Class 11 Computer Science Sample Paper

Sample Papers Class 11

We have provided Class 11 Computer Science Sample Paper as per the latest CBSE examination pattern for the current academic year. The following CBSE Sample Papers for Class 11 Computer Science has been prepared based on the guess papers issued recently. Students will be able to practice these papers and get good marks in upcoming Computer Science exams for Class 11.

CBSE Sample Papers for Class 11 Computer Science

Term 2 Sample Papers
Class 11 Computer Science Sample Paper Term 2 With Solutions Set A

Class 11 Computer Science Sample Paper Term 2 With Solutions Set A

1. Suppose that the tuple 
Based on the above information, answer the following questions.
(i) Identify the correct output of the following code.
print (tup1 [2 : 4])
(a) (3, (4, 5))
(b) (2, 3)
(c) (3, (4, 5), 6)
(d) Error   



(ii) Find the value of tup1 [2. 5].
(a) 3
(b) (4, 5)
(c) (7, 8, 9)
(d) Error 



(iii) Choose the correct output for tup1 [9].
(a) 9
(b) 10
(c) (7, 8, 9)
(d) Error 



(iv) Choose the correct output for len (tup1).
(a) 10
(b) 7
(c) 8  
(d) Error 



(v) Identify the output of tup1 [5:].
(a) ((7, 8, 9), 10)
(b) (7, 8, 9, 10)
(c) (6, (7, 8, 9), 10)
(d) Error   



2. What will be the output of the following code?
list1 = [12, 10, 15, 13, 14, 22, 37]
for i in range (0, len (list1)):
if i% 2 ! = 0 :
print (list 1 [i])
Answer: Output

3. What will be the output of the following code ?
num = {}
num [(1, 2, 4)] = 18
num [(4, 2, 1)] = 16
num [ (1, 3)] = 24
sum = 0
for k in num :
sum + = num [k]
print (len (num) + sum)
Or Define the following terms with respect to tuples.
(i) sorted () (ii) reversed ()
(iii) any ()
Answer: Output
Or (i) sorted () is used to sort the given tuple in ascending order. But this method returns the elements in square brackets.
(ii) reversed () allows us to process the items in a sequence in reverse order. It accepts a sequence and returns an iterator.
(iii) any () returns True if atleast one element is present in the tuple, otherwise returns False.

4. Answer the following questions.
(i) t1 = (1, 2, 3, (4, (5, 6)), 7, (8, 9))
(ii) t1 = (4,)
t2 = ()
t = t1 + t2
(iii) t1 = (1, 2, 3, (4, (3, 6)), 3, (8, 3)) t1.count(3)
Or What do you mean by nested dictionary?
Answer: (i) 6 (ii) True (iii) 2
Nested dictionary means putting a dictionary inside another dictionary. Nesting is of great use as kind of information we can model in programs expanded greatly.
Nested_dict = {‘dict A’ : {key1 : value1},
‘dictB’ : {key2: value2}}
Here, Nested_dict is a nested dictionary with the dictionary
dictA and dictB. They are two dictionaries and each having
own key and value.

5. Write any three features to protect of intellectual property rights of individuals.
Answer: The protection of intellectual property right of individuals lead to following features
(i) It encourages people to create new software as well as helps them to improve the existing applications.
(ii) An environment is provided for the innovative thoughts and technologies.
(iii) Provides the assurity of good returns, people and businesses invest in the national economy.

6. How can spyware harm you?
What is open source software? What criteria must be met to be considered as open source software?
Answer: Spyware can harm you in many ways such as
♦ Malware will log your keystrokes.
♦ Steal your passwords.
♦ Observe your browsing choices.
♦ Spawn pop-up windows.
♦ Send your targeted E-mail.
♦ Redirect your web browser to phishing pages.
♦ Report your personal information to distant servers.
♦ Can alter your computer settings (like web browser home
page settings or the placement of your desktop icons).
♦ Can affect the performance of your computer system.
Open source software is any computer software that is distributed with its source code available for modification e.g. Linux, Unix, MySQL, etc.
To be considered as open source software, certain criteria must be met as follows:
Software must be available free or at a low cost.
Source code must be included.
Anyone must be allowed to modify the source code. 

7. Write a program to read a list of n integers. Create two new lists, one having all even numbers and the other having all odd numbers from the given list.
Or Find output of the given Python program to swap keys and values in dictionary.
dict1 = {‘First’: 50,‘Second’: 145,‘Third’: 150,‘Fourth’:170,‘Fifth’:160,‘Sixth’: 75}
d1 = dict ([(value, key) for key, value in dict1. items()])
print (“Original dictionary is:”)
print (dict1)
print ()
print (“Dictionary after swapping is:”)
print (“keys : value”)
for i in d1:
print (i,“:”, d1 [i])
Answer: list1 = []
even = []
odd = []
num = int (input (“Enter the number of elements:”))
for i in range (1, num + 1):
value = int (input(“Enter the element :”))
list1. append (value)
for j in range (num) :
if (list1 [j] % 2 == 0):
even. append (list1 [j])
odd. append (list1 [j])
print (“Element in Even list is :”, even)
print (“Element in Odd list is :”, odd)
Or Output
Original dictionary is :
{‘First’ : 50, ‘Second’:145, ‘Third’:150, ‘Fourth’:170,
‘Fifth’:160, ‘Sixth’:75}
Dictionary after swapping is :
keys : value
50 : First
145 : Second
150 : Third
170 : Fourth
160 : Fifth
75 : Sixth

8. Define the form of software piracy.
What is digital communication? What are the rules to follow for good communication etiquettes?

Answer: The following are the forms of software piracy:
(i) Software Counterfeiting This type of software piracy occurs when fake copies of software are produced in such a way that they appear to be authentic.
(ii) Softlifting Purchasing only one licensed copy of a software and distributing and loading it onto multiple systems is called softlifting.
(iii) Renting Selling of a software illegally for temporary use as on rent basis is called renting.
(iv) Hard Disk Loading Installing an illegal copy of software on the hard disk of a personal computer is called hard disk loading.
(v) Uploading and Downloading Creating duplicate copies of the licensed software or uploading and downloading it from the Internet.
Digital communication includes E-mail, texting, instant messaging, talking on the cell phone, audio or video conferencing, posting on forums, social networking sites etc.
Below are the rules to follow for good communication etiquettes :
(i) For concerns related to data and bandwidth, very large attachments may be avoided.
(ii) We should avoid being abusive even if we do not agree with other’s point of view.
(iii) We should not waste precious time in responding to unnecessary E-mails or comments unless they have some relevance for us.
(iv) Whether the communication is synchronous or asynchronous, we should be polite and non-aggressive in our communication.

9. What is scam? Also, write important things to keep in mind while using the Internet to avoid scam?
Or Explain IT Act 2000 with its objectives.
Answer: A scam is a term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person.
Important things to keep in mind while using the Internet to avoid scam include the following :
(i) Do not click on any link in a mail that tells you to change any of your password or any security code.
(ii) If you want to make payments online and you are afraid of using your ATM/credit card details so that they will not be stolen. The first thing, you want to be aware of is that when you click on a page to make payments, that page must be secured and it must start with https:// where ‘s’ after that http refers to secured and there must be a padlock sign at the bottom of that window by the right side.
(iii) Never reply to E-mail from any unknown or unreliable source.
(iv) Never respond to an E-mail or advertisement claiming you have won something.
Or Information technology is application of computers and telecommunication equipment store, retrieve, transmit and manipulate data. IT is generally not used in reference to personal or home computing and networking. IT refers to anything related to computing technology, such as networking,
hardware, software, Internet or the people that work with these technologies.
Objectives of IT Act
♦ To stop computer crime and protect privacy of Internet users.
♦ To make more power to IPO, RBI and Indian evidence Act for restricting electronic crime.
♦ To give legal recognition for keeping books of accounts by bankers and other companies in electronic form.
♦ To give legal recognition to digital signature for accepting any agreement via computer.
♦ To provide facility of filling document online relating to school admission or registration in employment exchange.
♦ To give legal recognition to any transaction which is done by electronic way or use of Internet.