KENDRIYA VIDYALAYA SANGATHAN – GUWAHATI REGION
SAMPLE PAPER SESSION 2022-23
CLASS XI
SUBJECT: COMPUTER SCIENCE (083)
MARKING SCHEME
Question 1 to 18: 1 mark for each correct answer
1. a. MS OFFICE
2. c. 1=t
3. d. float
4. b. True
5. b. 2two
6. c. ^
7. d. XOR
8. a. identifier
9. a. Dictionary
10. b. !
11. c. i
12. d. Hi#Bye%
13. c. [2,3]
14. a. Broken Mobile
15. b. Phishing
16. Eavesdropping is the act of secretly listening in on a private conversation or intercepting
electronic communication without the knowledge or consent of the parties involved. It is a
violation of privacy and can be done for various purposes such as gathering information, stealing
secrets, or simply for entertainment. Eavesdropping can occur through various means such as
physically listening in on a conversation, wiretapping a phone line, intercepting electronic
communications like emails or instant messages, or using hidden recording devices.
Eavesdropping is generally considered unethical and may be illegal in many circumstances.
17. Open source software is a type of software whose source code is made available to the public,
allowing anyone to view, modify, and distribute the code as they see fit. This means that anyone
can access the underlying code of the software, study it, make improvements, and redistribute it.
Open source software is often developed in a collaborative manner, with contributions from a
large community of developers and users. Some examples of open source software include: Linux
operating system, Apache web server, WordPress content management system, firefox web
browser
18. import math
square_root = math.sqrt(16)
Question 19 to 25: 2 marks for each correct answer
19. 20 0
20. In Python, a literal is a value that is directly represented in the code, rather than being the result
of a computation or an expression. In other words, a literal is a fixed value that can be assigned
to a variable or used in an expression. Examples:
Integer literal: An integer literal is a sequence of digits that represents a whole number. For
example, 42 and -100 are integer literals in Python.
String literal: A string literal is a sequence of characters enclosed in quotes. The quotes can be
either single quotes (') or double quotes ("). For example, "Hello, World!" and 'Python is fun' are
string literals in Python.
OR
In Python, a string is a sequence of characters. There are two types of string literals: single-line
strings and multiline strings. A simple string is a string that is contained within a single line. It is
created by enclosing the characters in either single quotes (') or double quotes ("). Here is an
example of a simple string: 'Simple string'. A multiline string is a string that spans multiple lines. It
is created by enclosing the characters in triple quotes (''' or """). Multiline strings are often used
for formatting text or for including long text blocks. Here is an example of a multiline string:
long_string = '''This is a multiline string. It can span multiple lines'''
21. (i) L.sort(reverse=True)
(ii) L.append(9)
22. 10 20
20 10
23. GOOD
24. Trademark infringement is the unauthorized use of a trademark or a trade name that is owned by
another party. It occurs when a third party uses a trademark that is confusingly similar to an
existing trademark or trade name, with the intention of creating confusion among consumers and
benefiting from the goodwill associated with the original trademark. Example is copying a logo.
OR
Adware is a type of software that displays advertisements on a user's computer, often without
their consent or knowledge. Adware can be used to generate revenue for the creators of the
software or to collect personal information about the user.
Ransomware, on the other hand, is a type of malicious software that encrypts the user's files and
demands a ransom payment in exchange for the decryption key. Ransomware is designed to cause
harm to the user's computer and data, and it can be used to extort money from the user or to
steal sensitive information. Ransomware typically spreads through phishing emails, infected
software downloads, or by exploiting vulnerabilities in the user's computer.
25. Its cyber bullying.
He should report it to cyber cell/ police/ teachers/ parents.
OR
a. Respect others: It is important to respect other people's opinions, beliefs, and privacy on
social media.
b. Avoid using offensive language, making derogatory comments, or sharing inappropriate
content.
c. Be careful about sharing sensitive or personal information, and respect the intellectual
property rights of others.
d. Before sharing content on social media, consider whether it is accurate, relevant, and
appropriate.
e. Be careful about sharing sensitive or personal information, and respect the intellectual
property rights of others.
Question 26 to 30: 3 marks for each correct answer
26. a)
Compiler: A compiler is a language processor that translates the entire source code of a program
into machine code (or an executable file) in one go. The compiler checks the syntax and semantics
of the code, and generates an optimized and executable version of the program that can be run
on a computer. Examples of programming languages that use compilers include C++, Java, and C#.
Interpreter: An interpreter is a language processor that reads and executes the source code of a
program line-by-line. The interpreter translates each line of code into machine code and executes
it immediately, without generating an executable file. Interpreters are typically slower than
compilers, but they are easier to use and allow for more dynamic programming. Examples of
programming languages that use interpreters include Python, JavaScript, and Ruby.
b) An operating system (OS) is a software program that manages the computer hardware and
software resources and provides common services for computer programs. It acts as an interface
between the user and the hardware of the computer, and it controls the allocation of resources
and the execution of programs.
Two functions of an operating system are:
Memory Management: The OS is responsible for managing the computer's memory resources,
including RAM (Random Access Memory) and secondary storage devices such as hard disks.
Process Management: The OS is responsible for managing the processes that run on the
computer. It creates, schedules, and terminates processes, and ensures that they run smoothly
and efficiently
c) IPO Cycle is the abbreviation for Input-Process-Output cycle, which is a conceptual framework
that describes how a computer program works. The IPO Cycle consists of three basic
components: input, processing, and output.
27.
(i) reverse(): This function is used to reverse the order of elements in a list. It modifies the original
list and does not return any value.
my_list = [1, 2, 3, 4, 5]
my_list.reverse()
print(my_list)
Output: [5, 4, 3, 2, 1]
(ii) insert(): This function is used to insert an element at a specified index in a list. It takes two
arguments: the index where the element should be inserted, and the element itself. The
remaining elements in the list are shifted to the right to make room for the new element.
my_list = [1, 2, 3, 4, 5]
my_list.insert(2, 'apple')
print(my_list)
Output: [1, 2, 'apple', 3, 4, 5]
(iii) count(): This function is used to count the number of occurrences of a specified element in a
list. It takes one argument: the element to be counted. It returns an integer that represents the
number of occurrences of the element in the list.
my_list = [1, 2, 2, 3, 2, 4, 2, 5]
count_twos = my_list.count(2)
print(count_twos)
Output: 4
OR
(i) isalnum(): This is a built-in string method in Python that checks whether a given string is
alphanumeric, meaning it contains only letters and/or digits. It returns True if the string is
alphanumeric and False otherwise.
my_string = "Hello123"
is_alphanumeric = my_string.isalnum()
print(is_alphanumeric)
Output: True
(ii) strip(): This is a built-in string method in Python that removes leading and trailing whitespace
characters (spaces, tabs, newlines) from a string. It returns a new string with the whitespace
characters removed.
my_string = " Hello World! \n"
stripped_string = my_string.strip()
print(stripped_string)
Output: Hello World!
iii) replace(): This is a built-in string method in Python that replaces all occurrences of a specified
substring in a string with another substring. It takes two arguments: the substring to be replaced,
and the substring to replace it with. It returns a new string with the replacements made.
my_string = "Hello World!"
new_string = my_string.replace("World", "Python")
print(new_string)
Output: Hello Python!
28.
my_tuple = (1, 2, 3, 4, 5, 6, 7, 8, 9, 10)
# Using a for loop to iterate over the elements of the tuple
for num in my_tuple:
# Checking if the number is even
if num % 2 == 0:
print(num) # If the number is even, print it
29.
num = int(input("Enter a number: "))
# Check if the number is less than or equal to 1
if num <= 1:
print(num, "is not a prime number")
else:
for i in range(2, int(num**0.5) + 1):
if num % i == 0:
print(num, "is not a prime number")
break
else:
print(num, "is a prime number")
30.
Visual Impairment: This includes individuals who are blind, have low vision, or color blindness.
They may have difficulty reading on-screen text or distinguishing between different colors.
Motor Impairment: This includes individuals who have difficulty using a mouse, keyboard, or other
input devices due to physical disabilities, such as paralysis or tremors.
solution:
Assistive Technology: like narrator (screen reader), adaptive keyboard
User Interface Design: high-contrast modes or larger font sizes for individuals
OR
(i) Copyright: Copyright is a legal right that protects the original works of authors, artists, and
other creators from unauthorized use. This includes literary, musical, and artistic works, as well
as computer software and other types of digital media. Example: rights over music, painting, book
(ii) Patent: A patent is a legal right granted by the government that gives the owner the exclusive
right to make, use, and sell an invention for a set period of time. In order to receive a patent, the
invention must be novel, useful, and non-obvious. Patents are often granted for inventions in
fields such as technology, medicine, and engineering.
(iii) Trademark: A trademark is a symbol, word, phrase, or design that is used to distinguish the
goods or services of one company from those of another. A trademark helps to prevent confusion
among consumers and allows a company to build a brand identity. Examples of Trademarks
include logos, brand names, and slogans, and they can be registered with the government for
legal protection.
Question 31 to 33: 5 marks for each correct answer
31. a. Q= AB+ ( (B+C) . BC) b.
c.
177
38
11111011
(1 mark for each correct answer)
32. (i)
2
8
2
(1 mark for each correct answer)
(ii)
The fromkeys() function is a built-in function in Python dictionaries that creates a new dictionary
with keys from a sequence and values set to a default value or None. The syntax for the fromkeys()
function is as follows:
dict.fromkeys(sequence[, value])
Here, sequence is the sequence of keys to be used in the new dictionary, and value is an optional
parameter that sets the default value for all keys. If value is not provided, default value is None.
keys = ['apple', 'banana', 'orange']
my_dict = dict.fromkeys(keys)
print(my_dict)
Output:
{'apple': None, 'banana': None, 'orange': None}
(2 marks for correct answer)
33. input_string = input("Enter a string: ")
digit_count = symbol_count = non_digit_count = 0
for char in input_string:
if char.isdigit(): # check if character is a digit
digit_count += 1
elif char in ("#", "$"): # check if character is a symbol
symbol_count += 1
elif char.isalpha() or char.isspace():
non_digit_count += 1
print("Number of digits in the string:", digit_count)
print("Number of # and $ symbols in the string:", symbol_count)
print("Number of non-digit characters in the string:", non_digit_count)
(3 marks for correct answer)
OR
(i)
L = [10, 20, 30, 40]
for i in range(0, len(L)-1, 2):
L[i], L[i+1] = L[i+1], L[i]
print("Updated list:", L)
(3 marks for correct answer)
(ii)
Remove pop
Remove the first item from the list Remove the item at the given
whose value is mentioned position in
the list, and return it
Return type is None Return Type: It will return the
element which is removed from the
list
It will modify the original list It will also update the original
itself. list and return the element removed
from the list.
It raises a ValueError if there is If index is not mentioned, it
no such item removes and returns the last
element in the list.
(2 marks for correct answer)
Question 34 to 35: 4 marks for each correct answer
34. a)
n = int(input("Enter the number of students: "))
# Create an empty dictionary to store the student details
student_dict = {}
# Loop over each student and input their details
for i in range(1, n+1):
print(f"\nEnter the details of student {i}:")
roll_number = input("Roll Number: ")
name = input("Name: ")
marks = int(input("Marks: "))
student_dict[roll_number] = {"Name": name, "Marks": marks}
# Print the names of students who have scored above 75
print("\nStudents who scored above 75:")
for roll_number, details in student_dict.items():
if details["Marks"] > 75:
print(details["Name"])
(3 marks for correct answer)
b) 3
(1 mark for correct answer)
35. (a) Hacking: Hacking refers to the unauthorized access, modification, or
use of a computer system or network. It involves exploiting
vulnerabilities in computer systems or networks to gain access to data or
control of the system. Hacking can be used for various purposes, including
stealing sensitive information, disrupting services, or damaging systems.
(b) Credit card fraud: Credit card fraud is a type of financial fraud
that involves the unauthorized use of someone else's credit card or credit
card information to make purchases or obtain cash advances. This can occur
through various means, including stealing physical credit cards, skimming
credit card information, or using stolen credit card information to make
online purchases.
(c) Spam: Spam refers to unwanted or unsolicited messages, typically sent
via email, text message, or social media. These messages are usually
advertising or promotional in nature, and often contain fraudulent or
deceptive content. Spam can be used to spread malware, obtain personal
information, or trick people into making purchases or providing sensitive
information.
(d) IT ACT 2000: The IT ACT 2000 is an Indian law that governs the use of
electronic communication and transactions. The law provides a legal
framework for electronic governance and regulates various aspects of
electronic communication, including digital signatures, electronic
contracts, and electronic records. The law also includes provisions for
the prevention of cybercrime and the punishment of offenders.
(1 mark for correct answer)