Welcome to the Solved Question Paper for Class 11 Computer Science.
1) Identify language processor -
Ans:- (c) Compiler
2) The Octal equivalent of 1100 is ______.
Ans:- (d) 14
3) Identify the software among the following -
Ans:- (b) Windows
4) To complete each activity in a computer, we follow the sequence of steps. This sequence of steps is known as -
Ans:- (b) Algorithms
5) The basic idea of solving a complex problem by decomposition is to -
Ans:- (d) All of the above
6) Which of the following is a sequence datatype -
Ans:- (c) String
7) int(123.45) is an example of ________.
Ans:- (a) Explict type convertion
8) What will be the value of x after executing the following code -
x=int(7) + int('9')
Ans:- (c) Error
9) Select correct output based on the following statement-
print(2*3**3*4)
Ans:- (a) 216
10) Ahaana wants to make a fun program, if user enters any number a "Good" or "Funny" message will appear. She is confused that which one is the most suitable control to be used to make such program. Help her to choose correct option.
Ans:- (b) if else
11) What does the following code print in the console -
if True: print(2004) else: print(3009)
Ans:- (a) 2004
12) Which of the following sequence would be generated in the given line of code?
range (5,0,-2)
Ans:- (c) 5 3 1
13) Write output of following code -
K= "KVS\nhelps the students\tto be a\nseccessful person"
Ans:- (c) KVS
helps the students to be a
successful person
14) Which of the following is/are the features of tuple?
Ans:- (d) All of the these
15) Which statement is used to create empty dictionary?
Ans:- (a) d={}
16) Which of the following can not become key of dictionary?
Ans:- (c) list
17) Which one is correct way to add math module in the python code -
Ans:- (c) import math
18) Which is the name of the IT law that India is having in the Indain legislature?
Ans:- (c) Information Technology (IT) Act, 2000
19) Master Ansh is copying others presentation and presented as own work, this type of act is known as-
Ans:- (b) Plagarism
20) Assertion (A): Lists can be changed after creation. Reason (R): Lists are mutable
Ans:- (a) Both A and R are true and R is the correct explanation of A.
21) Assertion (A): The users must agree to the licence terms and agreements when they use an open source software. Reason (R): Open source softwares can be freely accessed and modified.
Ans:- (a) Both A and R are true and R is the correct explanation of A.
22) Write any two diffrences between compiler and interpreter.
Ans:-
Interpreter:-
An interpreter translates and executes the source code line by line.
Interpreted programs tend to execute slower because the translation occurs during runtime.
Compiler:-
A compiler translates the entire source code into machine code.
Compiled programs generally execute faster because the code is already translated into machine code.
23) Solve the following- (i) (234)10 = (?)2 (ii) (734)8 = (?)10
Ans:-
(i) (234)₁₀ = (11101010)₂ (ii) (734)₈ = (476)₁₀
24) Write a program to find the factorial of a number using: (i) For loop (ii) While loop
x = int(input("Enter the number:")) fact = 1 for i in range(1, x + 1): fact = fact * i print(f"The factorial of this number is {fact}")
Ans:- (Example output for input 5): The factorial of this number is 120
a = int(input("Enter the number:")) fact = 1 x = 1 while x < a + 1: fact = fact * x x = x + 1 print(fact)
Ans:- (Example output for input 5): 120
25) Write code to add following data in empty dictionary (dictionary name be taken as per your choice)- A Apple B Banana C Carrot D Dabberlock
dict={} dict ["A"] = "Apple" dict ["B"] = "Banana" dict ["C"] = "Carrot" dict ["D"] = "Dabberlock" print(dict)
26) Consider the following program-
import random print(100+random.randint(5,10), end=' ') print(100+random.randint(5,10), end=' ') print(100+random.randint(5,10), end=' ') print(100+random.randint(5,10))
Find the correct option from (i) to (iv). Also write the lowest and highest value that can be generated by randint function in this code-
Ans:- (c) 106 109 105 105
The lowest value that can be generated is 105
and the higgest value that can be generated is 110
27) What is netiquettes? Write any two netquettes.
Ans:- Netiquettes refers to the rules and regulations for proper and respectful behaviour while using internet.
Respecting other's privacy
Avoid spam
Avoid plagiarism
Be polite and respectful
Think before posting
Use secure websites
28) What is phising? Explain with example.
Ans:- Phishing is a type of cybercrime where attackers attempt to steal sensitive information, such as usernames, passwords, credit card details, or other personal data, by disguising themselves as a trustworthy entity in electronic communication.
For example , Phishers often use emails, text messages, or websites that mimic legitimate organizations like banks, social media platforms, or online retailers.
29) What is an Operating System? Explain its functions.
Ans:- An operating system (OS) is essential software that manages computer hardware and software resources, providing common services for computer programs. It acts as an intermediary between the user and the computer hardware, making it easier to run applications.
Key functions:-
The OS allocates and deallocates memory space to programs and data.
The OS organizes and manages files and directories on storage devices.
The OS controls and coordinates the operation of peripheral devices such as printers, keyboards, mice, and disk drives.
The OS provides security features to protect the system from unauthorized access.
The OS provides a user interface that allows users to interact with the computer.
30) Write the output of the following code-
(i) A= [1,2,3,4,5,6,7,8,9,10]
del A[:5]
print(A)
(ii) List1=[12,26,80,10]
List2=List1*3
print(List2)
(iii) L1=[2,6,7,8]
L2=L1.copy()
L2[2]=89
print(L1)
Ans:- (i) [6,7,8,9,10]
(ii) [12, 26, 80, 10, 12, 26, 80, 10, 12, 26, 80, 10]
(iii) [2, 6, 7, 8]
31) (i) Expand the following terms : (a) OSS (b) IPR (ii) What do you understand by Plagiarism?
Ans:- (i) (a) OSS stands for Open Source Software.
(b) IPR stands for Intellectual Property Rights.
(ii) Plagiarism is the act of presenting someone else's work or ideas as your own, without their consent, by incorporating it into your work without full acknowledgment.
32) (i) Read an integer variable and find the cube of that number using any suitable python operator.
Ans:-
num=int(input("Enter any integer number:")) c= num**3 print("The cube of ",num,"is",c)
(ii) Underline errors in the following code and write correct code-
a=b=c=3,4,5 d,e=6 print(abc) print("e"=e)
Ans:- (ii) a,b,c=3,4,5
d=e=6
print(a,b,c)
print("e=",e)
33) What will be the output of the following code after execution-
(i) for i in "KVS RO Silchar": print(i.lower(), end="#") (ii) x=50 if x>10: if x>25: print("ok") else: print("good") elif x>40: print("average") else: print("no output")
Ans:- (i) k#v#s# #r#o# #s#i#l#c#h#a#
(ii) ok
average
34) str = "Computer Science"
Suggest appropriate built in string functions to perform the following tasks on given string str-
(i) To check whether the string containd digits.
(ii) To find the occurence a string within another string.
(iii) To convert the first letter of a string to lowercase.
(iv) To remove all the white spaces from the beginning of a string.
Ans:- (i) isdigit()
(ii) count()
(iii) lower()
(iv) lstrip()
35) Mr. Arvind is a software developer and works with a infotech Company Ltd Noida. He has assigned to create a Dictionary with name and marks of n number of students in a class and display the names of students who got marks above 75. Help him to write the correct code to perform the same.
student_data = {} n = int(input("Enter the number of students: ")) for _ in range(n): name = input("Enter student name: ") marks = int(input("Enter student marks: ")) student_data[name] = marks print("Students who scored above 75:") for name, marks in student_data.items(): if marks > 75: print(name)
36) Mr.Monish is trying to develop a program based on list manipulations. He is supposed to add/remove elements in the list, Help him to write the most appropriate list method to perform the following tasks in the list:
Name of list is Marks=[10,20,30,40,50,60]
(a) delete an element value 20 from the list.
(b) get the position of an element 40 in the list.
(c) delete the 3rd element from the list.
(d) add single element 70 at the end of the list.
(e) add another list [80,90,100] at the end of the list.
Ans:- (a) Marks.remove(20)
(b) Marks.index(40)
(c) del Marks[2]
(d) Marks.append(70)
(e) Marks.extend([80, 90, 100])
37) (i) Ravi is a high school student who frequently uses social media platforms. Recently, he came across a website offering pirated software for free. Ravi downloaded and installed the software on his computer. After some time, his computer started showing unusual behaviour, such as slow performance and unexpected pop-up ads.
(1) What ethical issue is Ravi involved in ?
(a) Identity theft (b) Software piracy (c) Data privacy breach (d) Cyber bullying
(2) What could be the possible reason for Ravi's computer's unusual behaviour?
(a) High speed internet (b) Presence of malware in the pirated software
(c) Overuse of computer resources (d) Lack of updates in the OS
(3) What should Ravi have done instead of downloading pirated software?
(a) buy licenced software (b) Use free and open source software (c) Both A and B (d) Ignore the need of software.
Ans:- (1) (b) Software Piracy
(2) (b) Presence of malware in the pirated software
(3) (c) Both A and B
(ii) Rahul is working on a group project for his computer science class. One of his teammates submits a section of the project that included code copied from an open source project without attribution. The teacher uses a plagiarism detection tool and flags the copied code.
(1) What should Rahul's team have done to avoid being flagged for plagiarism?
(a) Written all code by themselves without any external references.
(b) Used the copied code but provided proper attribution and licensing information.
(c) Submitted the project without any modification.
(d) Claimed the copied code was their own original work.
(2) What is the role of plagiarism detection tools in academic settings?
(a) To help students complete their work faster.
(b) To identify and flag instances of copied or unoriginal work.
(c) To provide automatic citations for students.
(d) To rewrite copied content in a new way.
Ans:- (1) (b) Used the copied code but provided proper attribution and licensing information.
(2) (b) To identify and flag instances of copied or unoriginal work.