0% found this document useful (0 votes)
149 views6 pages

Marking Scheme Apeejay - Annual - Examination Mock Test 2024

Uploaded by

kashvi5907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views6 pages

Marking Scheme Apeejay - Annual - Examination Mock Test 2024

Uploaded by

kashvi5907
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

APEEJAY COMMON ANNUAL EXAMINATION(MOCK TEST), 2023-24

COMPUTER SCIENCE
CLASS XI
MARKING SCHEME

Section A 18
Multiple Choice question Answers:
1. Which of the following can delete an element from a list if the index of the element is
given?
i. pop() ii. Remove iii. Clear iv. all of these
2. Which of the following is not an example of computer as a weapon cyber crime?
i. Credit card fraudulent
ii. Spying someone using keylogger
iii. IPR Violation
iv. Pronography
3. Amendment to IT Act 2000 came into effect on _______.
i. 2008 Oct. 2
ii. 2009 July 3
iii. 2008 June 1
iv. 2009 Oct. 27
4. Consider the following expression:
51+4-3**3//19-3
Which of the following will be the correct output if the expression is evaluated?
i. 50
ii. 51
iii. 52
iv. 53
5. Which of the following is the result of A + 1, if input is A=0?
a) Always 0
b) Always 1
c) Vary from 0 or 1
d) None of these
6. If a list is created as
>>>l=[1,2,3,‟a‟,[“apple‟,‟green‟],5,6,7,[“red‟,‟orange‟]] then what will be the output of the
following statements:
>>>l[4][1]
i i. “apple‟ ii. “green‟ iii. “red‟ iv. “orange‟
7. Which of the following function will return the first occurrence of the specified
element in a list.
i i. sort() ii. value() iii. index() iv. sorted()
8. Which of the following is correct to insert a single element in a tuple .
i. T=4 ii. T=(4) iii. T(4,) iv. T=[4,]
9. Which function will return key-value pairs of the dictionary
i. key( ) ii. values( ) iii. items( ) iv. get( )
10. What will be the output of the following code:
>>>l=[1,2,3,4]
>>>m=l*2
>>>n=m*2
>>>print(n)
i [1,2,3,4,1,2,3,4,1,2,3,4] ii. [1,2,3,4,1,2,3,4,1,2,3,4,1,2,3,4]
iii. [1,2,3,4][4,5,6,7] iv. [1,2,3,4,1,2,3,4]
11. Which among the following refers to the act of copying copyrighted material?
a. Hacking b. Cracking c. Piracy d. Phishing
12. Which of the following will delete key-value pair for key=‟red‟ form adictionary D1
i. Delete D1(“red”) ii. del. D1(“red”) iii. del D1[“red”] iv. del D1
13. What will be the output
>>>d1={“ramit‟:56,”Rajiv”:99}
>>>print(“Ramit” in d1)
i. True ii. False iii. No output iv. Error
14. What is the output of the following Python Code; Select any one of the following
options? import random
print(int(random.random()*5)
a)Always generate 0
b) Generate any number between 0 to 4(including both)
c) Generate any number between 0 to 5(including both)
15. The command to merge the dictionary Book with Library the command would be:
a) d=Book+Library b) print(Book+Library)
c)Book.update(Library) d)Library.update(Book)
16. What
2 is Spyware?
Answer:
Spyware is malicious software that enters a user's computer, gathers data from the
device and user, and sends it to third parties without their consent.

17. What is the need for secure passwords?


Answer:
Strong passwords are of the utmost importance. They protect your electronic
accounts and devices from unauthorized access, keeping your sensitive personal
information safe. The more complex the password, the more protected your
information will be from cyber threats and hackers.
18. How is Firewall different from an Antivirus?
Answer
A firewall is a security network designed to protect computer systems and networks
from malicious attacks. Whereas, Antivirus is is a software utility program designed to
protect a system from internal attacks from viruses.
Section- B
19. What measure should one take to avoid and maintain confidentiality of personal 2
information?
Answer:
i. Never open suspicious text or e-mails
ii. Never use same password for every account and don’t share it with anyone
iii. Avoid using public computers or Wi Fi hotspot
Be careful about sharing information on social networking sites
20. What do you mean by Cyber Bullying and Cyber Stalking 2
Cyber Bullying- is a form of bullying or harassment using electronic means also
known as online bullying. It has become increasingly common, especially among
teenagers. Cyberbullying is when someone, typically teens, bully or harass others on
social media sites
Cyberstalking- is a crime in which the attacker harasses a victim using electronic
communication, such as e-mail or instant messaging (IM), or messages posted to a
Web site or a discussion group.
21. What is a digital footprint and why is it important? 2
Answer:
A digital footprint is a word used to describe the trail and traces that people leave
behind online, on social media, websites or chats. A digital footprint is your online
identity and individuality and is what makes you unique. It is builds the online
reputation, or impression depending on the things you do online.
22. Convert (17.35)10 to binary form. 2
Answer
Convert the Decimal number 345 into Octal number.
23. Simplify: P’+Q’R=P’Q’R’+P’Q.R’+P’QR+P’Q’R+PQ’R 2
Taking R.H.S:
P’Q’(R+R’)+P’QR+ P’QR’+ PQ’R
P’Q’+P’Q(R+R’)+PQ’R
P’Q’+P’Q+PQ’R
P’(Q+Q’)+PQ’R
P’+PQ’R (Distributive Property)
(P’+P).(P’+Q’R)= P’+Q’R = L.H.S
24. What will be the output of the following Python code? [A] 2
tr="Python123.com"
for i in range(len(str)):
if(str[i].isalpha()):
print(str[i-1],end='')
if(str[i].isdigit()):
print(str[i],end='')
25. Why are privacy settings of a social networking site so important? 2
Answer
Privacy settings of a social networking site are important due to the following reasons:
1) it keeps in check what type of data you share with people outside your privacy or
'friend list'. This helps in keeping in check over that your personal moments are not
shared with someone, with whom you don't want to share it.
2) it also is important to keep an eye on the data sharing with the host site or with
someone who is not authorised to share that data. This will help you secure your
personal data from hackers.

Section- C
26. a. How is pharming similar to and different from phishing? 3
b. What are list slices? Explain with its parameters. Does a slice operator always produce a
new list?
Answer:

Phishing and pharming are two different ways hackers attempt to manipulate users via the
Internet. Phishing involves getting a user to enter personal information via a fake website.
Pharming involves modifying DNS entries, which causes users to be directed to the wrong
website when they visit a certain Web address.

Answer:
Python slicing is about obtaining a sub-string from the given string by slicing it respectively
from start to end.
Syntax:
 slice(stop)
 slice(start, stop, step)
Return Type: Returns a sliced object containing elements in the given range only.
27. a. State De Morgan’s Law algebraically 3
b. Write the Boolean expression for the logic circuit shown below

F= A’.B + A.B’

28. If we have list L and tuple T, 3


T[i]=element and L[i]=element , then which statement is valid & why?
Answer:The key difference is that tuples are immutable . This means that you
cannot change the values in a tuple once you have created it. As a list is mutable
, it can't be used as a key in a dictionary, whereas a tuple can be used. ... Lists
are for variable length , tuples are for fixed length
29. .Name the function: 3
i.To check whether string contains digit
ii.To delete an element from the end of list.
Answer: i) isdigit ii) pop()
30. a.Find the output of the following program: 3
Moves=[11, 22, 33, 44]
Queen=Moves
Moves[2]+=22
L=len(Moves) for i in
range (L):
print("Now@",Queen[L-i-1],"#", Moves[i])

b.What would be the output of the following code, if the input is: i)aaccbb ii)abccb
Answer:
s=input("Enter a string")
count=3
while True:
if s[0]=="a":
s=s[2:]
elif s[-1]=="b":
s=s[:2]
else:
count+=1
break
print(s)
print(count)
Answer i) bbcc
4
ii)cc
4

Section D
31. Examine
3 the code: 4
tuple1 = (11, 22, 33, 44, 55 ,66)
list1 =list(tuple1)
new_list = []
for i in list1:
if i%2==0:
new_list.append(i)
new_tuple = tuple(new_list)
print(new_tuple)
i. What is the program calculating?
ii.Can we change append with extend? Justify your answer with explanation
Answer:
i. {‘m’:2,‘a’:1, ‘u’:1, ‘l’:1, ‘t’:1, ‘e’:1, ‘i’ :2, ‘o’:1}

{‘m’, ‘u’, ‘l’, ‘t’, ‘i’, ‘e’, ‘d’, ‘a’}


append adds its argument as a single element to the end of a list. The length of
the list itself will increase by one. extend iterates over its argument adding each
element to the list, extending the list
32. a. Write a program to input n numbers and to insert any number in a particular 4
position
b. What would be the output of the following code:
list1 = ["python", "list", 1952, 2323, 432]
list2 = ["this", "is", "another", "list"]
print(list1[1:4])
print(list1[1:])
print(list1[0])
print(list1 * 2)
print(list1 + list2)

Answer:
Solution:
n=input(“Enter no. of values")
num=[]
for i in range (n):
number=input(“Enter the number") num.append(number)
newno = input(“Enter the number to be inserted”)
pos = input(“Enter position”) num.insert(newno,pos)
print (num)

Answer:
Answer
['list', 1952, 2323]
['list', 1952, 2323, 432]
python
['python', 'list', 1952, 2323, 432, 'python', 'list', 1952, 2323, 432]
['python', 'list', 1952, 2323, 432, 'this', 'is', 'another', 'list']
Section E
33. a. Write a program that prompts the user for a string s and a character c, and
outputs the string produced from s by capitalizing each occurrence of the 5
character c in s and making all other characters lowercase.
For example, if the user inputs "Mississippi" and "s", the program outputs
"miSSiSSippi".
b. What is (i) Authentication, (ii) Authorization? Why are these two used together?
Answer:
s = input ("Enter the word :- ")
c = input ("Enter the character :- ")
str = ""
for i in range (len (s)) :
if s[ i ] == c :
str += s[ i ].upper()
else :
str += s[ i ]
print (str)

Answer:
Authorization:- Asking the user a legal login-id performs authorization. If the user is
able to provide a legal login-id, he/she is considered an authorized user.

Authentication:- Authentication is also termed as password-protection as the


authorized user is asked to provide a valid password, and if he/she is able to do this,
he/she is considered to be an authentic user.
34. Marks of three students “Arya”, “Romil”, “RItesh” in three subjects are available in 5
following three dictionaries respectively:
d1={1:40,2:70,3:60}
d2={1:50,2:80,3:80}
d3={1:70,2:90,3:70}
Create a nested dictionary that stores the marks details along with student
names and then prints the output as shown below:
Name: Arya
Subject(Key) Marks(Value)1
40
2 70
3 60
Name: Romil
Subject(Key) Marks(Value)1
50
2 80
3 80
Name: Ritesh
Subject(Key) Marks(Value)
1 70
2 90
3 70
35. a. . Define these terms: Phishing and Identity Theft 5
b. Write a program that prints the sum of the even-indexed elements of L, minus the sum
of the odd-indexed elements of L.
For example:For list[1, 2, 3, 4, 5, 6] it should print -3 (that is, (1 + 3 + 5) - (2 + 4 + 6))
For list([1, 2, 3]) it should print 2 (that is, 1 - 2 + 3)
Answer:
Phishing: - Phishing is the practice of attempting to acquire sensitive information from
individuals over the internet, by means of deception.
Identity Theft: - Online identity theft is the theft of personal information in order to
commit fraud.
Answer:
L = eval (input("Enter the number list :- "))
even = odd = 0
for i in range (len(L)) :
if i % 2 == 0 :
even += L[ i ]
else :
odd += L[ i ]
print ("(sum of even-indexed elements) - (sum of odd-indexed elements) :-", even -
odd)

You might also like