Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
15 views6 pages

Xi Cs

Class 11 cs

Uploaded by

kasreehari15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views6 pages

Xi Cs

Class 11 cs

Uploaded by

kasreehari15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

‭KENDRIYA VIDYALAYA SANGATHAN, LUCKNOW REGION‬

‭SUPPLEMENATARY EXAMINATION 2023-24‬


‭MM-70‬ ‭COMPUTER SCIENCE-083 (CLASS-11)‬
‭TIME-3HRS‬

‭General Instructions:‬
‭●‬ ‭Please check this question paper contains 35 questions.‬
‭●‬ ‭The paper is divided into 4 Sections- A, B, C, D and E.‬
‭●‬ ‭Section A, consists of 18 questions (1 to 18). Each question carries 1 Mark.‬
‭●‬ ‭Section B, consists of 7 questions (19 to 25). Each question carries 2 Marks.‬
‭●‬ ‭Section C, consists of 5 questions (26 to 30). Each question carries 3 Marks.‬
‭●‬ ‭Section D, consists of 2 questions (31 to 32). Each question carries 4 Marks.‬
‭●‬ ‭Section E, consists of 3 questions (33 to 35). Each question carries 5 Marks.‬
‭●‬ ‭All programming questions are to be answered using Python Language only.‬
‭Question‬ ‭Marks‬
‭SECTION A‬
‭A disk fragmentor is an example of-‬
‭a.‬ ‭Application Software‬
‭1‬ ‭b.‬ ‭System Software‬ ‭1‬
‭c.‬ ‭Utility Program‬
‭d.‬ ‭None of these‬
‭The hexadecimal digits are 1 to 0 and A to ________________‬
‭a.‬ ‭E‬
‭2‬ ‭b.‬ ‭F‬ ‭1‬
‭c.‬ ‭G‬
‭d.‬ ‭D‬
‭The output of a two-input AND gate is high when‬
‭a.‬ ‭Both inputs are low‬
‭3‬ ‭b.‬ ‭Both inputs are high‬ ‭1‬
‭c.‬ ‭Any one input is high‬
‭d.‬ ‭Only one input is high‬
‭Stealing someone else’s intellectual work and representing it as own, is called-‬
‭a.‬ ‭Intellectual steal‬
‭4‬ ‭b.‬ ‭Pluckism‬ ‭1‬
‭c.‬ ‭Plagiarism‬
‭d.‬ ‭Pickism‬
‭Firewalls are used to protect against-‬
‭a.‬ ‭Data driven attacks‬
‭5‬ ‭b.‬ ‭Fire attacks‬ ‭1‬
‭c.‬ ‭Virus attacks‬
‭d.‬ ‭Unauthorized access‬
‭Which of the following is not a cyber-crime?‬
‭a.‬ ‭Identity theft‬
‭6‬ ‭1‬
‭b.‬ ‭Sending mail to misspelled email id‬
‭c.‬ ‭Cyber Bullying‬
‭d.‬ ‭Cyber Stalking‬
‭The cookies are stored on user’s computer locally.‬
‭7‬ ‭a.‬ ‭True‬ ‭1‬
‭b.‬ ‭False‬
‭What shape represents a decision in a flowchart?‬
‭a.‬ ‭A diamond‬
‭8‬ ‭b.‬ ‭A rectangle‬ ‭1‬
‭c.‬ ‭An oval‬
‭d.‬ ‭None of these‬
‭Python uses a/an ______________ to convert source code to object code.‬
‭a.‬ ‭Interpreter‬
‭9‬ ‭b.‬ ‭Compiler‬ ‭1‬
‭c.‬ ‭Combination of Interpreter and Compiler‬
‭d.‬ ‭Special virtual engine‬
‭Which of the following is an escape sequence for a new line character?‬
‭a.‬ ‭\a‬
‭10‬ ‭b.‬ ‭\t‬ ‭1‬
‭c.‬ ‭\n‬
‭d.‬ ‭\b‬
‭What will be the following code produce?‬
‭A , B = 8.6 , 2‬
‭print(A//B)‬
‭11‬ ‭a.‬ ‭4.3‬ ‭1‬
‭b.‬ ‭4.0‬
‭c.‬ ‭4‬
‭d.‬ ‭Compilation error‬
‭Which of the following statements will make a selection construct?‬
‭a.‬ ‭if‬
‭12‬ ‭b.‬ ‭if-else‬ ‭1‬
‭c.‬ ‭for‬
‭d.‬ ‭while‬
‭Which of the following is/are not legal string operators?‬
‭a.‬ ‭in‬
‭13‬ ‭b.‬ ‭+‬ ‭1‬
‭c.‬ ‭*‬
‭d.‬ ‭/‬
‭Which of the following will return the last element of a list L with 5 elements?‬
‭a.‬ ‭L[5]‬
‭14‬ ‭b.‬ ‭L[-4]‬ ‭1‬
‭c.‬ ‭L[-1]‬
‭d.‬ ‭L[6]‬
‭Which of the following will create a single element tuple?‬
‭a.‬ ‭(1,)‬
‭15‬ ‭b.‬ ‭(1)‬ ‭1‬
‭c.‬ ‭([1])‬
‭d.‬ ‭None of these‬
‭Dictionaries are also called-‬
‭16‬ ‭1‬
‭a.‬ ‭Mappings‬
b‭ .‬ ‭Hashes‬
‭c.‬ ‭Associative arrays‬
‭d.‬ ‭All of these‬
‭Q17‬ ‭and‬ ‭18‬ ‭are‬ ‭ASSERTION‬ ‭AND‬ ‭REASONING‬ ‭based‬ ‭questions.‬ ‭Mark‬ ‭the‬
‭correct choice as‬
‭a. Both A and R are true and R is the correct explanation for A‬
‭b. Both A and R are true and R is not the correct explanation for A‬
‭c. A is True but R is False‬
‭d. A is false but R is True‬
‭Assertion:‬‭Any comma-separated group of values creates‬‭a tuple.‬
‭17‬ ‭Reason:‬ ‭A‬ ‭set‬ ‭of‬ ‭comma-separated‬ ‭values,‬ ‭surrounded‬ ‭with‬ ‭or‬ ‭without‬ ‭round‬ ‭1‬
‭brackets, creates a tuple.‬
‭Assertion:‬‭The for loop is a counting loop that works‬‭with sequences of values.‬
‭18‬ ‭1‬
‭Reason:‬‭The range( ) function generates a sequence‬‭of list type.‬
‭SECTION B‬
‭What is the difference between RAM and ROM?‬
‭Or‬
‭Name the input or output device to do the following-‬
‭19‬ ‭a.‬ ‭To output audio‬ ‭ +1=2‬
1
‭b.‬ ‭To enter textual data‬
‭c.‬ ‭To make hard copy of a text file.‬
‭d.‬ ‭To display the data or information‬
‭What‬ ‭are‬‭common‬‭gender‬‭and‬‭disability‬‭issues‬‭faced‬‭while‬‭teaching/using‬‭computers‬
‭20‬ ‭‬
2
‭in classrooms?‬
‭Write a program to input two numbers and swap them.‬
‭21‬ ‭Or‬ ‭2‬
‭ rite a program to input a number and print its cube and also print original number.‬
W
‭Viruses‬ ‭and‬‭Phishing‬‭are‬‭examples‬‭of‬‭potential‬‭Internet‬‭security‬‭issues.‬‭Explain‬‭what‬
‭22‬ ‭2‬
‭is meant by each of these two terms.‬
‭a.‬ ‭What is the output produced when this code executes?‬
‭A = 0‬
‭for I in range (4, 8):‬
‭if I % 2 = = 0:‬
‭A = A + I‬
‭print (A)‬
‭b.‬ ‭How many times does the following code execute?‬
‭X = 1‬
‭23‬ ‭while ( X < = 5):‬ ‭1+1=2‬
‭X+1‬
‭print(X)‬
‭Or‬
‭ hat does each of the following expressions evaluates to? Suppose that L is the list‬
W
‭[“These”, [“are”, “a”], [“few”, “words”], “that”, “we”, “will”, “use”]‬
‭a.‬ ‭len( L )‬
‭b.‬ ‭L[3 : 4] + L[1 : 2]‬
‭Find the errors and correct it, rewrite the program after underlining the corrected code.‬
‭24‬ ‭2‬
‭Tup = eval(enter(“input a tuple”))‬
‭ n = length(Tup)‬
L
‭Num = Tup.Count(Tup[ 0 ])‬
‭if Num = Ln :‬
‭print(“Tuple contains all the same elements.”)‬
‭else :‬
‭print(“Tuple contains different elements.”)‬
‭Or‬
‭ rite‬ ‭a‬ ‭program‬ ‭to‬ ‭create‬ ‭a‬ ‭dictionary‬ ‭M‬ ‭which‬ ‭stores‬ ‭the‬ ‭marks‬ ‭of‬ ‭the‬‭students‬‭of‬
W
‭class‬ ‭with‬ ‭roll‬ ‭numbers‬ ‭as‬ ‭the‬ ‭keys‬ ‭and‬ ‭marks‬ ‭as‬ ‭the‬ ‭values.‬ ‭Get‬ ‭the‬ ‭number‬ ‭of‬
‭students as input.‬
‭Discuss two common tools for developing an algorithm.‬
‭25‬ ‭2‬
‭SECTION C‬
‭ hat‬ ‭will‬ ‭be‬ ‭the‬ ‭output‬ ‭displayed‬‭at‬‭Line3,‬‭Line‬‭5‬‭and‬‭Line‬‭7‬‭of‬‭following‬‭Python‬
W
‭code:‬
‭data = [2,5,6,2,7,5,2,9,11,18,2,4]‬
‭val = data.pop()‬
‭26‬ ‭print(val)‬ ‭# Line 3‬ ‭3‬
‭data.extend([100,200])‬
‭print(len(data))‬ ‭# Line 5‬
‭c = data.count(2)‬
‭print(c)‬ ‭# Line 7‬
‭Preeti‬ ‭celebrated‬‭her‬‭birthday‬‭with‬‭her‬‭family.‬‭She‬‭was‬‭excited‬‭to‬‭share‬‭the‬‭moments‬
‭with‬ ‭her‬ ‭friend‬ ‭Himanshu.‬ ‭She‬ ‭uploaded‬ ‭selected‬ ‭images‬ ‭of‬ ‭her‬ ‭birthday‬ ‭party‬ ‭on‬
‭social‬ ‭networking‬ ‭site‬ ‭so‬ ‭that‬ ‭Himanshu‬ ‭can‬ ‭see‬ ‭them.‬ ‭After‬ ‭few‬ ‭days,‬ ‭Preeti‬‭had‬‭a‬
‭fight‬ ‭with‬ ‭Himanshu.‬ ‭Next‬ ‭morning,‬ ‭she‬ ‭deleted‬ ‭her‬‭birthday‬‭photographs‬‭from‬‭that‬
‭social‬‭networking‬‭site,‬‭so‬‭that‬‭Himanshu‬‭cannot‬‭access‬‭them.‬‭Later‬‭in‬‭the‬‭evening,‬‭to‬
‭her‬ ‭surprise,‬ ‭she‬ ‭saw‬ ‭that‬ ‭one‬ ‭of‬‭the‬‭images‬‭which‬‭she‬‭had‬‭already‬‭deleted‬‭from‬‭the‬
‭social‬‭networking‬‭site‬‭was‬‭available‬‭with‬‭their‬‭common‬‭friend‬‭Gayatri.‬‭She‬‭hurriedly‬
‭27‬ ‭ *3=3‬
1
‭enquired‬ ‭Gayatri‬‭“Where‬‭did‬‭you‬‭get‬‭this‬‭picture‬‭from?”.‬‭Gayatri‬‭replied‬‭“Himanshu‬
‭forwarded this image few minutes back”.‬
‭Help‬ ‭Preeti‬ ‭to‬ ‭get‬ ‭answers‬ ‭for‬ ‭the‬ ‭following‬ ‭questions.‬ ‭Give‬ ‭justification‬ ‭for‬ ‭your‬
‭answers so that Preeti can understand it clearly.‬
‭a.‬ ‭How could Himanshu access an image which I had already deleted?‬
‭b.‬ ‭Can anybody else also access these deleted images?‬
‭c.‬ ‭Had these images not been deleted from my digital footprint?‬
‭Write code in python to print the following pattern using nested loop-‬
‭12345‬
‭1234‬
‭123‬
‭12‬
‭28‬ ‭1‬ ‭‬
3
‭Or‬
‭ rite‬‭code‬‭in‬‭python‬‭to‬‭input‬‭the‬‭value‬‭of‬‭x‬‭and‬‭n‬‭and‬‭print‬‭the‬‭sum‬‭of‬‭the‬‭following‬
W
‭series:‬
‭1 + x + x‬‭2‬ ‭+ x‬‭3‬ ‭+ x‬‭4‬ ‭+ x‬‭5‬ ‭+ ……………………… x‬‭n‬
‭Carefully go through the code given below and answer the questions based on it :‬
‭29‬ ‭1*3=3‬
‭in1Str = input("Enter string of Digits : ")‬
i‭n2Str = input("Enter string of Digits : ")‬
‭if len(in1Str) > len(in2Str):‬
‭small = in2Str‬
‭large = in1Str‬
‭else:‬
‭small = in1Str‬
‭large = in2Str‬
‭newStr = ''‬
‭for element in small:‬
‭result = int(element) + int(large[0])‬
‭newStr = newStr + str(result)‬
‭large = large[1:]‬
‭print(len(newStr)) # Line 1‬
‭print(newStr) # Line 2‬
‭print(large) # Line 3‬
‭print(small) # Line 4‬
‭a.‬ ‭Given a first input of 12345 and a second input of 246, what result is produced‬
‭by Line 1 ?‬
‭b.‬ ‭Given a first input of 123 and a second input of 4567, what result is produced‬
‭by Line 3 ?‬
‭c.‬ ‭Given a first input of 12345 and a second input of 246, what result is produced‬
‭by Line 2 ?‬
‭In‬ ‭a‬ ‭school‬ ‭fest,‬ ‭three‬ ‭randomly‬ ‭chosen‬ ‭students‬ ‭out‬ ‭of‬ ‭100‬ ‭students‬ ‭(having‬ ‭roll‬
‭30‬ ‭numbers‬‭1‬‭–‬‭100)‬‭have‬‭to‬‭present‬‭bouquets‬‭to‬‭the‬‭guests.‬‭Write‬‭program‬‭in‬‭python‬‭for‬ ‭3‬
‭school authorities to choose four students randomly.‬
‭SECTION D‬
‭Match the following :‬
‭Column A‬ ‭ olumn B‬
C
‭(i)‬ ‭Fakers,‬ ‭by‬ ‭offering‬ ‭special‬ ‭rewards‬ ‭or‬ ‭money‬ ‭prize‬
‭(a) Plagiarism‬ ‭asked‬ ‭for‬ ‭personal‬ ‭information,‬ ‭such‬ ‭as‬ ‭bank‬ ‭account‬
‭information.‬
‭(ii)‬‭Copy‬‭and‬‭paste‬‭information‬‭from‬‭the‬‭Internet‬‭into‬‭your‬
‭31‬ ‭(b) Hacking‬ ‭1*4=4‬
‭report and then organise it.‬
(‭ c‬ ‭)‬ ‭Credit‬ ‭card‬ ‭(iii)‬ ‭The‬ ‭trail‬ ‭that‬ ‭is‬ ‭created‬ ‭when‬ ‭a‬ ‭person‬ ‭uses‬ ‭the‬
‭fraud‬ ‭Internet.‬
‭(d)‬ ‭Digital‬ F‭ oot‬ ‭(iv)‬ ‭Breaking‬ ‭into‬ ‭computers‬ ‭to‬ ‭read‬ ‭private‬ ‭emails‬ ‭and‬
‭Print‬ ‭other files.‬

‭32‬ ‭Program to count the frequency of a given element in a list of numbers.‬ ‭4‬
‭SECTION E‬
‭ reate‬‭a‬‭dictionary‬‭with‬‭the‬‭roll‬‭number,‬‭name‬‭and‬‭marks‬‭of‬‭n‬‭students‬‭in‬‭a‬‭class‬‭and‬
C
‭33‬ ‭5‬
‭display the names of students who have marks above 75.‬
‭a.‬ ‭Draw logic circuit diagram for the following expression-‬
‭Y = ab +‬‭𝑏‬‭𝑐‬‭+‬‭𝑐‬‭𝑎‬
‭34‬ ‭b.‬ ‭State DeMorgan’s Law of Boolean Algebra and verify them using truth table.‬ ‭2+3=5‬
‭Or‬
‭a.‬ ‭Write the equivalent Boolean expression for the Logic Circuit.‬
‭b.‬ D
‭ o the following conversions to other number systems –‬
‭i.‬ ‭(76F)‬‭16‬ ‭= ( ? )‬‭10‬
‭ii.‬ ‭(11001010)‬‭2‬ ‭= ( ? )‬‭8‬
‭iii.‬ ‭(789)‬‭10‬ ‭= ( ? )‬‭16‬

‭a.‬ C ‭ an‬ ‭sequence‬ ‭operations‬ ‭such‬ ‭as‬ ‭slicing‬ ‭and‬ ‭concatenation‬ ‭be‬ ‭applied‬ ‭to‬
‭dictionaries? Why?‬
‭b.‬ ‭Difference between append( ) and extend( ) functions?‬ ‭ +2+2‬
1
‭c.‬ ‭Difference between list and tuple?‬ ‭ 5‬
=
‭Or‬
‭a.‬ ‭What is the output of the following code:‬
‭35‬ ‭s = 0‬
‭d1 = {“cat” : 12, “dog” : 6, “elephant” : 23, “bear” : 20}‬
‭for a in d1 :‬
‭if len(a) > 3 :‬
‭s = s + d1[ a ]‬ ‭1+4=5‬
‭print( s )‬
‭b.‬ ‭Discuss any four characteristics of python dictionary.‬

You might also like