should intellectual property rights be protected?

25. Draw the logic circuit for the following equation:


A’B’+(AB)’
OR

Draw the logic symbol of any two basic gates.

Section-C (15 Marks)

26. Write a Python Program to take an input number 'n' from the user and print its square and
cube.

27. Proof the Demorgan's Laws with the help of truth tables.3

OR

Explain Universal gates with the help of truth tables.

28. Write a program to calculate and display the sum of all odd numbers in a list.

OR

Write a program to input 'n' numbers in a list, and find the minimum and maximum
number among 'n' numbers.

29. ASHA making a project on “Environment cleanliness” and downloading some pages
from web browser, she completed her work in three steps, so give your justification for
following steps if any ethics violates or not:

(a) She read a paragraph then she pasted it in her report with the same words.
(b) She downloaded images and pasted them in her report in the form of collage.
(c)She copied the logo of one organization related with cleanliness and pasted on front
page of her report.

30. Write two ways in which a VIRUS affects a computer system, and one way how
spyware attacks.

Section-D (8 Marks)

31. What measures should one take to maintain confidentiality of personal information?

32. Write logical expression for the following:


Name is Raj and age is between 18 and 25

i) if….elif…..,else are not block or compound statement (True/False)


ii) Write a program to input an alphabet and check it is a vowel or not.

OR (Choice is only for Part (iii)

Write a program to input a number and check it is odd/even.

Section-E (15 Marks)

33. Write the output for the following statements on the given string:
s= “ interesting facts”
(a) print(s.upper())

(b) print((s.split(‘ ‘ ))

(c) print(s.find(‘CTS’))

(d) print(s.index(‘e’))

(e) print (s. replace (‘sacts’, ‘idea’))

OR

Write a program for checking whether the given character is uppercase, lowercase, digit,
special symbol or white space.

34. State De Morgan's law and prove it with a truth table.

35. Convert the following base of number system:

(a) (1010100)10 = (...............)2

(b) (3674)8 = (...............)2

(c) (266)10 = (...............)8

(d) (9F2)16 = (...............)2

(e) (1010.1001)2 = (………….)16

You might also like