Students can access the CBSE Sample Papers for Class 11 Computer Science with Solutions and marking scheme Term 2 Set 1 will help students in understanding the difficulty level of the exam.

## CBSE Sample Papers for Class 11 Computer Science Term 2 Set 1 with Solutions

Time: 2 Hours
Maximum Marks: 35

General Instructions:

• The question paper is divided into 3 sections -A, B and C
• Section A, consists of 7 questions (1-7). Each question carries 2 marks.
• Section B, consists of 3 questions (8-10). Each question carries 3 marks.
• Section C, consists of 3 questions (11-13). Each question carries 4 marks.
• Internal choices have been given for question numbers 7, 8 and 12.

Section – A [2 marks each]

Question 1.
Find the output of the following questions based on list value = [45, 32, 98, – 78, – 6, ‘Hello’, ‘Honesty’]
(i) value [5]
Hello

(ii) value [-5]
98

(iii) value [1] + value [-1]
TypeError : unsupported operand type (s) for + ‘int’ and ‘str’

(iv) Value [4] + value [-4]
-84

Question 2.
(i) Find the output
a = [10,20,30,40,50,60]
for i in range (1, 5):
a[i – 1] = a[i]
for i in range (0, 5):
print (a[i], end = ” “)
20 30 40 50 50

(ii) If you are getting negative, demeaning messages on social networking profile, mails from many unknown people, what do you think is happening? [1 + 1]
All these indicate cyber bullying and cyber stalking.

Question 3.
Write a program which will find all such numbers which are divisible by 8 but are not a multiple of 5, between 500 and 1000 (both included). [2]
list = [ ]
for i in range (500,1001):
if (i % 8 ==0) and (i % 5 != 0):
list, append (str (i))
print (list)

Question 4.
(a) What should we do with e-waste?
Reduce, reuse, and recycle. Reduce your generation of e-waste through smart procurement and good maintenance. Reuse still-functioning electronic equipment. Recycle those components that cannot be repaired.

(b) What is eavesdropping? [1+1]
When an attacker accesses an active communication channel to listen the ongoing communication and gets information about the content. It is carried out through all communication devices and media such as telephone systems, emails, instant messaging, chat rooms or social networking sites.

Question 5.
Write the corresponding python expressions for the following mathematical expressions.
(i) $$\sqrt{\left(a^{2}+b^{2}+c^{2}\right)}$$
math.sqrt (a*a + b*b + c*c)

(ii) p + q/(r + s)4
p + q/ math.pow ((r + s),4)

(iii) |55 – x|
math.fabs (math.pow (5, 5) – x)

(iv) 2 – 4z2y + 4y [2]
2 – 4 * (math.pow(z, 2)*y) + 4* y

Question 6.

(ii) Name the categories of public licenses. [1+1]
(a) GNU General Public License (GPL)
(b) Creative Commons (CC)

Question 7.
Write a python program to find sum of three random numbers between 51 and 1000.
OR
What are the characteristics of Python Dictionaries?
import random
num1 = random, randint (51,1000)
num2 = random, randint (51,1000)
num3 = random, randint (51,1000)
print (“sum of numbers is “, num1 + num2 + num3)
OR
The 3 main characteristic of a dictionary are:
(i) Dictionaries are unordered: The dictionary elements (key-value pairs) are not in ordered form.

(ii) Dictionary Keys are Case Sensitive: The same key name but with different case are treated as different keys in Python dictionaries.

(iii) Keys must be immutable: We can use strings, number or tuples as dictionary keys but something like [‘key’] is not allowed.

Section – B [3 marks each]

Question 8.
List few practices to ensure confidentiality of information.
OR
How your private information can be stolen?

• Use firewall, wherever possible.
• Control browser setting to block tracking.
• Browse privately, wherever possible.
• Be careful while posting on Internet.
• Ensure safe sites while entering crucial information.
• Carefully handle emails.
• Do not give sensitive information on wireless networks.
• Avoid using public computer.

OR

You share your personal information with your family and friends. They can misuse your personal information and you can be victim of Identity theft.

• Your private information can be stolen if someone uses your personal computer or your phone because when you allow them to use your personal computer means you are giving permission to make use of your personal data.
• Your personal data can be stolen by the attacker by making fake call or sending fake mail.
• Attacker can steal your information by keeping an eye on you when you are entering your information for example. When you are logging in your social media account site id by entering your user id and password then someone could see it if you are not careful about it.

Question 9.
(i) What is the output ?
a = [5 ,6, 8, – 7, 6, 4, 3, 0, -8]
a [:: 1] = 5, 15, 25, 35, 45, 55
print (a)
[5, 15, 25, 35, 45, 55]
[::] and [:: 1] give entire list.

(ii) Write the output of the following.
(a) string 1 = ‘Rainbow’ print(list(stringl))
(b) listl = [0, 5, 10, 15, 20, 25, 30]
listl.clear( )
print(list1)
The output is:
(a) [‘R’, ‘a’, ‘i’, ‘n’, ‘b’, ‘o’, ‘w’]
Method list() takes sequence types and converts them to lists.
(b) [ ]
clear() method removes all the elements from the list. It clears the list completely and returns nothing.

Question 10.
Define the violation of intellectual property right. [1+2]
Violation of intellectual property right may happen in one of the following ways:
(a) Plagiarism: Presenting someone else’s idea or work as one’s own idea or work is called . plagiarism. If we copy some contents from Internet, but do not credit the source or the original
creator, then it is considered as an act of plagiarism. It is a serious ethical offense and sometimes considered as an act of fraud.

(b) Copyright Infringement: Copyright infringement is when we use other person’s work without obtaining their permission to use when we have not paid for it, if it is being sold.

(c) Trademark Infringement: Trademark Infringement means unauthorized use of other’s trademark on products and services. An owner of a trademark may commence legal proceedings against someone who infringes its registered trademark.

Section – C [4 Marks each]

Question 11.
Explain the following methods with respect to lists.
(i) insert ( )
insert ( ): This method inserts an element to the list at a given index.
Syntax
listName. insert (index, element)

(ii) extend ( )
extend ( ): This methods extend the list by adding all items of the list (passed as an argument) to the end of the list.
Syntax
list1. extend (list2)

(iii) remove ( )
remove ( ): This method searches for the given element in the list and removes the first matching element.
Syntax
listName. remove (element)

(iv) count ( )
count ( ): This method returns the number of occurrences of an element in a list.
Syntax
listName. count (element)

(v) pop ( ) [4]
pop ( ): This method removes the item at the given index from the list. The method also returns the removed item.
Syntax
listName. pop (index)

Question 12.
(i) What is the importance of digital footprint? [4]
OR
What do you mean by Phishing?
Digital footprint stays forever and cannot be undone. College/ universities and employers look
back at them to know about applicants. They try to figure out how they conduct themselves in real life before appointing them.
OR
Phishing is an unlawful activity where fake websites or emails that look original or authentic are presented to the user to fraudulently collect sensitive and personal details, particularly usernames, passwords, banking and credit card details.

(ii) What aspects of communications are included in digital communication?
Digital communication includes email, texting, instant messaging, talking on the cell phone, audio or video conferencing, posting on forums, social networking sites, etc. All these are great ways to connect with people in order to exchange ideas, share data and knowledge.

Read the case study given below and attempt any 4 sub-questions (out of 5). Each sub-question carries 1 mark.

Question 13.
A Python module can be defined as a python program file which contains a python code including python functions, classes, or variables. In other words, we can say that our python code file saved with extension (.py) is treated as the module. We may have a runnable code inside the python module. Modules in Python provide us the flexibility to organize the code in a logical way. To use the functionality of one module into another, we must have to import the specific module. The import statement is used to import all the functionality of one module into another. Here, we must notice that we can use the functionality of any python source file by importing that file as the module into another python source file. We can import multiple modules with a single import statement, but a module is loaded once regardless of the number of times, it has been imported into our file
(i) Which extension is used to save the Python file?
Python files are stored with .py extension.

(ii) What is the use of import statement?