Que Question Marks
s No
Section A
1 State True or False 1
“Indentation is not significant in Python.”
2 What is the output of bool(0) in Python? 1
(a)True (b)False (c) 0 (d)None
3. Arrange the following in decreasing order of capacity: 1
1024 GB, 512 MB, 2048 KB, 1 TB
4. Flowchart is the pictorial representation of ________ 1
(a)Flowgraph (b)Algorithm
(c) Statements (d)None of These
5. A message in your inbox from your bank with which you have an internet enabled 1
account asking to update your account with your personal information, login detail
etc. on pretext of up gradation of server of the bank. This is an example of -
(a) Spamming (b)Hacking (c)Cracking (d)Phishing
6. Choose the correct option for a program which appears safe and genuine but 1
actually it’s not -
(a) Spyware (b)Worm (c)Trojan (d)Adware
7. (3984.75)10= (?)16 1
(a)(F90.C)16 (b)(9F.4B)16
(c)(F90.4B)16 (d)(9F.C)16
8. What does IPR stand for? 1
(a)Internet Privacy Rights
(b)Intellectual Property Rights
(c)International Property Regulation
(d)Internal Patent Rights
9. Write output of the following code: 1
x=30
while (x>= 0):
if (x%2==0):
print (x, end=” ”)
else:
pass
x = x - 10
10. Which of the following is an example of system software? 1
(a) adobe reader software (b) web browser software
(c) antivirus software (d) Operating System
11. Which of the following Boolean expression always evaluates to False? 1
(a) A+A’ (b)A.A
(c) A+0 (d)None of These
12. What is the output of the following code? 1
str1 = "Mission 999"
str2 = "999"
print(str1.isdigit(),str2.isdigit())
(a)False True (b)False False
(c)True False (d)True True
13. Write the correct output of the following statements: 1
L1 = [2,4,6]
L2 = [3,5,7]
L1.append(L2)
print(L1)
14. A tuple is created as below: 1
T1 = (1,2,4,2,5,8,2,6,2)
What will be result when the following statements are executed?
T1.count(2) + T1.index(2)
15. Copyright, Patent and Trademark are: 1
(a) Communication Etiquettes
(b) Intellectual Property Right
(c) Social Media Etiquettes
(d) None of these
16. Which of the following is not a valid identifier? 1
(a) _Num (b) FALSE (c) num^2 (d) name_1
17. if 7: 1
print(“True”)
else:
print(“False”)
Assertion (A): Output of the above code is False
Reasoning (R): Non-empty and Non-Zero object is treated as True.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
18. Assertion(A): Cybercrime is an online crime that involves a computer and is 1
connected to Internet.
Reasoning(R): Firewall is a network security system that eliminates the possibility
of Cybercrime.
(a) Both A and R are true and R is the correct explanation for A
(b) Both A and R are true and R is not the correct explanation for A
(c) A is True but R is False
(d) A is false but R is True
Section B
19 Perform the following conversion: 2
(a) (10101011110)2 = ( ? )8
(b) (0.625)10 = ( ? )2
20. Find the output of the following: 2
l=[1,2,3]
l.insert(2,[4,5,6])
print(l[0])
print(l[1])
print(l[2][2])
print(l[3])
21. Draw logic circuit of following Boolean expressions: 2
Z=(A+B) (B’+C)
22. Write a program to create a dictionary to enter names of month of a leap year as 2
keys and the number of days in that month as values.
23. What is output of the following code: 2
x= 5
y= 5,
print(type(x))
print(type(y))
24. What is Plagiarism? Write two ways to avoid it. 2
OR
Write two social media etiquettes.
25. Predict the correct output of the following python code: 2
S = “My program is program for you”
T = S.split(“program”)
print(T)
OR
Write a program in Python to reverse a string.
Section C
26. Predict the correct output of the following python code: 3
s = “
[email protected]”
k=len(s)
m=””
for i in range(0,k):
if(s[i].isupper()):
m=m+s[i].lower()
elif s[i].isalpha():
m=m+s[i].upper()
else:
m=m+”#”
print(m)
27 Give any three practices to ensure confidentiality of information. 3
28. What are language processors? Write and explain any two language processors. 3
29. Evaluate the expression and identify the correct answer. 3
(a) 5*3//4+6//8+7-3+9//3+7
(b) 65 > 55 or not 8 < 5 and 0 != 55
(c) 10*1*2**4-4//4
30. Write output of the following Python code: 3
P=(1,6,9,3,8,3,1,7,3,9,1)
Q=(2,3,7,9,5,3,5,9)
R=[]
for i in P:
if i in Q and i not in R:
R.append(i)
print(R)
OR
Write a program in Python to create a tuple of integers by user input. Then create
a new list from the elements of first tuple which are divisible by two numbers X and
Y. The values of X and Y to be entered by user.
Section-D
31. (a) Correct and rewrite the following code underlining all the corrections. 4
10=x
For I in range(X)
If i =5
Continue
else:
pass
Print(i)
(b)Prediuct the output of the following code:
i=1
while i < 5:
if i == 3:
i += 1
continue
print(i)
i += 1
32 Karamveer a Python programmer is working on a mathematical project and tried 4
creating a code for it. Suggest him a module and function from that module which
can be used for the following tasks:
(a)Rounds a number up to the nearest integer.
(b)Returns the factorial of a number.
(c)Calculates the mode (central tendency) of the given numeric or nominal data.
(d)Returns a random element from the given sequence.
Section-E
33. Create a dictionary ‘ODD’ of odd numbers between 1 and 10, where the key is the 5
decimal number and the value is the corresponding number in words. Perform the
following operations on this dictionary using Python codes:
(a) Display the keys
(b) Display the values
(c) Display the items
(d) Check if 7 is present in the dictionary or not
(e) Retrieve the value corresponding to the key 9
34. (a)How does the range() function work in Python? 5
(b) Write a program in Python to create the following pattern.
*
**
***
****
*****
OR
(a)Explain the use of indentation in Python with an example.
(b) Write a program in Python to create the following pattern.
*****
***
*
35. A user receives an email that looks like it’s from their bank asking them to click a 5
link and update their account details. The user clicks on the link and enters
personal information.
(a)What is this type of cyber-attack called?
(b)what steps should the user take to protect themselves in the future?
OR
A person downloads software from an untrusted website, and it contains a virus
that compromises their computer’s security.
(a)What is the risk of downloading software from untrusted sources?
(b)what actions can the user take to safeguard their computer against such
threats?
---***---