Assertion and Reason Based Questions: Pip Install Matplotlib
Assertion and Reason Based Questions: Pip Install Matplotlib
Q. 10:
Assertion (A) : Digital footprint is the trail of data we leave behind when we visit any website (or use any
online application or portal) to fill-in data or perform any transaction.
Reason (R) : While online, all of us need to be aware of how to conduct ourselves, how best to relate with
others and what ethics, morals and values to maintain.
Q. 12:
Assertion (A) : Social media are websites or applications that enable their users to participate in social
networking but they cannot create and share content with others in the community.
Reason (R) : We should not waste precious time in responding to unnecessary emails or comments unless they
have some relevance for us.
Q.13 ABC Enterprises is selling its products through three salesmen and keeping the records of sales done
quarterly of each salesman as shown below:
Company is storing the above information in a CSV file “Qtrly_Sales.csv”. Mr. Rohit is a programmer.
Company has given him the responsibility to create the program to visualise the above data. He wrote Python
code but he is facing some difficulties. Help him by giving the solutions of following situation:
Python code:
1 import pandas as pd
2 import ________________ as plt
3 df=__________("Qtrly_Sales.csv")
4 df.plot(__________='bar', color=['red','blue','brown',’green’])
4|Page
5 plt.___________('Quarterly Report')
6 plt.xlabel('Salesman')
7 plt.ylabel('Sales')
8 plt._________()
1. Choose the correct Python library out of following options in line 2
A. matplotlib B. matplotlib.plot
C. py.plot D. matplotlib.pyplot
Ans. D
2. Choose the correct option to read the csv file in line 3
A. read_csv B. pd.read_csv
C. pd.get_csv D. get_csv
Ans B
3. Choose the correct option to select the type of graph in line 4
A. type B. kind
C. style D. graph
Ans B
4. Choose the correct word to give the heading in line 5
A. label B. heading
C. title D. caption
Ans C
5. Choose the correct word to display the graph in line 8
A. plot() B. display()
C. showgraph() D. show()
Ans D
Q.14. Abhishek uses computer and mobile for his personal use. Study the following cases and answer the
questions given below.
(1) Once he got the message in Whatsapp that CBSE is announcing the result of class XII tomorrow at
12:00 pm. He forwarded the message to his few friends. But later he came to know that no such
announcement was there in CBSE official web-site.
(2) He is visiting several web-sites.
(3) He is getting abuse messages from an unknown number due to which he is thinking of quarreling with
that person.
(4) He registered himself in one website by giving his email id and phone number but later his friend told
him about the concept of digital footprint. He is now thinking about canceling the registration so that his
personal information can be deleted from that website.
(5) He uploaded one video in his youtube channel where he used one background music downloaded from
somewhere on Internet
a. In case (1), he is violating :
A. net etiquettes B. Communication etiquettes
C. copy right D. None of the above
Ans B
5|Page
b. In case (2) , he is leaving:
A. Active digital footprint B. Passive digital footprint
C. There is no chance of any digital footprint
D. None of the above
Ans B
c. In case (3), the unknown person can be called as:
A. Cyber buller B. Internet troll
C. Hacker D. Cracker
Ans B
d. In case (4) which one is correct:
A. His data will be deleted forever after cancelling the registration.
B. His data will be deleted after 30 days since it is a digital footprint.
C. His data will never be deleted since it became the digital footprint.
D. As per the terms and condition of that website, data will be deleted.
Ans C
e. In case (5), he may be violating:
A. copyright B. Intellectual property right
C. plagiarism D. None of the above
Ans A
6|Page
Fill the blank in S1 with the correct option:
a. Matplotlib
b. Matplotllib.pyplot
c. Numpy
d. Pandas
4. Fill the blank in S2 with the correct option:
a. pd
b. series1
c. Series
d. Pyplot
5. What will be the output of the code in Q.no. 6?
a. [10,20,30]
b. 0 10
1 20
2 30
c. 10
20
30
d. 10 1
20 2
30 3
6. Which of the following are not true?
A. If we do not explicitly specify an index for the data values while creating a series of N data elements,by
default indices range from 0 through N.
B. We cannot assign user-defined labels to the index and use them to access elements of a Series
C. We can create a series with numeric index in random order.
a. A only
b. A, B
c. B, C
d. C only
Column A Column B
A. 1.Creating series from dictionary
7|Page
a. A-1, B-2 C-3
b. A-2, B-3, C-1
c. A-2, B-1, C-3
d. A-1, B-3, C-2
8. What will be produced by the following python code? [Assuming that all necessary libraries and modules are
imported]
series1 = pd.Series(np.array([31,28,31,30]), index = ["Jan", "Feb", "Mar"])
print(series1)
a. Error: Length of passed values is 4, index implies 3
b. No output
c. Jan 31
Feb 28
Mar 31
d. Jan 31
Feb 28
Mar 31
Apr NaN
9. Answer the following based on the series given below:
import pandas as pd
list1=[1,2,3,4,5,6,7,8]
list2=['swimming','tt','skating','kho kho', 'bb', 'chess', 'football',"cricket"]
school=pd.Series(list1,index=list2)
school.name=("little")
print (school*2) #statement 1
print (school.tail(3)) # statement 2
print (school["tt"]) # statement 3
print (school[2:4]) # statement 4
8|Page
iii. Choose the correct output for the statement:
print (school["tt"]). # statement 3
a. 2
b. 3
c. tt 2
d. true
iv. Identify the correct output for:
print (school[2:4]) # statement 4.
a. skating 3
kho kho 4
b. tt 2
skating 3
kho kho 4
c. skating 3
kho kho 4
bb 5
d. skating 3
kho kho 4
bb 5
chess 6
football 7
cricket 8
a. swimming 3
tt 4
skating 5
kho kho 6
bb 7
chess 8
football 9
cricket 10
b. swimming 2
tt 4
skating 6
kho kho 8
bb 10
chess 12
football 14
cricket 16
c. swimming False
tt False
skating True
kho kho True
bb True
chess True
football True
cricket True
9|Page
d. swimming 1
tt 4
skating 9
kho kho 16
bb 25
chess 36
football 49
cricket 64
10. Pushp, a student of class-XII, has been assigned a code to create a pandas series S1, as shown below.
a 100
b 200
c 300
d 400
e 500
dtype: int64
With reference to the above, answer the given questions:
i. Choose the command that will give the following output:
b 200
c 300
dtype: int64
a. print(S1[:3])
b. print(S1[0:3])
c. print(S1[2:4])
d. print(S1[1:3])
ii. Help him to identify the correct statement that can be used to extract the value with the index 'c':
a. print(S1[c])
b. print(S1(c))
c. print('S1' ['c'])
d. print(S1 ['c'])
iii. Which of the following command will give the following output:
b 200
d 400
dtype: int64
a. print(S1.iloc[1:4])
b. print(S1.iloc[2:4])
c. print(S1.iloc(1:4))
d. print(S1.iloc[1:4:2])
iv. Which of the following command will display the series by adding 10 in eachvalue.
a. print(S1 [+10])
b. print(S1+10)
c. print(S1)+10
d. print(S1)+print(10)
v. Pushp wants to delete the value against index 'd'. Help him to choose the suitable option to do so:
a. S1=S1.drop(d)
b. S1=S1.drop('d')
c. S1=drop('d')
d. S1=S1.drop['d']
10 | P a g e
11. Answer the question based on the Assertion A and Reason R given.
A:A Series is a one-dimensional array containing a sequence of values of any data type (int, float, list, string, etc).
R:Pandas Series can be imagined as a column in a spreadsheet.
a. Both A and R are true and R is the correct explanation of A.
b. Both A and R are true but R is not the correct explanation of A.
c. A is true but R is false.
d. A is false but R is true.
e. Both A and R are false.
12. _____________ takes an integer value that corresponds to its position in the series starting from 0.
a. Positional index
b. Labelled index
c. Both
d. None of the above
13. Which of the following statement is wrong?
a. We can create Series from Dictionary in Python.
b. Keys of dictionary become index of the series.
c. Order of indexes created from Keys may not be in the same order as typed in dictionary.
d. All are correct.
14. What will be the output of the following?
a. 2
b. Mar
c. Feb
d. 3
15. Choose the correct output of the following code:
a. France Paris
France Paris
b. USA WashingtonDC
France Paris
c. France Paris
UK London
d. USA WashingtonDC
UK London
16. Which of the following statement will create an empty series named “S1”?
a. S1 = pd.Series(None)
b. S1 = pd.Series( )
c. Both of the above
d. None of the above
11 | P a g e
17. Choose the codes with their outputs:
Column A Column B
A. 1.
S1=pd.Series(range(5)) a 1
print(S1) b 4
c 7
d 10
e 13
B. 2.
S2=pd.Series(np.arange(3, 13, 3.5)) 1 10
print(S2) 3 10
5 10
C. 3.
S3=pd.Series(10, index=range(1, 6, 2)) 0 0
print(S3) 1 1
2 2
3 3
4 4
D. 4.
S4=pd.Series(range(1, 15, 3), index=[x for x in 0 3.0
‘abcde’]) 1 6.5
print(S4) 2 10.0
a. A-4, B-3, C-2, D-1
b. A-3, B-4, C-2, D-1
c. A-3, B-4, C-1, D-2
d. A-4, B-3, C-1, D-2
18. Choose the correct code that produces the output below:
9 18
10 20
11 22
12 24
a. a=np.arange(9, 13)
s1=pd.Series(index=a, data=a*2)
print(s1)
b. a=[9, 10, 11, 12]
s1=pd.Series(index=a, data=a*2)
print(s1)
c. Both the above
d. None of the above
19. Choose the correct code that produces the output below:
0 9
1 10
2 11
3 12
4 9
5 10
6 11
7 12
12 | P a g e
a. a=np.arange(9, 13)
s1=pd.Series( data=a*2)
print(s1)
b. a=[9, 10, 11, 12]
s1=pd.Series( data=a*2)
print(s1)
c. Both the above
d. None of the above
20. Choose the correct Series attributes for the given description:
i. I return True if there are any NaN values, otherwise return False
ii. I return the number of dimensions of the underlying data
iii. I return the number of elements in the underlying data
iv. I return True if the Series object is empty, false otherwise
MARKING SCHEME
Topics: Data structures in Pandas - Series and data frames; Series: Creation of series from dictionary, scalar value;
mathematical operations; series attributes, head and tail functions; selection, indexing and slicing.
1. (c) 0.50 8.0
0.75 11.0
2. (a) Both are true
3. (d) pandas
4. (a) pd
5. (b) 0 10
1 20
2 30
6. (b) A, B
7. (b) A-2, B-3, C-1
8. (a) Error: Length of passed values is 4, index implies 3
9. (i) (c) school
(ii) (b)
chess 6
football 7
cricket 8
(iii) (a) 2
(iv) (a) skating 3
kho kho 4
(v) (b)
swimming 2
tt 4
skating 6
13 | P a g e
kho kho 8
bb 10
chess 12
football 14
cricket 16
10. i. (c) print(s1[1:3])
ii. (d) print(S1 ['c'])
iii.(d) print(S1.iloc[1:4:2])
iv.(b) print(S1+10)
v. (b) S1=S1.drop('d')
11. (a) Both A and R are true and R is the correct explanation of A.
12. (a) Positional Index
13. (d) All are correct.
14. (d) 3
15. (c) France Paris
UK London
16. (c) Both of the above
17. (b) A-3, B-4, C-2, D-1
18. (a) a=np.arange(9, 13)
s1=pd.Series(index=a, data=a*2)
print(s1)
19. (b) a=[9, 10, 11, 12]
s1=pd.Series( data=a*2)
print(s1)
20. (c) hasnans, ndim, size, empty
Data Visualization
( Case study Based Question )
Q1. Mr.Sharma is trying to write a code to plot line graph shown in fig-1. Help Mr. Sharma 5
to fill in the blanks of the code and get the desired output.
______________ # statement 5
______________ # statement 6
14 | P a g e
# giving a title to my graph
plt.____________('My first graph!') # statement 7
i) Which of the above statement is responsible for plotting the values on canvas.
a) Statement 8
b) Statement 4
c) Statement 1
d) None of the above
ii) Statements 5 & 6 are used to give names to x-axis and y-axis as shown in fig.1.
Which of the following can fill those two gaps
a) plt.xlabel('x - axis') plt.ylabel('y - axis')
b) plt.xtitle('x - axis') plt.ytitle('y - axis')
c) plt.xlable('x - axis') plt.ylable('x - axis')
d) plt.xlabel('x axis') plt.ylabel('y axis')
iii) Raman has executed code with first 7 statements. But No output displayed. which
of the following statements will display the graph?
a) plt.display()
b) plt.show()
c) matplotlib.pyplot.show()
d) Both b & c
Kerala 18909 38
15 | P a g e
Maharastra 4663 64
Telangana 375 6
In order to present the above statistical data, Raghav has decided to plot a bar graph.
Suggest him suitable solution to complete his work. The above data has been taken
as a dictionary with state name as keys and total number of cases as values.
covid_cases= {“AP”: 20,”TN”:25, “Kerala”:38, “MH”:64,”TN”:6}
average_cases={“AP”: 1295,”TN”:1767, “Kerala”:18909, “MH”:4663,”TN”:375}
i) Which of the following statements will create a bar chart with states and
corresponding total number of cases
d) Both a & b
ii) Which of the following statement will apply different colours to different bars
with each bar of width 0.5
a) plt.bar( States,Total_cases,color=[“Red”,”Blue”,”Green”],width=0.5)
b) plt.bar( States,Total_cases,color=[“Red”],width=0.5)
c) plt.bar( States,Total_cases,color=[‘r’,’g’,’b’,’m’,’c’],width=0.5)
d) plt.bar( States,Total_cases,width=0.5)
iii) Which of the following is not a valid parameter for customizing the bar graph
a) width
b) edgecolor
c) legend
d) linecolor
iv) Which of the following option is used to display horizontal bars with states
on y axis and 7-day average on x-axis
a) plt.bar(Average_cases,states)
b) plt.barh(Average_cases, states)
c) plt.bar(states,Average_cases)
d) plt.barh(states,Average_cases)
16 | P a g e
v) Which of the following is not a valid method associated with plotting bar
graph
a) legend()
b) color()
c) title()
d) savefig()
Q10 ASSERTION(A) : Marker has different elements i.e., style, color, size etc
REASON(R) : we can customize line of a line chart by using marker property of plot() function
Ans: A
17 | P a g e
Q11 ASSERTION(A) : legend of the graph reflects the data displayed on the graph’s Y-axis
REASON(R) : Location of the legend can be changed by using loc attribute
Ans: B
Data Frame
(Question based on Reasoning/logic)
Q1. Which function is used to find values from a DataFrame D using the index 1
number?
a) D.loc
b) D.iloc
c) D.index
d) None of these
Q2 Which attribute of a dataframe is used to convert rowa into columns and columns 1
into rows in a dataframe?
a) T
b) ndim
c) empty
d) shape
Q3 A DataFrame has two axes 1
a) True
b) False
Q4 . ___________parameter is used to ignore row labels in concatenation operation. 1
a) ignore_index=True
b) ignore_index=False
c) ignoreindex=’true’
d) index_ignore=’False’
18 | P a g e
Q7 In given code dataframe ‘D1’ has _____ rows and _____ columns. 1
import pandas as pd
S1 = pd.Series([1, 2, 3, 4], index = ['a', 'b','c','d'])
S2 = pd.Series([11, 22, 33, 44], index = ['a', 'bb','c','dd'])
D1 = pd.DataFrame([S1,S2])
a) 2, 4
b) 4, 6
c) 4, 4
d) 2, 6
(Assertion Reasoning based questions)
Q8 Assertion (A): 1
Nidhi has create dataframe Df1
Df1
Student Marks Sports
I ABC 24.5 Cricket
II DEF 27.5 Badminton
III GHI 30.0 Football
She can expand or delete any row /column in this dataframe.
Reason(R):
In python DataFrame objects can be concatenated or merged
a) Both A and R are true and R is the correct explanation of A.
b) Both A and R are true but R is not the correct explanation of A.
c) A is true but R is false.
d) A is false but R is true.
Q9 Assertion (A): 1
DataFrame.count() function will display the sum of the values from the data frame
Reason (R):
axis=0 ,argument is to used to find sum column-wise
a) Both A and R are true and R is the correct explanation of A.
b) A is true but R is false.
c) A is false but R is true.
d) Both A and R are false
19 | P a g e
Case Based Question
Que Nidhi has created dataframe df1 as following , help her to perform following
10 tasks and write the code to help her to
df1
Student Marks Sports
I Abc 24.5 Cricket
II Def 27.5 Badminton
III Ghi Np.Nan Football
10 a)
Displays the index (row labels) of DataFrame
a) print( df1.index)
b) print(df1.name)
c) print(df1.row) 1
d) print(df1.index,row=’values)
10 b) Remove the null value rows
a) df1.rowdelete()
b) Df1.del(np.nan)
c) Df1.drop(np.nan) 1
d) df1.dropna()
Returns True/False to show if the DataFrame is empty
a) Print(df1.nan)
b) Print(df1.null)
c) print(df1.empty)
d) print(df1.NULL)
10 c)
1
Que Consider the following code and answer questions:
11 Riyaz is creating an application using pandas library in his program , his code is
mentioned below. Fill in the blanks to help him
import _____ as pd #Statement A
d={‘a’:[1,2],’b’:[2,3]}
d2={‘a’:[4,5],’b’:[6,7]}
df1=pd.DataFrame(d)
df2=pd.________(d2) # Statement B
df3=pd._____([df1,df2]) # Statement C
21 | P a g e
12 e) Mr. Ankit wants to change the index of the Data Frame and the output for the same
is given below. Identify the correct statement to change the index.
i. df.index[]=["Air India","Indigo","Spicejet","Jet","Emirates"]
ii. df.index["Air India","Indigo","Spicejet","Jet","Emirates"]
iii. df.index=["Air India","Indigo","Spicejet","Jet","Emirates"]
iv. df.index()=["Air India","Indigo","Spicejet","Jet","Emirates"]
Name of the Teacher Prepared: Arvind Kumar Shrivas, PGT (Comp.Sc.), KV No.2, Nausenabaugh
Name of the Teacher vetted: Smita Vishnu Tiple, PGT (Comp.Sc.), KV, Warangal
Q2 Assertion (A): 2
Boolean indexing is a type of indexing.
Reasoning (R) :
DataFrame.loc(False) function can be used to find the relative values where index
value is False
Q3 Assertion (A): 2
Some time we want to combine the two dataframes using the merge() function
Reasoning (R):
Merging operation can be performed only with common values of column not with
specific column
22 | P a g e
a) Both A and R are true and R is the correct explanation of A.
b) A is true but R is false.
c) A is false but R is true.
d) Both A and R are false
Records of the employees are given below in tabular form write code for the
following task(5)
SNO name Test marks
1 rohit 1 200
2 rohit 2 250
3 mohit 1 200
4 mohit 2 155
5 Ranu 1 100
6 Ranu 2 165
23 | P a g e
Q5 Consider this Dataframe from all questions given below
Choose the correct function to rename city columns to location using rename()
5a) 1
function:
a. df.rename(columns={‘City’:’Location’})
b. df.rename(columns={‘City’=’Location’})
c. df.rename(‘City’=’Location’)
d. df.rename(df.columns(‘City’,’Location’))
i. Only 1 is correct
ii. 1, 2 and 3 are correct
iii. 1 and 3 are correct
iv. All of them are correct
To display 2 rows from the top in the dataframe, which of the following
5d) 1
statement is correct:
i. df.head()=2
ii. df.head(n=2)
iii. df.head(range(2))
iv. All of the above
24 | P a g e
Data Frame
( Question based on Reasoning/logic)
Q6. Which of the following is the correct syntax to select or access columns from the 1
dataframe using column names?
a) df(col1,col2,…,coln)
b) df[[col1,col2,…,coln]]
c) df[col1,col2,…,coln]
d) df{col1:col2:…,:coln}
Q7 Ms. Kavitha wants to print a single column from the dataframe, which of the 1
following is correct syntax for her?
a) df(col)
b) df<col>
c) df[col]
d) df{df:col}
d.DataFrame(dt)
Which of the following code will print names and Annual marks of students?
a) print(df.loc[:,’Name’:’AnnualExam’])
b) print(df.loc[‘Name’:’AnnualExam’])
c) print(df.loc[:,df.columns!=’InternalMarks’])
d) All of these
Q9 What will be the output of following code: 1
dt=({'Name':['Akshit','Bharat','Chetan','Dhaval','Gaura
ng'],
'InternalMarks':[18,19,20,18,19],
'AnnualExam':[76,78,80,76,73]})
df=pd.DataFrame(dt)
print(df.iloc[0:2,0:2])
a)
Name InternalMarks
0 Akshit 18
1 Bharat 19
b) Name AnnualExam
0 Akshit 76
1 Bharat 78
2 Chetan 80
25 | P a g e
c)
Name InternalMarks AnnualExam
0 Akshit 18 76
1 Bharat 19 78
d)
Empty DataFrame
Columns: [Name, InternalMarks, AnnualExam]
Index: []
Write code to access data of rows of jan and march for scanner and
10 c) keyboard. 1
print(df.loc[[‘Jan’,’March’],[‘Scanner’,’Keyboard’]])
26 | P a g e
Q.3 The following table shows the python code and its expected output. Choose the correct word for blank
space in line 3 for printing the column:
A. index B. column C. col D. heads
1 import pandas as pd r1 10
2 x = [10, 20 30] r2 20
3 ser = pd.Series(x, _______=["r1", "r2", "r3"]) r3 30
4 print(ser)
Ans. A
Q.4 What is the correct output for following Python code:
import pandas as pd
data = {"Marks1": 90, "Marks2": 95, "Marks3": 97}
ser = pd.Series(data)
print(ser)
A. Marks1 90 B. Marks1 90
Marks2 95 Marks2 95
Marks3 97 Marks3 97
dtype: int64 dtype: int16
Ans D
Q.6. Which is the best analogy of digital footprint:
A. Our footprint when we walk over sand of sea beach
B. Our footprint when we walk over the cement road constructed few minutes back
C. Our footprint when we enter inside our home with dirty feets.
D. All of the above
Ans B (since after drying, footprints are retained for years)
Q.7 . Digital footprint are not created :
A. when we do online shopping
B. when we create our email address
C. when we watch youtube videos
D. When we send e-mail
Ans C
Q.8: Why we should express greeting on telephone:
A. It express your happiness
B. It shows that you are polite
C. It is the first impression
D. It is the culture.
Ans B
27 | P a g e
Q.9: As soon we get any good news from any source in social media:
A. We should forward to many people so that they can be benefited.
B. We should never forward to anyone.
C. We should confirm the news from any reliable source before forwarding.
D. We should forward to our family and friends only.
Q.10: While keeping the password:
A. It should not contain any character other than alphabets and numbers.
B. It should contain name, date of birth etc. so that it should be easy to remember.
C. It should contain alphabets (both uppercase and lowercase), numbers and special characters.
Company is storing the above information in a CSV file “Qtrly_Sales.csv”. Mr. Rohit is a programmer.
Company has given him the responsibility to create the program to visualise the above data. He wrote Python
code but he is facing some difficulties. Help him by giving the solutions of following situation:
Python code:
1 import pandas as pd
2 import ________________ as plt
3 df=__________("Qtrly_Sales.csv")
4 df.plot(__________='bar', color=['red','blue','brown',’green’])
5 plt.___________('Quarterly Report')
6 plt.xlabel('Salesman')
7 plt.ylabel('Sales')
8 plt._________()
Q.11: Choose the correct Python library out of following options in line 2
A. matplotlib B. matplotlib.plot
C. py.plot D. matplotlib.pyplot
Ans. D
Q.12: Choose the correct option to read the csv file in line 3
A. read_csv B. pd.read_csv
C. pd.get_csv D. get_csv
Ans B
28 | P a g e
Q.13: Choose the correct option to select the type of graph in line 4
A. type B. kind
C. style D. graph
Ans B
Q.14: Choose the correct word to give the heading in line 5
A. label B. heading
C. title D. caption
Ans C
Q.15: Choose the correct word to display the graph in line 8
A. plot() B. display()
C. showgraph() D. show()
Ans D
Case 2:
Abhishek uses computer and mobile for his personal use. Study the following cases and answer the questions
given below.
(1) Once he got the message in Whatsapp that CBSE is announcing the result of class XII tomorrow at
12:00 pm. He forwarded the message to his few friends. But later he came to know that no such
announcement was there in CBSE official web-site.
(2) He is visiting several web-sites.
(3) He is getting abuse messages from an unknown number due to which he is thinking of quarreling with
that person.
(4) He registered himself in one website by giving his email id and phone number but later his friend told
him about the concept of digital footprint. He is now thinking about canceling the registration so that his
personal information can be deleted from that website.
(5) He uploaded one video in his youtube channel where he used one background music downloaded from
somewhere on Internet
Q.16: In case (1), he is violating :
A. net etiquettes B. Communication etiquettes
C. copyright D. None of the above
Ans B
Q.17: In case (2) , he is leaving:
A. Active digital footprint B. Passive digital footprint
C. There is no chance of any digital footprint
D. None of the above
Ans B
Q.18: In case (3), the unknown person can be called as:
A. Cyber buller B. Internet troll
C. Hacker D. Cracker
Ans B
Q.19: In case (4) which one is correct:
A. His data will be deleted forever after cancelling the registration.
B. His data will be deleted after 30 days since it is a digital footprint.
C. His data will never be deleted since it became the digital footprint.
D. As per the terms and condition of that website, data will be deleted.
Ans C
29 | P a g e
Q.20: In case (5), he may be violating:
A. copyright B. Intellectual property right
C. plagiarism D. None of the above
Ans A
Q. 21:
Statement A : pandas is an open source Python library which offers high performance, easy-to-use data
structures and data analysis tools.
Statement B : Professionals and developers are using the pandas library in data science and machine learning.
a. Both statements are correct.
b. Both statements are incorrect.
c. Statement A is correct, but Statement B is incorrect
d. Statement A is incorrect, but Statement B is correct
Ans A
Q. 22:
Statement A : Data visualization refers to the graphical representation of information and data using visual
elements like charts, graphs and maps etc.
Statement B : To install matplotlib library we can use the command
pip install matplotlib.
a. Both statements are correct.
b. Both statements are incorrect.
c. Statement A is correct, but Statement B is incorrect
d. Statement A is incorrect, but Statement B is correct
Ans A
Q. 23:
Statement A : Digital footprint is the trail of data we leave behind when we visit any website (or use any online
application or portal) to fill-in data or perform any transaction.
Statement B : While online, all of us need to be aware of how to conduct ourselves, how best to relate with
others and what ethics, morals and values to maintain.
a. Both statements are correct.
b. Both statements are incorrect.
c. Statement A is correct, but Statement B is incorrect
d. Statement A is incorrect, but Statement B is correct
Ans A
Q. 24:
Statement A : An Internet troll is a person who deliberately sows discord on the Internet by
starting quarrels or upsetting people.
Statement B : We can download and use any material available on the Internet.
a. Both statements are correct.
b. Both statements are incorrect.
c. Statement A is correct, but Statement B is incorrect
d. Statement A is incorrect, but Statement B is correct
Ans C
Q. 25:
Statement A : Social media are websites or applications that enable their users to participate in social
networking but they cannot create and share content with others in the community.
Statement B : We should not waste precious time in responding to unnecessary emails or comments unless
they have some relevance for us.
a. Both statements are correct. b. Both statements are incorrect
c. Statement A is correct, but Statement B is incorrect
d. Statement A is incorrect, but Statement B is correct Ans D
30 | P a g e
Q.No Marks
1. Ms. Hanu is a young girl who is on internet and social media. We need to help her to understand the
netiquettes to be followed. Answer the following regarding this.
i) While creating a password for her mail which of the following is need to be strictly prohibited 1
a) Using names and date of birth in the password
b) Using mixture of Capital letters, numbers and special characters
c) Use passwords of at least eight characters or more
d) A strong password should look like a series of random characters.
Ans. a)
ii) Which of the following is suggested while browsing internet? 1
a) Don’t click on unknown links
b) Don’t save passwords
c) Don’t share personal information
d) All the above
Ans. d)
iii) Which of the following can be called as cyber-crime? 1
a) Stealing someone’s computer
b) Harassing someone over internet
c) Downloading copyright free movies over internet
d) Sending emails to known people
Ans. b)
iv) To avoid Digital footprint she should keep track of ______ 1
a) Sites you visit
b) links you click
c) Browser history
d) All the above
Ans. d)
2. Ms. Anu has invented a software to help blind people to read the books. But she is unaware of how
to acquire ownership on the product. Answer the following to help her understand the basics of
Intellectual Property Rights (IPR)
i) A person who is authorized keep or transfer rights to use/distribute the software is known as _____ 1
a) Trademark
b) Patent
c) Copyright holder
d) Plagiarism
Ans. c)
ii) ____ gives you right to exclude others from making, selling, using or importing a particular product 1
or service.
a) Trademark
b) Patent
c) Copyright
d) Plagiarism
Ans. b)
iii) A symbol, word, phrase, sound, color and design that is used to identify a product or an organization 1
is ________
a) Trademark
b) Patent
c) Copyright
d) Plagiarism
Ans. a)
31 | P a g e
iv) If Anu decides that her software should be available for free and the code to be open for all, it is 1
called as _________
a) Proprietary software
b) Free and open source software
c) Free software
d) None of the above Ans. b)
v) Suggest any one licensing organization to provide license to the software developed by Anu. 1
a) GNU Lesser
b) IEEE
c) ISI
d) ISO
Ans. a)
vi) FLOSS stands for ________________ 1
a) Free Liable Open Source Systems
b) Free Libre Open Source Software
c) Free License for Open Source Software
d) Final License for Open Systems Software
Ans. b)
3. i) Mr. JK is writing a document on Cyber Crime. While writing he came to know about Plagiarism. 1
Which of the following statements is/are true.
Statement I: Plagiarism is using someone’s work and not giving credit for it
Statement II: Plagiarism is entering into someone’s computer to steal data
Statement III: Plagiarism is Criminal offence
a) Statement I only True
b) Both Statements I and III are True
c) Statement II and III are False
d) Statements I, II, III are True
Ans. b)
ii) To maintain Internet etiquette choose from the following options: 1
Statement I: Use respectful language over chatting etc.,
Statement II: Share others personal information and photos
Statement III: Fact check before reposting anything
Statement IV: Never spam (Don’t post something repeatedly)
a) Statements I and II only True
b) Statement III only True
c) Statements I, III and IV are True
d) Statements I, II are False
Ans. c)
Iii) Mr. Vasu has designed a Open source software which must comply with some criteria. Choose right 1
statement in respect of above.
Statement I: No restriction on re-distribution of the software as a part or whole
Statement II: The integrity of the Author’s source code must be maintained
Statement III: The software can be sold after distribution
a) Statement I is False
b) Statements I and II are True
c) Statements II and III are True
d) Statements I, II and III are True
Ans. b)
32 | P a g e
4 Choose from the following to help Mr. Vasu to understand about Cyber Security
i) Which of the following is True. 1
Statement I: Phishing is catching fish in a game
Statement II: Phishing is sending an email or text message sent to steal user’s information such as
Credit card data, Login credentials, Personal information
Statement III: Phishing need not be targeted to a specific person or organization
a) Statement I and II are only True
b) Statement II only True
c) Statements III only True
d) Statements I, II and III are all True
Ans. b)
II) FSF Stands for__________ 1
a) Free Software Foundation
b) Free System Formation
c) Final Software Freeware
d) Final System Formation
Ans. a)
5. Ms. Anu who was browsing through a computer, and was hacked. Now she is investigating what
might have happened. Answer the following to give her better understanding.
i) Which of the following statements are true. 1
Statement I: Digital foot print is created due to sending emails, posting on social media etc.,
Statement II: Digital foot print is the one which follow your physical actions
Statement III: Digital foot print lasts forever.
a) Statement I only true
b) Statements I & III are true
c) Statement II only true
d) All are true
Ans. B)
ii) Which of the following is true? 1
Statement I: Hacking is compromising security on digital devices
Statement II: Hacking is unauthorized copying of someone’s literary work
Statement III: Browser hijack is one type of Hacking
Statement IV: Hacking involves stealing password and other digital information
a) Statement I only true
b) Statements I & II are true
c) Statement II only true
d) Statements I, III, and IV are True
Ans. d)
iii) Which of the following is true? 1
Statement I: Firewall protects from unauthorized incoming traffic
Statement II: Firewall can be implemented as both Software and Hardware
Statement III: Firewall grants access to work with a device
a) Statement I and II are only True
b) Statement II is only True
c) Statement I is only True
d) Statements I, II and III are True
Ans. a)
1
33 | P a g e
iv) Which of the following is True in case of Cyber stalkers
Statement I: Cyber stalkers collect all personal information of the victim
Statement II: Cyber stalkers keep on sending emails to threaten the victim
Statement III: Cyber stalkers are people who save us from hackers
Statement IV: Cyber stalkers post the email of victim on numerous filthy, obscene or illegal websites
a) Statements I, II are True
b) Statements I is only True
c) Statements I, II and IV are True
d) None of the above are True
Ans. c)
v) Which of the following is true in case of Child Pornography 1
Statement I: Images/movies or texts that depicts sexual activity of anyone under 18 years of age is
Child pornography
Statement II: IT ACT 2000 does not protect from Child Pornography
Statement III: IT ACT section 67 is amended that browsing sites of Child Pornography is also an
offence
a) Statements I and III are True
b) Statement II is only True
c) Statement III is only True
d) Statements II and III are True
Ans. a)
34 | P a g e
05. The practice of sending fraudulent communications that appear to come from a reputable source. It is usually
done through email. The goal is to steal sensitive data like credit card and login information.
a. Bullying
b. Plagiarism
c. Phishing.
d. Licensing
06. Electronic products that are unwanted, not working, and nearing or at the end of their “useful life.”, known as
a. Computer Waste
b. E- Waste
c. Biological Waste
d. Chemical waste.
07. Which of the following comes under cyber crime?
a. Theft of a brand new sealed Laptop
b. Access to a bank account for an unauthorized money transaction
c. Modification in a company’s data with unauthorized access.
d. Photocopying a printed report.
08. Which is not a measure to recycle your e- waste safely.
a. Use certified e-waste recycler
b. Visit Civic institutions for recycling options.
c. Through it in water or dig them in earth.
d. Donate your electronics.
09. ________________ is an electronic discovery technique used to determine and reveal technical criminal
evidence.
a). Cyber forensics
b).. Auction Fraud
c) Identity theft
d) . Spoofing
10. Open source S/w out of the following.
a. Python
b. MS office
c. Windows
d. Kaspersk
Q11.
Statement 1: Digital footprint can be created and used with or without our knowledge
Statement 2:Whenever we surf the Internet using smartphones, tablets, computers, etc., we leave
a trail of data reflecting the activities performed by us online, which is our digital footprint
A) Both Statement 1 and 2 are True
B) Statement 1 is True but Statement 2 is False
C) Both Statement 1 and 2 are False
D) Statement 1 is False but Statement 2 is True
Q12.
Statement 1:The data taken from a digital footprint can be used for Hacking
Statement 2: Through Digital foot prints we leave our personnel signatures in websites.
A) Both Statement 1 and 2 are True
B) Statement 1 is True but Statement 2 is False
C) Both Statement 1 and 2 are False
D) Statement 1 is False but Statement 2 is True
35 | P a g e
Q13.
Statement 1: There are two kinds of digital footprints we leave behind when we use websites.
Statement 2: Active digital footprints which includes data that we intentionally submit online.
passive digital footprints are the digital data trail we leave online unintentionally.
A) Both Statement 1 and 2 are True
B) Statement 1 is True but Statement 2 is False
C) Both Statement 1 and 2 are False
D) Statement 1 is False but Statement 2 is True
Q14.
Statement 1: Everyone who is connected to the Internet may not have a digital footprint.
Statement 2: As digital footprint will be saved in the Download folder.
A) Both Statement 1 and 2 are True
B) Statement 1 is True but Statement 2 is False
C) Both Statement 1 and 2 are False
D) Statement 1 is False but Statement 2 is True
Q15.
Statement 1: our society is inclined towards using more and more digital technologies, we end
up managing most of our tasks digitally.
Statement 2:In this era of digital society, our daily activities like communication, social
networking, banking, shopping, entertainment, education, transportation, etc., are increasingly
being driven by online transactions.
A) Both Statement 1 and 2 are True
B) Statement 1 is True but Statement 2 is False
C) Both Statement 1 and 2 are False
D) Statement 1 is False but Statement 2 is True
SECTION C( Q NO 16 TO 20)
Case based Questions :Section B
Shreya is studying in class 12 in KV No1 Vijayawada. Due to pandemic she was unable to come
to Vodyalaya physically. To attend the online classes her father has given his mobile phone to
her with Internet connection.. Her father is a bank employee and used to his online transactions
through the same mobile. After started using the smart phone and with Internet connection Shreya
started creating her own accounts in different social web sites by using the same mail ID , which
is used for Online classes. She has created her new login accounts in Face book , Twitter etc .with
same Email Id , which she has to use for her Vidyalaya exams also. She use to upload her
personnel photos in Social media and never log out from the social websites.She use to keep same
password for all her Login IDs to remember easily. She use to Post and comment on Social web
sites and after some time she use to remove it. Through out the day time she use to use her fathers
Smart phone and during night times her father is using the same mobile for his office
Transactions.
36 | P a g e
16. Which type of Digital Footprints Shreya is leaving in Websites.
A. Active Digital Foot prints.
B. Passive Digital Foot prints.
C. both of them .
D. None of the above.
18. What are the etiquettes to create a safe pass word for Online sites.
A. Choose password wisely it should be the combination of Capital, small letters , numbers
and special characters .
B. Keep the same password for all the Logins.
C. Don’t change the password regularly.
D. Share your password to your near ones.
19. Shreya is getting repeated mails from unknown people. Everytime she goes online, he finds
someone chasing him online.,Shreya is a victim of …………. :
A. Eavesdropping
B. Stolen identity
C. Phishing
D. Cyber stalking
-----------------------------------------------------------X-------------------------------------------
37 | P a g e
MARKING SCHEME:
XIII IP
Q SECTION : A Q SECTION: B SECTION: C
NO. NO Q11TO 15 Q16 TO 20
1 d). All of the above 11 A) Both Statement 1 and 2 are
True
2 d) unauthorized access 12 B) Statement 1 is True but
Statement 2 is False
3 a. Plagiarism 13 A) Both Statement 1 and 2 are
True
4 b. Open Source S/W 14 C) Both Statement 1 and 2 are
False
5 c. Phishing. 15 A) Both Statement 1 and 2 are
True
6 c. Phishing. 16 B). Passive Digital Foot prints.
38 | P a g e
Prepared by: B Sreenivasa Rao
Answer: c
2. Assertion(A): Open source software source code is available and the user can make modifications as
per their need
Reason(R) : Sometimes you need to make payments for open source Software
Answer: a
Answer: a
4. Assertion(A): Permission given to use a product by the copyright holder is License
Reason(R) : One should not use the copyrighted product without taking license
Answer: a
39 | P a g e
5. Assertion(A): FSF is Non-Profit organisation to support free software development
Reason(R) : FSF supports open software development also
Answer: a
Answer: b
9. Assertion(A): The act of presenting someone else’s work or idea as your own is Plagiarism
Reason( R): Accessing someone’s information without their permission is Plagiarism
Answer: c
40 | P a g e
10. Assertion(A): Trademark generally protect logos, names and brands
Reason(R) : Plagiarism is unethical because it is a form of theft
Answer: a
CASE STUDY-1:
A School has taken 5 different software’s for school management. The First software is available for free of
cost and can be distributed any no of copies. For second software school has paid some money, in third
software if necessary school can make some modifications if necessary and it may not be free, fourth software
is freely available up to stipulated time after certain period school has to make payments and in Fifth Software
school can make some modifications for free of cost.
11. First software is an example of
a. Open Source b. Proprietary c. Free Software d. FLOSS
Answer: c
12. Second software is an example of
a. Open Source b. Proprietary c. Free Software d. Shareware
Answer: b
13. Third software is an example of
a. Shareware b. Proprietary c. Free Software d. FLOSS
Answer: b
14. Fourth software is an example of
a. Open Source b. Shareware c. Free Software d. FLOSS
Answer: b
15. Fifth software is an example of
a. Open Source b. Shareware c. Freeware d. FLOSS
Answer: d
CASE STUDY-2:
In a school five students are doing different projects. Anil has done the project simply by copying
someone’s work and submitted as his own work. Kumar did all his work by using his own ideas & created
new concept. While doing his work Ravi used someone’s copyrighted material without their permission.
Tarun has invented a new concept and applied for rights to the government. Ramesh has designed a new
logo for his organisation.
16. What type of rights KUMAR gets automatically
a. Patent b. Copyright c. Plagiarism d. Ownership
Answer: b
41 | P a g e
17. What type of offence ANIL did ?
a. Copyright Infringement b. Copyright c. Plagiarism d. Ownership
Answer: c
18. What type of offence RAVI did ?
a. Copyright Infringement b. Copyright c. Plagiarism d. Ownership
Answer: a
19. Which type of rights TARUN will get from government?
a. Trademark b. Copyright c. Patent d. Ownership
Answer: c
20. What type of work RAMESH did for his organisation?
a. Trademark b. Copyright c. Patent d. Ownership
Answer: a
42 | P a g e
7. The ____________ has issued guidelines for the proper handling and disposal of e-waste.
(a) central pollution control board
(b) central e waste management board
(c)waste management and maintenance authority
(d)all of the above
8. Which of the following reduces e-waste?
(a) purchasing more and more gadgets
(b) using them for a short time and then discarded
(c)good maintenance
(d) all of these
9. The plastic used in the electronic gadgets causes
(a) skin disease or allergies or increase the risk of lung cancer
(b) damages the immune system of the body and leads to stress and anxiety
(c)neurological disorders
(d)damage live and bones
10. The insulated wire has copper which causes ____________
(a) skin disease or allergies or increase the risk of lung cancer
(b) can damage human’s kidney, brain and human nervous system
(c)neurological disorders
(d) damage liver and bones
PART-B
1.While sitting in front of a computer always keep in mind
(a) Always take care of viewing distance and viewing angle
(b) Knee Angle and Seat Back angle should be a 90-degree angle
(c) The right position should be straight and with a 90 degree
(d) ALL OF THE ABOVE
2. Which of the following is feasible method to manage e- waste?
a) Reduce b) Reuse c) Recycle d) All the above
3. Which of the following is the effect of mismanaged e-waste
a) Global warming b) Air pollution c) Sea Pollution d) All the above
4.Which of the following are not contributors of e-waste in the world?
a) Refrigerators/freezers, washing machines, dishwashers
b) Personal computers, mobile phones
c) Gas cylinder
d) Televisions
5.Which of the following is relavant to E-waste?
(a). E-waste is a popular, informal name for electronic products nearing the end of their "useful life.
(b). Computers, televisions, VCRs, stereos, copiers, and fax machines are common electronic products.
(c). Both a and b
(d). None of the above
6.The cadmium used in semiconductors and registers can damage a human’s
a). kidney, heart
b) Liver, bones & kidney
c) Neurological system
d) Human eyes
7.Who is responsible for the disposal of the product when it becomes e-waste?
a) The sellers
b) the producers
c) the customers
d) the vendors
43 | P a g e
8. Which department has issued a comprehensive technical guide on “Environmental Management for
Information Technology Industry in India.
a) Department of Information Technology (DIT)
b) Department of Education
c) Department of Telecommunications
d) Department of Science & Technology
9. Management of E-Waste includes
I. Reduce the purchase of electronic devices
II. The discarded devices can be supplied or sold to someone who can use them
III. The e-waste which cannot be recycled can be repaired, refurbished or re-used.
A. Only I & III is correct
B. Only II & I is correct
C. Only I, II & III is correct
D. None of the above is correct
10.The techniques used in India for E-waste management?
I. According to Environmental Protection Act, 1986, anyone causing the pollution will pay for the damage
caused.
II. The Central Pollution Control Board issues the guideline for proper disposal of E-Waste.
III. The guideline says that the manufacturer of the product will be responsible for the disposal of the product
when it becomes e-waste.
A. ONLY I is correct
B. ONLY II is correct
C. BOTH I, II & III CORRECT
D. ONLY III is correct
45 | P a g e
Question 6:
Given below are two statements- one is labelled as Assertion (A) and another are labelled as Reason(R):
Assertion (A): apple symbol in IOS software will come under a registered trademark.
Reason(R): Trademark includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the
brand or commercial enterprise, from other brands or commercial enterprises.
(1)Both (A) and (R) are true and (R) is the correct explanation of (A)
(2) Both (A) and (R) are true and (R) is not the correct explanation of (A)
(3) (A) is true. (R) Is False
(4) (A) is False. (R) Is True
Answer is: (1)
Question 7:
Given below are two statements- one is labelled as Assertion (A) and another are labelled as Reason(R):
Assertion (A): Plagiarism is Presenting someone else’s idea or work as one’s own idea or work.
Reason(R): Plagiarism is the one of the way of violation of intellectual property rights (IPR).
(1)Both (A) and (R) are true and (R) is the correct explanation of (A)
(2) Both (A) and (R) are true and (R) is not the correct explanation of (A)
(3) (A) is true. (R) Is False
(4) (A) is False. (R) Is True
Answer is: (2)
Question 8:
Given below are two statements- one is labelled as Assertion (A) and another are labelled as Reason(R):
Assertion (A): Users or companies who distribute GPL license works may charge a fee for copies or give them
free of charge.
Reason(R): The GNU General public license (GPL) is a popular category of public licenses.
(1)Both (A) and (R) are true and (R) is the correct explanation of (A)
(2) Both (A) and (R) are true and (R) is not the correct explanation of (A)
(3) (A) is true. (R) Is False
(4) (A) is False. (R) Is True
Answer is: (1)
46 | P a g e
Question 9:
Given below are two statements- one is labelled as Assertion (A) and another are labelled as Reason(R):
Assertion (A): XYZ company making copies of the new movie DVD and send selling the copies without movie
producer’s permissions. XYZ Company was seized by the cyber police on complaint given by movie producer.
Reason(R): piracy of the content comes under cyber crime.
(1)Both (A) and (R) are true and (R) is the correct explanation of (A)
(2) Both (A) and (R) are true and (R) is not the correct explanation of (A)
(3) (A) is true. (R) Is False
(4) (A) is False. (R) Is True
Answer is: (1)
Question 10:
Given below are two statements- one is labelled as Assertion (A) and another are labelled as Reason(R):
Assertion (A): Free and open source software (FOSS) has a large community of users and developers who are
contributing continuously towards adding new features or improving the existing features.
Reason(R): Windows operating system comes under FOSS.
(1)Both (A) and (R) are true and (R) is the correct explanation of (A)
(2) Both (A) and (R) are true and (R) is not the correct explanation of (A)
(3) (A) is true. (R) Is False
(4) (A) is False. (R) Is True
Answer is: (3)
Case based Questions:
XYZ Company developed software, related to face recognition with a team of 15 software developers. XYZ
company Registered the software with a face symbol to easily recognize their software. Before approval of
software by the registering firm, Rohit one of the team member of the software published the same software in
internet under different name as it is his own development.XYZ firm recognized this activity and informed to the
police. The police people arrested the Rohit and removed the software from the internet. Police advice the XYZ
firm to apply for patent as the software is a new invention.
11. XYZ firm registered the software with face symbol to easily recognize their software .in this context face
symbol is called
(1) Copyright (2) IPR (3) Trademark (4) None of the above
Answer is: (3)
12 .The activities done by the Rohit is called as
(1) Plagiarism (2) copyright Infringement (3) Trademark Infringement (4) None of the above
Answer is: (1)
13. among the following options which is automatically granted to XYZ Company
(1)Trade mark (2) patent (3) Copyright (4) None of the above
Answer is 3:
14. Rohit activity comes under
(1) Hate Crime (2) Cyber crime (3) Fraud (4) none of the above
Answer is 2.
47 | P a g e
15. Patents are valid for how many years.
(1)10 (2) 12 (3)15 (4) 20
Answer is: 4
General MCQs
16. Match the following:
Column A Column B
(a)Plagiarism (i)Fakers, by offering special rewards or money prize asked for personal information,
such as bank account information
(b) Hacking (ii)Copy and paste information from the Internet into your report and then organise it
(c) Credit card (iii)The trail that is created when a person uses the Internet.
fraud
(d) Digital Foot (iv)Breaking into computers to read private emails and other files
Print
(1) a-i,b-iii,c-ii,d-iv
(2) a-ii,b-iii,c-i,d-iv
(3) a-ii,b-iv,c-i,d-iii
(4) a-ii,b-iii,c-iv,d-i
Answer is: 3
17. Intellectual Property is legally protected through
(1) Copyrights (2) patents (3) trademarks (4) All the above
Answer is: 4
18. Violation of intellectual property right may happen by
(1) Plagiarism (2) Copyright Infringement (3) Trademark Infringement (4) All the above
Answer is: 4
19. Which of the following Operating systems does not comes under FOSS
(1) Ubuntu (2) Fedora (3) Mac OS (4) Bharat OS
Answer is: 3
20. GPL is
(1) Government public license (2) Green public license (3) General public license (4) General Private license
Answer is: 3
48 | P a g e
Name of the teacher prepared: K KARUN PGT CS,KV KURNOOL
Name of the Teacher vetted: T SREENIVASA RAO ,PGT CS,K V WALTAIR VISAKHAPATNAM
Question no . 3
Assertion (A) : import pandas as pd is used to import pandas library.
Reason (R) : It is a python library so it is to be imported for using its function.
(A) Both A and R are true and R is the correct explanation of A.
(B) Both A and R are true and R is not the correct explanation of A.
(C) A is true but R is false.
(D) A is false but R is true.
(E) Both A and R are false.
Question no . 4
Assertion (A) : Elements of Series can be accessed using positional index.
Reason (R) : positional index values ranges from 1 to n if n is the size of the series.
(A) Both A and R are true and R is the correct explanation of A.
(B) Both A and R are true and R is not the correct explanation of A.
(C) A is true but R is false.
(D) A is false but R is true.
(E) Both A and R are false.
Question no . 5
Assertion (A) : Dictionaries cannot be used to create a Series object.
Reason (R) : Dictionaries have key,value pairs and Series is a one dimensional data structure.
(A) Both A and R are true and R is the correct explanation of A.
(B) Both A and R are true and R is not the correct explanation of A.
(C) A is true but R is false.
(D) A is false but R is true.
(E) Both A and R are false.
49 | P a g e
Question no . 6
Assertion (A) : We cannot access more than one element of Series without slicing .
Reason (R) :More than one element of series can be accessed using a list of positional index or labeled index.
(A) Both A and R are true and R is the correct explanation of A.
(B) Both A and R are true and R is not the correct explanation of A.
(C) A is true but R is false.
(D) A is false but R is true.
(E) Both A and R are false.
Question no . 7
Assertion (A) : We cannot modify the values of Series elements once created .
Reason (R) : Series is an immutable object.
(A) Both A and R are true and R is the correct explanation of A.
(B) Both A and R are true and R is not the correct explanation of A.
(C) A is true but R is false.
(D) A is false but R is true.
(E) Both A and R are false.
Question no . 8
Assertion (A) : size attribute of Series objects returns length of series .
Reason (R) : count() will ignore the nan values in returning the output.
(A) Both A and R are true and R is the correct explanation of A.
(B) Both A and R are true and R is not the correct explanation of A.
(C) A is true but R is false.
(D) A is false but R is true.
(E) Both A and R are false.
Question no . 9
Assertion (A) : We can add two series objects using addition operator(+) or calling explicit function add() .
Reason (R) : While adding two series objects index matching is implemented and missing values are filled with NaN by
default.
(A) Both A and R are true and R is the correct explanation of A.
(B) Both A and R are true and R is not the correct explanation of A.
(C) A is true but R is false.
(D) A is false but R is true.
(E) Both A and R are false.
Question no . 10
Assertion (A) : We can perform mathematical operations on two series objects of different size but not on two 1 D
arrays of different size.
Reason (R) : if two series are not aligned NaN are generated but in case of arrays no concept of NaN and hence
operations fail to perform.
(A) Both A and R are true and R is the correct explanation of A.
(B) Both A and R are true and R is not the correct explanation of A.
(C) A is true but R is false.
(D) A is false but R is true.
(E) Both A and R are false.
50 | P a g e
PART 2 –CASE BASED QUESTIONS
Consider the following two series objects S1 , S2
0 10 a5
1 18 b6
A 1002
B 545
C 688
D 2091
E 1428
51 | P a g e
13. How can he display the largest value for a given Series ‘S’.
(A) print(S.sort_values(head(1)) )
(B) print(S.sort_values.head(1))
(C) print(S.sort_values().tail(1))
(D) print(S.sort_values().tail())
14. How can he rename the index of the above Series ‘S’.
(A) S.rename(index=[‘a’,’b’,’c’,’d’,’e’])
(B) S.renameindex=[‘a’,’b’,’c’,’d’,’e’]
(C) S.index=[‘a’,’b’,’c’,’d’,’e’]
(D) S.index(=[‘a’,’b’,’c’,’d’,’e’])
52 | P a g e
Consider the following Series ‘S’ and answer the questions below
0 8
1 4
2 12
3 16
4 15
19. What will be the correct command to display the following elements of ‘S’.
0 8
2 12
4 15
(A) print(S[S%2==0])
(B) print(S[::2])
(C) print(S[S.index%2==0])
(D) Both C and B
20. How can we create a Series S1 based on S with all its elements doubled.
(A) S1=pd.Series(S*2)
(B) S1=pd.Series(data=S*2)
(C) S1=S*2
(D) All of the above
KEY
QNO ANSWER QNO ANSWER
1 A 11 A
2 C 12 B
3 A 13 C
4 C 14 C
5 D 15 C
6 D 16 C
7 E 17 C
8 B 18 A
9 A 19 D
10 A 20 D
53 | P a g e
Name of the teacher prepared: Deep Narayan Singh (PGT CS KV KMM)
Name of the Teacher vetted: B Srinivasa Rao (PGT CS)
[DATA VISUALIZATION]
Q1. Statement (A): In Python, Exclusive libraries can be used for graphical or visual Ans
representation of information and data using elements like charts, graphs and maps etc.
Statement (B): Matplotlib is a python package for 2D plotting that generates production
quality graphs.
1. Statement A is correct. 4
2. Statement B is correct.
3. Statement A is correct, but Statement B is incorrect.
4. Both Statement A and B is correct.
Q2. Statement (A): program to plot a quadratic equation using dashed line chart: -
Statement (B): ‘b--’ argument in plot function denotes that the line which will be displayed
shall be of dashed type with blue colour.
1. Statement A is correct. 4
2. Statement B is correct.
3. Statement A is correct, but Statement B is incorrect.
4. Both Statement A and B is correct.
Q3. Statement (A): A Matplotlib figure can be categories into several parts as Axis, Artist,
Labels, Title and Legend etc.
Statement (B): Data is only as good as it is represented.
1. Statement A is correct. 4
2. Statement B is correct.
3. Statement A is correct, but Statement B is incorrect.
4. Both Statement A and B is correct.
Q4. Statement (A): A bar chart represents categorical data with rectangular bars.
Statement (B): It is an accurate graphical representation of the distribution of numerical data.
1. Statement A is correct. 3
2. Statement B is correct.
3. Statement A is correct, but Statement B is incorrect.
4. Both Statement A and B is correct.
Q5. Statement (A): Bin are usually represented using rectangular bars with the length
proportional to the values that they represent.
Statement (B): They show what portion of the dataset falls into each category.
1. Statement A is correct. 4
2. Statement B is correct.
3. Statement A is correct, but Statement B is incorrect.
4. Statement A is incorrect, but Statement B is correct
54 | P a g e
Q6. Statement (A): The active figure can be saved to file using plt.savefig() method.
Statement (B): The histogram created can not be saved through the GUI Panel.
1. Statement A is correct. 3
2. Statement B is correct.
3. Statement A is correct, but Statement B is incorrect.
4. Statement A is incorrect, but Statement B is correct
Q7. Statement (A): A line chart displays information as many series of data points called
“Markers” connected by straight line segments.
Statement (B): plot (), can not plot multiple lines in the same plot with different colour by
default.
1. Statement A is correct. 3
2. Statement B is correct.
3. Statement A is correct, but Statement B is incorrect.
4. Statement A is incorrect, but Statement B is correct
Q8. Statement (A): This code will output chart with four bars
Statement (B): Data_std array and bins are of same size in the argument of hist() function.
1. Statement A is correct. 4
2. Statement B is correct.
3. Statement A is correct, but Statement B is incorrect.
4. Statement A is incorrect, but Statement B is correct
Q10. Statement (A): Matplotlib allows us to use different line style and colours.
Statement (B): we specify colour and line style as the first argument of plot () function.
1. Statement A is correct. 3
2. Statement B is correct.
3. Statement A is correct, but Statement B is incorrect.
4. Statement A is incorrect, but Statement B is correct
55 | P a g e
CASE STUDY BASED QUESTIONS [DATA VISUALIZATION]
Q. Ans
No.
1 Data visualization tools provide an accessible way to see and understand……………….in d
data.
a) Trends b) Outliers c) Patterns d) All of these
2 Which Python library programmer can use to create chart? a
a) pyplot b) pandas c) numpy d) None of these
3 A chart created using python library can be exported to image form or not? a
a) Yes b) No
4 Can the same data series be used to draw multiple charts? a
a) Yes B) No
5 If manager asks to create a chart with explode feature, which chart can be created by c
programmer in that case?
a) Bar Graph b) Line Chart c) Pie Chart d) All of these
6 Which of the following method can be used to plot a Pie chart of the given case? b
a) Pl. Plot() b) Pl. Pie() c) Pl. Chart() d) Pl. Disc ()
7 Which of the following function can be used to set the title of the pie chart? c
a) plt. set Title() b) plt. heading() c) plt. title() d) none of these
8 School have 6 sections in Class XI Namely A, B, C, D, E and F. Students have voluntarily a
decided to collect amount section wise separately. Amounts collected by sections A to F are
5000, 6000, 5600, 7000, 6500 and 4900. Which of the data types can be used to arrange the
collection amount and sections to be used with plotting function
a) list b) dictionary c) stack d) none of these
9 Which of the following method can be used to add formatted slice percentage to Pie Chart? a
a) autopct b) slice c) labels d) colors
10 Which attribute of Pie chart is used to set the color of each slice? b
a) color b) colors c. cols d. autocolor
Ans)
(i) Cyber Bullying
(ii) Phishing
(iii) Cyber Trolls
(iv) Identity Theft
(v) Hacking
CASE STUDY BASED QUESTIONS [Cyber Security]
12. Mr. Vinod is the administrator of a school computer network. Help him to take appropriate decision 5
to achieve computer security and safe online access.
(i) Suggest a device to be used to filter network traffic to/from school network to provide
network security
(ii) Which software he can use to get protection from Viruses and Spyware
(iii) Tell him what he has to disable if possible in browser so that online patterns are not
tracked
(iv) Suggest an active protection mechanism so that he can find a solution to spam
(v) Suggest one active protection solution to PC Intrusion
Ans)
(i) Firewall
(ii) Anti-Virus and Anti-Spyware software
(iii) Cookies
(iv) Anti-Spam software
(v) Authorization/Authentication/Firewall
58 | P a g e
59 | P a g e