0% found this document useful (0 votes)
27 views5 pages

XI CS Sample Paper 2025

The document consists of a series of questions divided into sections A, B, C, D, and E, covering topics related to Python programming, cybersecurity, and data structures. Each question has a specific mark allocation and tests knowledge on various concepts such as Boolean expressions, flowcharts, and coding outputs. The questions range from true/false statements to programming tasks and theoretical explanations.

Uploaded by

nehakvrmt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views5 pages

XI CS Sample Paper 2025

The document consists of a series of questions divided into sections A, B, C, D, and E, covering topics related to Python programming, cybersecurity, and data structures. Each question has a specific mark allocation and tests knowledge on various concepts such as Boolean expressions, flowcharts, and coding outputs. The questions range from true/false statements to programming tasks and theoretical explanations.

Uploaded by

nehakvrmt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Que Question Marks

s No
Section A
1 State True or False 1
“Indentation is not significant in Python.”

2 What is the output of bool(0) in Python? 1


(a)True (b)False (c) 0 (d)None
3. Arrange the following in decreasing order of capacity: 1
1024 GB, 512 MB, 2048 KB, 1 TB

4. Flowchart is the pictorial representation of ________ 1


(a)Flowgraph (b)Algorithm
(c) Statements (d)None of These
5. A message in your inbox from your bank with which you have an internet enabled 1
account asking to update your account with your personal information, login detail
etc. on pretext of up gradation of server of the bank. This is an example of -
(a) Spamming (b)Hacking (c)Cracking (d)Phishing
6. Choose the correct option for a program which appears safe and genuine but 1
actually it’s not -
(a) Spyware (b)Worm (c)Trojan (d)Adware
7. (3984.75)10= (?)16 1
(a)(F90.C)16 (b)(9F.4B)16
(c)(F90.4B)16 (d)(9F.C)16

8. What does IPR stand for? 1


(a)Internet Privacy Rights
(b)Intellectual Property Rights
(c)International Property Regulation
(d)Internal Patent Rights
9. Write output of the following code: 1
x=30
while (x>= 0):
if (x%2==0):
print (x, end=” ”)
else:
pass
x = x - 10
10. Which of the following is an example of system software? 1
(a) adobe reader software (b) web browser software
(c) antivirus software (d) Operating System

11. Which of the following Boolean expression always evaluates to False? 1


(a) A+A’ (b)A.A
(c) A+0 (d)None of These
12. What is the output of the following code? 1
str1 = "Mission 999"
str2 = "999"
print(str1.isdigit(),str2.isdigit())
(a)False True (b)False False
(c)True False (d)True True
13. Write the correct output of the following statements: 1
L1 = [2,4,6]
L2 = [3,5,7]
L1.append(L2)
print(L1)

14. A tuple is created as below: 1


T1 = (1,2,4,2,5,8,2,6,2)
What will be result when the following statements are executed?
T1.count(2) + T1.index(2)

15. Copyright, Patent and Trademark are: 1


(a) Communication Etiquettes
(b) Intellectual Property Right
(c) Social Media Etiquettes
(d) None of these

16. Which of the following is not a valid identifier? 1


(a) _Num (b) FALSE (c) num^2 (d) name_1

17. if 7: 1
print(“True”)
else:
print(“False”)
Assertion (A): Output of the above code is False
Reasoning (R): Non-empty and Non-Zero object is treated as True.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True

18. Assertion(A): Cybercrime is an online crime that involves a computer and is 1


connected to Internet.
Reasoning(R): Firewall is a network security system that eliminates the possibility
of Cybercrime.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True

Section B
19 Perform the following conversion: 2
(a) (10101011110)2 = ( ? )8
(b) (0.625)10 = ( ? )2

20. Find the output of the following: 2


l=[1,2,3]
l.insert(2,[4,5,6])
print(l[0])
print(l[1])
print(l[2][2])
print(l[3])
21. Draw logic circuit of following Boolean expressions: 2
Z=(A+B) (B’+C)
22. Write a program to create a dictionary to enter names of month of a leap year as 2
keys and the number of days in that month as values.

23. What is output of the following code: 2


x= 5
y= 5,
print(type(x))
print(type(y))
24. What is Plagiarism? Write two ways to avoid it. 2
OR
Write two social media etiquettes.
25. Predict the correct output of the following python code: 2
S = “My program is program for you”
T = S.split(“program”)
print(T)
OR
Write a program in Python to reverse a string.
Section C
26. Predict the correct output of the following python code: 3
s = “[email protected]
k=len(s)
m=””
for i in range(0,k):
if(s[i].isupper()):
m=m+s[i].lower()
elif s[i].isalpha():
m=m+s[i].upper()
else:
m=m+”#”
print(m)

27 Give any three practices to ensure confidentiality of information. 3


28. What are language processors? Write and explain any two language processors. 3
29. Evaluate the expression and identify the correct answer. 3
(a) 5*3//4+6//8+7-3+9//3+7
(b) 65 > 55 or not 8 < 5 and 0 != 55
(c) 10*1*2**4-4//4

30. Write output of the following Python code: 3


P=(1,6,9,3,8,3,1,7,3,9,1)
Q=(2,3,7,9,5,3,5,9)
R=[]
for i in P:
if i in Q and i not in R:
R.append(i)
print(R)
OR

Write a program in Python to create a tuple of integers by user input. Then create
a new list from the elements of first tuple which are divisible by two numbers X and
Y. The values of X and Y to be entered by user.

Section-D
31. (a) Correct and rewrite the following code underlining all the corrections. 4
10=x
For I in range(X)
If i =5
Continue
else:
pass
Print(i)
(b)Prediuct the output of the following code:
i=1
while i < 5:
if i == 3:
i += 1
continue
print(i)
i += 1
32 Karamveer a Python programmer is working on a mathematical project and tried 4
creating a code for it. Suggest him a module and function from that module which
can be used for the following tasks:
(a)Rounds a number up to the nearest integer.
(b)Returns the factorial of a number.
(c)Calculates the mode (central tendency) of the given numeric or nominal data.
(d)Returns a random element from the given sequence.
Section-E
33. Create a dictionary ‘ODD’ of odd numbers between 1 and 10, where the key is the 5
decimal number and the value is the corresponding number in words. Perform the
following operations on this dictionary using Python codes:
(a) Display the keys
(b) Display the values
(c) Display the items
(d) Check if 7 is present in the dictionary or not
(e) Retrieve the value corresponding to the key 9

34. (a)How does the range() function work in Python? 5


(b) Write a program in Python to create the following pattern.
*
**
***
****
*****
OR

(a)Explain the use of indentation in Python with an example.


(b) Write a program in Python to create the following pattern.
*****
***
*

35. A user receives an email that looks like it’s from their bank asking them to click a 5
link and update their account details. The user clicks on the link and enters
personal information.
(a)What is this type of cyber-attack called?
(b)what steps should the user take to protect themselves in the future?
OR
A person downloads software from an untrusted website, and it contains a virus
that compromises their computer’s security.
(a)What is the risk of downloading software from untrusted sources?
(b)what actions can the user take to safeguard their computer against such
threats?

---***---

You might also like