Class 11 Computer Science Sample Paper Term 2 Set-3

Time: 2 hours Maximum Marks: 35

General Instructions

  • The question paper is divided into 3 sections – A, B and C
  • Section A, consists of 7 questions (1-7). Each question carries 2 marks.
  • Section B, consists of 3 questions (8-10). Each question carries 3 marks.
  • Section C, consists of 3 questions (11-13). Each question carries 4 marks.
  • Internal choices have been given for question numbers 7, 8 and 12.

 

Section -A

Each question carries 2 marks

1. What is meant by Intellectual Property?

 

2. (i) What is IT ACT 2000.

(ii) Amit has downloaded a suspicious JPEG picture from internet. After opening the file, his computer started malfunctioning. Out of the following, which is the type of infection is this?
Adware, Virus, Ransomware, Phishing

 

3. Differentiate between append () and extend() function with respect to Lists.

 

4. A dictionary has been created having few key:value pairs. Which function will be used to accomplish the following tasks?

i) To get only the keys from the dictionary.

ii) To return the list with all dictionary keys with values.

 

5. What will be the output after the following Python statements are executed?

(i) x = [5, 4, 3, 2, 1]
print(x.pop(3))

 

(ii) x = [5, 4, 3, 2]
x.remove(2)
print(x)

(iii) x = [25, 35, 53, 25, 52, 35, 25]
del x[3]
print(x)

(iv) x = [5, 4, 3, 2, 1]
print(x.index(1))

 

6. (i) Which function of random module is used to generate a random float number between 0 and 1.

(ii) Name the module that contains the function to calculate median of a given data set.

7. Define the term Digital Footprints?

Or

In respect of Cyber Crimes, what is meant by the term ‘Phishing’ and what measures can help us in tackling the issue?

SECTION – B

Each question carries 3 marks

8. Manisha wants you to write a program for her in Python using Dictionary that stores integers from 1 to 10 as keys and have the square of those integers as values. Help her by writing correct program.

Or

Write a program in Python that accepts a tuple containing integers and prints the maximum element in the tuple.

 

9. (i) Which of the following functions belong to Dictionary data type only?
index(), values(), max(), fromkeys(), items()

(ii) Which of the following functions can not be used with Tuple data type in Python?
remove(), len(), index(), append(), sorted(), sort(), pop()

 

10. What are open source software? Describe broadly used open source license.

Section C

(Each question carries 4 marks)

11. Create a dictionary whose keys are month names and whose values are the number of days in the corresponding months

i) Ask the user to enter a month name and use the dictionary to tell them how many days are in the month

ii) Print out all the keys in alphabetical order

iii) Print out all of the months with 31 days

iv)Print out the (key-value) pairs sorted by the number of days in each month

 

12. (i) Define the following terms: Trojans, Adware

Or

What are the challenges that need to be addressed while dealing with disability issues while teaching and using computers?

(ii) Explain the term ‘E-waste’ and what are the benefits of e-waste recycling?

 

13. Write a program in Python that asks the user to enter a list of strings and creates a new list that consists of those strings with their first characters removed.

 

 

1. Intellectual Property – it refers to the inventions, literacy and artistic expressions, designs and symbols, names and logos.

 

2. (i) The Information Technology Act,2000 (also known as ITA-2000 or the IT Act) is an Act of the Indian Parliament ( No.21 of 2000 ) notified on 17 October ,2000 . It is the primary law in India dealing with Cybercrime and electronic commerce.

 2. (ii) Virus

 

3. Python append() method adds an element to a list, and the extend() method concatenates the first list with another list (or another iterable).

When append() method adds its argument as a single element to the end of a list, the length of the list itself will increase by one.

Whereas extend() method iterates over its argument adding each element to the list, extending the list. The length of the list will increase by however many elements were in the iterable argument.

 

4. (i) keys()

4. (ii) items()

 

5. (i) 2

5. (ii) [5, 4, 3]

5. (iii) [25, 35, 53, 52, 35, 25]

 5. (iv) 4

 

6. (i) random()

 6. (ii) statistics

 

7. Digital Footprints — A digital footprint is data that is left behind when users have been online.

There are two types of digital footprints which are passive and active. A passive footprint is made when information is collected from the user without the person knowing this is happening. An active digital footprint is where the user has deliberately shared information about themselves either by using social media sites or by using websites.

OR

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss.

(i)Never enter personal information or any financial information (banking information or credit/debit card information) on unsecure websites, i.e., the sites that do not employ HTTPS and do not have padlock sign.

(ii) Never reply to emails from any unknown or unreliable source.

(iii) Never click on any links that you have received in your email. Rather open a browser window and type the URL yourself than clicking on the link in the email.

(iv) Never respond to an e-mail or advertisement claiming you have won something.

 

SECTION – B

8.

d={}

for i in range(1,11):

d[i]=i*i;

print(d)

 

OR

t=eval(input(“Enter integer elements : “))

max=t[0]

for i in range(1,len(t)):

if t[i]>max:

max=t[i]

print(“Maximum element is : “,max)

 

9. (i) values(), fromkeys(), items()

 (ii) remove(), append(), sort(), pop()

 

10. Open source software – Open-source software is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software and its source code to anyone and for any purpose. Open-source software may be developed in a collaborative public manner.

Open source license –

Creative Commons, GPL and Apache

 

Section C

11.

(i) daysInMonths = {“january “ :31, “February” : 28, “March “: 31, “April “:30, “May “: 31, “June “: 30, “July “ : 31, “August “ : 31, “September “ : 30, “October “ : 30, “November “ :30, “December “:31}

month = input(“Enter the month : “)

while month not in daysInMonths :

print(“Please Enter valid month : “)

month = input(“Enter the month : “)

print( The number of days in “, month, “are “, daysInMonths[month])

 

11.(ii) for i in sorted(daysInMonths.key()):

print(i)

 

11.(iii) for i in daysInMonths:

if daysInMonths[i]==31

print(i)

 

11.(iv) for i in sorted(daysInMonths, key= daysInMonths.get):

print(i, daysInMonths[i])

 

12 (i) Define the following terms:

Trojans -A Trojan, or Trojan horse, is a type of malware that conceals its true content to fool a user into thinking it’s a harmless file. Like the wooden horse used to sack Troy, the “payload” carried by a Trojan is unknown to the user, but it can act as a delivery vehicle for a variety of threats.

Adware -Adware is software that displays unwanted (and sometimes irritating) pop-up adverts which can appear on your computer or mobile device. Some forms of adware are highly manipulative and create an open door for malicious programs.

OR

(1) Unavailability of Teaching Materials/Aids

(2) Lack of special teachers

(3) Lack of supporting curriculum.

 

12. (ii) E-waste i.e. electronic waste refers to discarded electrical or electronic devices such as discarded computers, mobile phones, television sets and refrigerators etc.

Benefits of e-waste recycling

(1) Allows for recovery of valuable precious metals. – electronic equipment contain precious metals like platinum, gold , zinc etc. which can be recycled.

(2) Protects Public health and water quality – e-waste contains toxic substances, such as mercury, lead etc. Improper disposal releases these harmful toxins in environment – therefore proper disposal of e-waste ensures public health and environment safety.

(3) Creates Jobs – Recycling e-waste domestically creates jobs for professional recyclers.

(4) Saves landfill space – e-waste is a growing waste stream. Recycling these items will help conserve landfill space.

 

13. l1 = eval(input(“Enter a list of strings: “))

l2 = []

for i in range(len(l1)):

l2.append(l1[i][1:])

print(“List after removing first characters:”)

print(l2)

 

Copywrite © 2020-2024, CBSE Python,
All Rights Reserved
error: Content is protected !!