0% found this document useful (0 votes)
32 views

Https App.oswaalbooks.com Download Sample-qp Subsolution i1664604573lOswaal CBSE Class-11 Computer Science Self Assessment Paper-2

Uploaded by

parularthi3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

Https App.oswaalbooks.com Download Sample-qp Subsolution i1664604573lOswaal CBSE Class-11 Computer Science Self Assessment Paper-2

Uploaded by

parularthi3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

SOLUTIONS

Self Assessment Paper-2


Computer Science

1. (a) Option (C) is correct.  [1]


Explanation: A device driver is a special kind of software program that controls a specific hardware device
attached to a computer.
(b) False [1]
(c) Option (A) is correct.  [1]
Explanation: AttributeError: Raised in case of failure of attribute reference or assignment.
(d) Option (B) is correct.  [1]
(e) False [1]
(f) print() communicates the program’s result to the end user. It evaluates the expression before printing it on
the monitor. [2]
  print() moves to the next line after printing one statement.
   >>> print( 4+6)
    10
To print in the same line we can use comma’s eg. print (“I”, “Love”, “Python”)
Output
I Love Python
(g) A spyware is a software installed in a target computer to monitor its user’s data, computing habits and
keystrokes. As the user enters some personal information on his computer, the keystrokes are recorded and
sent to the cyber thief. This cyber thief in turn sells this information to someone else or uses it himself to
steal the identity of the user [2]
(h) 1. Option (B) is correct.
Explanation: len() function returns the number of items in an object. When the object is a string, the
len() function returns the number of characters in the string.
2. Option (A) is correct.
3. Option (D) is correct.
Explanation: Concept of slicing is used in this question. In string slicing,the output is the substring
starting from the first given index position i.e 2 to one less than the second given index position i.e.
(8-1=7) of the given string str1.
4. Option (B) is correct.
Explanation: Strings are immutable. So, new values cannot be assigned at any index position in a
string.
5. Option (B) is correct. [5]
2. (a) True [1]
(b) Option (B) is correct. [1]
(c) Output: True [2]
(d) The two reasons for technology being out of reach of many are:
1. Gender issues- both genders are not given equal opportunities to learn technology.
2. Specially abeled people are not able to learn technology due to lack of special aids and teachers for
them. [2]
(e) (i)  If X, Y = 25, 50 then the statement print(X, Y) will print result as 25 50. Now if you want to
swap values of X and Y, just need to write: X, Y = Y, X print(X, Y). Thus, now the result will
be 50 25. [2]
(ii)  Python is a Cross- platform language as it can run equally on variety of platforms like
Windows, Linux, Unix, Smart Phones etc. [1]
(iii) print(“Hello”) [1]
2 OSWAAL CBSE Sample Question Papers, COMPUTER SCIENCE, Class-XI

3. (a) bool [1]


(b) A word processor is used to type in text and enhance its usefulness using the following features.
(i) Word processors provide variety of fonts and print styles.
(ii) Information can be saved for later use
(iii) A Document can be formatted in various styles to improve its looks and presentation .
(iv) We can edit and check our document for spelling and grammatical errors.
(v) Changes made in the document can be tracked.
(vi) Mail merge can be used to send copies of the same mail to multiple recipients with little or
no change. [2]
(c) (i) [2]
1.  Digital certificates are specially formatted digital information issued to website. It is used to
verify the identity of the message sender.
2.  Digital signatures are a way of authenticating the identity of digital information sender filtering
is done on the basis of digital certificates and digital signatures.
(ii) Ways to prevent phishing: [1]
1.  Don‘t open emails from unknown sources or click on links embedded in suspect messages
2. Check the security guidelines of website .
4. (a) True [1]
(b) The corrected statements are: [2]
(a) list1 = [55]
(b) list2 = [4,5,6,7,8,9]
(c) i. Debugging is the process of finding errors in a program. [1]
ii. Pdb [1]
iii. Exception is an error that occurs during execution of a program. [1]
iv. only one. [1]

5. (a)
Start
[3]

Input A, B, C

s = (a+b+c)/2

½
Area = (s(s-a)(s-b)(s-c))

Print Area

Stop

Commonly Made Error


The student should make use of accurate symbols.

Answering Tip
Area of triangle can be calculated using the formula area= (s.(s-a).(s-b).(s-c)1/2.

(b) Primary-memory or Main-memory is a large array of words or bytes. Each word or byte has its own address.
Main memory provides storage that can be accessed directly by the CPU. That is, to execute a program,
it(program) must be in the main memory. The major activities of an operating system in regard to memory
management are:
1. Keep track of which part of memory are currently being used and by whom.
2. Decide which process are loaded into the memory when memory space becomes available.
3. Allocate and de-allocate memory spaces as needed. [4]
Solutions 3

OR
(i)
Mouse: The mouse is an input device that usually contains one or two buttons. As a user moves the
mouse on a flat surface, the mouse controls the cursor movement on the screen. When the user presses
one of the buttons, the mouse either marks a place on the screen or makes selection from data or menu
on the screen. A mouse has a sphere on its underside. This rotates as the mouse is moved along a flat
surface.
(ii) Trackball: A Trackball is a pointing device almost like a mouse turned upside down. The user controls
the cursor on the screen by rolling a plastic ball with a fingertip or wrist. To execute commands with a
Trackball, one or more buttons are pressed, much in the sa me way as is done with a mouse. The cursor
can be moved around on the screen by rolling the ball with a thumb or finger.
(iii) Scanner: Scanner is an input device. It is also called Optical Reader or Digital Scanner. It scans or reads
text and picture printed on a paper and enters them directly into the computer memory. The advantage
of a scanner is that the user needs not type the input data in. This is a lust and accurate method for
entering data into the computer. The scanner takes electronic images, of text or pictures from the paper
it breaks each image into light and dark dots and stores them into the computer memory in machine
codes. Scanned text can be edited by OCR software. Optical Character Recognition (OCR) software
translates the scanned document into text that can be edited.
(iv) Plotter: Plotter is a special output device, which is used to produce high quality, perfectly proportional
hard copy output. Plotters are designed to produce large drawings or images such as construction
plans for buildings or blue prints for mechanical devices. Plotters have been used in automotive and
aircraft design, topological surveys, architectural layouts and other similar complex drafting jobs.
A plotter is composed of a pen, a move-able carriage, a drum and a holder for chart paper. Both the pen
and the paper can move up and down and back and forth. This permits very detailed drawings. Some
plotter having colored pens can make colored drawings also.
6. (a) name1 = input(“Enter name”) [2]
name2 = input(“Enter name”)
print(“Hello”||, name1)
print (“Hello”||, name2)
(b) The number is being treated as a string. So, if we convert it to integer we will get the desired output.
N = int (input(“Enter number ”)) [2]
S = N*N
print(s)
OR
x = int(input(‘Enter the number of days required by A: ‘))
y = int(input(‘Enter the number of days required by B: ‘))
z = int(input(‘Enter the number of days required by C: ‘))
toget = (x * y * z)/(x*y + y*z + x*z)
days = round(toget,2)
print(‘Total time taken to complete work if A, B and C work together: ‘, days)
 [2]
(c) [1 mark Each]
a. (iii)
b. (i)
c. (v)
d. (ii)
e. (iv)
7. (a) Threat [1]
(b) (i) LinkedIn Facebook [2]
1. LinkedIn is used by professionals. Facebook can be used by anyone above
the age of 13 years.
2. A user can create profiles like resumes User profile of a Facebook gives details
with experience, education and other of personal likings and disliking.
achievements.
4 OSWAAL CBSE Sample Question Papers, COMPUTER SCIENCE, Class-XI

(ii) Some uses of Facebook are: [2]


1. Chat with friends
2. See updates and post from friends
3. Share photos and videos from friends.
4. Share information on your profile page
5. Invite friends to join groups and events
6. Connect with business and celebrities.
7. Connect your account with other sites
OR
PRO or Producer Responsibility Organization has been authorized and financed collectively by producers
to share the responsibility for collection and channelization of e-waste generated from the end-life of
products to ensure environmentally sound management of e-waste.
l It pollutes air through the emission of gases and fumes in the atmosphere.
l It pollutes soil when dumped into the landfills by seeping harmful chemicals into the soil.
l It pollutes the water by releasing the particles into the water of sea, rivers, ponds or lakes.
 [1 MARK FOR PRP AND 1 mark for each correct point]
8. (a) 1. Option (A) is correct.
Explanation: A part of computer system that consists of data on computer instructions is called
software. In simpler terms, software tells a computer how to function.
2. Option (A) is correct.
Explanation: Application software are categories in three parts:
(i) specific purpose application software.
(ii) General purpose Application software.
(iii) Customised application software.
3. Option (D) is correct [3]
Explanation: A loader is the part of an operating system that is responsible for loading programs and
libraries.
(b) (D) all of these [1]
(c) 1. Give back your e-waste to your electronic companies and drop off points
2. Donate your outdated technology
3. Give your electronic waste to a certified e-waste recycler .
9. (a) [2]
(i) Indexing is used to obtain individual items, while slicing is used to obtain a subset of items.
(ii) 
A list is a changeable sequence of values which can be homogenous or heterogeneous indexed by an
integer.
(b) [4]
(i) I am in if
(ii) Not Equal

nnn

You might also like