Class 11 Computer Science Sample Paper MCQ based Term 2 Set-2

Class: XI 

Computer Science

Maximum Marks: 35 Time Allowed: 90 Minutes

General Instructions:

The question paper is divided into 3 Sections – A, B, and C.

♦ Section A consists of 25 Questions (1-20). Attempt any 15 questions.

♦ Section B consists of 24 Questions (21-40). Attempt any 15 questions.

♦ Section C consists of 6 case study based Questions (41-46). Attempt any 5 questions.

♦ All questions carry equal marks

 

SECTION –A

This section consists of 20 questions(1 to 20).

Attempt any 15 questions from this section. Choose the best possible option.

1. Which of the following is a valid declaration of a list ?

list1 = [23, 45, 11, ’a’ ,’t’ ]

a) list1 = {23, 45, 11, ’a’ ,’t’ }

b) list1 = (23, 45, 11, ’a’ ,’t’ )

c) list1 = [23, 45, 11, a ,t ]

 

2. Which of the following modules is used for sqrt() function in python ?

a) random

b) math

c) string

d) none of these

 

3. Suppose t = (1, 2, 4, 3), which of the following is incorrect?

a) print(t[3])

b) t[3] = 45

c) print(max(t))

d) print(len(t))

 

4. Read the code shown below carefully and pick out the keys?

d = {“john”:40, “peter”:45}

a) “john”, 40, 45, and “peter”

b) “john” and “peter”

c) 40 and 45

d) d = (40:”john”, 45:”peter”)

 

5. Suppose d = {“john”:40, “peter”:45}, to delete the entry for “john” what command do we use

a) d.delete(“john”:40)

b) d.delete(“john”)

c) del d[“john”].

d) del d(“john”:40)

 

6. What data type is the object below ?

L = [1, 23, ‘hello’, 1]

a) list

b) dictionary

c) array

d) tuple

 

7. To add a new element to a list we use which command ?

a) list1.add(5)

b) list1.append(5)

c) list1.addLast(5)

d) list1.addEnd(5)

 

8. Rohan said some abusive words for Shyam in the class. This a type of cyber bullying.

a) True

b) False

 

9. What can happen when you give your personal data (email, address, photos you post…) in exchange for free apps and services?

a) Nothing can happen. Your data is not allowed to be passed on to anyone

b) It isn’t really used, it’s just compulsory to ask for that information

c) When giving your email you’re automatically entered in a lottery where you can win something

d) Everything you do online is of value and is used by companies looking to target their advertising

 

10. What is the name of the IT Law that India is having in the Indian legislature ?

a) India’s Technology (IT) Act, 2000

b) India’s Digital Information Technology (DIT) Act, 2000

c) India’s Information Technology (IT) Act, 2000

d) The Technology Act, 2008

 

11. Assertion (A): The digital footprint is created automatically when you work on internet and providing data in any form.

Reason (R) : The active digital footprint is created unintentionally without the user’s consents.

Choose the correct answer:

a) Both A and R are true and R is correct explanation of A

b) Both A and R are true and R is not correct explanation of A

c) A is true but R is false.

d) A is false but R is True

 

12. Which of the following is a better way to dispose off the e-waste ?

a) Donating Your Outdated Technology

b) Sell Off Your Outdated Technology

c) Give Your Electronic Waste to a Certified E-Waste Recycler

d) All of these

 

13. Given a list L1 = [3,4,5,25,22,[2,1,3],55]

What will be the output of the following statement:

L2[: : -2]

a) [55,22,5,3]

b) [3,5,22,55]

c) [4,25,55]

d) None of these

 

14. Any information created by us that exists in digital form is

a) digital footprint

b) internet footprint

c) cyber footprint

d) web footprint

 

15.Using someone’s twitter handle to post something will be termed as

a) fraud

b) online stealing

c) identity theft

d) phishing

 

16. Which one of the following is the default extension of python file ?

a) .exe

b) .py

c) .doc

d) .p

 

17.You can repeat the elements of the tuple using which operator ?

a) **

b) +

c) *

d) //

 

18. Which of the following is not a cyber crime ?

a) Installing antivirus software in your system

b) Hacking of personal information from someone’s account

c) Identity theft

d) online scam

 

19. Keys in a dictionary are mutable.

a) True

b) False

 

20. How can you access the elements of a dictionary ?

a) By using keys

b) By using index

c) Both a and b

d) By using positional value

 

SECTION –B

This section consists of 20 questions(21 to 40).

Attempt any 15 questions from this section. Choose the best possible option.

 

21. Sonia found that her picture posted in a social networking site has been merged with an unknown person and published. What should she do ?

a) Ignore the instance

b) Report it to the cyber cell

c) Try to delete the post

d) Enjoy the instance

 

22. Feasible method to manage e-waste is/ are

a) Reducing

b) Reusing

c) Recycling

d) All of these

 

23. Which of the following is not a protection against malwares ?

a) Antivirus

b) AVG

c) Visiting authentic sites

d) Removing unused files

 

24. Online posting of rumours, giving threats online, posting the victim’s personal information, comments aimed to publicly ridicule a victim is termed as___________

a) Hacking

b) Cyber bullying

c) Cracking

d) Phishing

 

25 .What is the output of following code :

L = [ 5, 8]

print (L * 3)

a) Syntax error

b) [5,8,5,8,5,8]

c) [15,24]

d) [8,11]

 

26. Which of the following is not a function of dictionary :

a) items()

b) values()

c) keys()

d) index()

 

27. Which keyword is used to import a module in a program ?

a) imp

b) import

c) def

d) all of these

 

28. In order to store values in terms of key and value we use what core data type

a) list

b) tuple

c) class

d) dictionary

 

29. Which 

(A) d.delete(“john”:40)

 (B) d.delete(“john”)

(C) del d[“john”]

(D) del d(“john”:40)

 

30. Which of the following is correct with respect to above Python code? d = {“a”:3 ,”b”: 7}

print(list(d.keys()))

a) a dictionary d is created.

b) a and b are the keys of dictionary d.

c) 3 and 7 are the values of dictionary d

d) All of the above.

 

31. Which one of the following is correct?

a) In python, a dictionary can have two same keys with different values.

b) In python, a dictionary can have two same values with different keys

c) In python, a dictionary can have two same keys or same values but cannot have two same key-value pair

d) In python, a dictionary can neither have two same keys nor two same values.

 

32 .Which of the following will give error?

Suppose dict1={“a”:1,”b”:2,”c”:3}

a) print(len(dict1))

b) print(dict1.get(“b”))

c) dict1[“a”]=5

d) None of these.

 

33. Keys of the dictionary must be :

a) Similar

b) Unique

c) Can be similar or unique

d) All of these

 

34. What will be the output of the following Python code?

a={1:”A”,2:”B”,3:”C”}

a.clear()

print(a)

a) None

b) { None:None, None:None, None:None}

c) {1:None, 2:None, 3:None}

d) { }

 

35. The ______________ keyword is used to import other modules into a Python script.

a) find

b) None

c) import

d) import as

 

36. Which of the following python built-in module you can use for mathematical tasks. 

a) math

b) import

c) statistics

d) random

 

37. Which of the following is not a math module function?

a) tan(x)

b) sin(x)

c) cos(x)

d) mean(x)

 

38. Assertion(A): Dictionaries are enclosed by curly braces { }

Reason(R): The key-value pairs are separated by commas ( , )

a) Both A and R are true and R is the correct explanation of A.

b) Both A and R are true but R is not the correct explanation of A.

c) A is true but R is false.

d) A is false but R is true

 

39. Assertion(A): The pop() method can be used to delete elements from a dictionary.

Reason(R): The pop() method deletes the key-value pair and returns the value of deleted element

a) Both A and R are true and R is the correct explanation of A.

b) Both A and R are true but R is not the correct explanation of A.

c) A is true but R is false.

d) A is false but R is true.

 

40. Assertion(A): clear() method removes all elements from the dictionary

Reason(R): len() function cannot be used to find the length of a dictionary.

a) Both A and R are true and R is the correct explanation of A.

b) Both A and R are true but R is not the correct explanation of A.

c) A is true but R is false.

d) A is false but R is true.

 

SECTION –C

Case Study Based Questions

This section consists of 06 questions(41 to 46).

Attempt any 5 questions from this section. Choose the best possible option.

Suppose a list is given as

Example = [‘h’,’e’,’l’,’l’,’o’]

Answer the questions based on the list

 

41. what is len(list Example)?

a) 5

b) 4

c) None

d) Error

 

42. What is Example[-1] ?

a) Error

b) None

c) ‘o’

d) ‘h’

 

43. Which function can be used to add one more element at the end of the list ?

a) append()

b) insert()

c) add()

d) insertinto()

 

44. What will be the output for the following:

Example[2: : 2]

a) [‘h’,’e’,’l’,’l’,’o’]

b) [’e’,’l’,’l’,’o’]

c) [’l’,’l’,’o’]

d) [’l’, ’o’]

 

45. Which function will delete all the elements of the list ?

a) del

b) drop()

c) clear()

d) remove()

 

46. What will be the output for the following code:

print(Example+”2”)

a) [‘h’,’e’,’l’,’l’,’o’,’2’]

b) [‘h’,’e’,’l’,’l’,’o’,2]

c) [‘h’,’e’,’l’,’l’,’o’‘h’,’e’,’l’,’l’,’o’]

d) None of these

 

By cbsepython

A complete solution for the students of class 9 to 12 having subject Information Technology (402), Computer Science (083). Explore our website for all the useful content as Topic wise notes, Solved QNA, MCQs, Projects and Quiz related to the latest syllabus.

Copywrite © 2020-2024, CBSE Python,
All Rights Reserved