# Class 11 Computer Science Sample Paper

Please refer to Class 11 Computer Science Sample Paper with solutions provided below. All sample papers for Computer Science Class 11 have been designed as per the latest paper pattern issued by CBSE for the current academic year. Students should practice these guess papers for Class 11 Computer Science as it will help them to gain more understanding of the type of questions that are expected to be asked in upcoming Class 11 Computer Science exams. Please click on the links below to access free CBSE Sample Papers for Class 11 Computer Science.

## Class 11 Computer Science Sample Paper Term 2 With Solutions

1. Consider the following dictionary:
dic1 = {10:(45,12,8),‘One’:[32,44,56]}
Based on the above code, answer the following questions.
(i) Choose the correct option of given statement.
print(dic1.values())
(a) dict_values ([(45, 12, 8), [32, 44, 56]])
(b) ([45, 12, 8], [32, 44, 56])
(c) values ([32, 44, 56], (45, 12, 8))
(d) dict ([32, 44, 56], (45, 12, 8))

Answer:

A

(ii) Each key is separated by which symbol?
(a) ;
(b) :
(c) ,
(d) @

Answer:

C

(iii) Which output is best suited for given statement?
dic1.get(‘One’)
(a) (32, 44, 56)
(b) [32, 44, 56]
(c) 32, 44, 56
(d) Error

Answer:

B

(iv) Identify the output of len (dic1).
(a) 2
(b) 8
(c) 4
(d) 6

Answer:

A

(v) Find the output of following code.
>>> dic1. clear()
>>> dic1
(a) {}
(b) Empty dictionary message
(c) None
(d) Error

Answer:

A

2. What will be the output of the following code segment?
list 1 = [10, 20, 30, 40, 50, 60, 70, 80, 90, 100]
(i) del list1 [3:]
print(list1)
(ii) del list1 [:5]
print(list1)
(iii) del list1 [::2]
print (list1)
Or Observe the following tuple and answer the questions that follow.
tuple1 = (10, 20,‘One’, ‘Two’, 30, (40, 50),‘Three’)
(i) len (tuple1)
(ii) tuple1 [−6]
(iii) tuple1 [3]
(iv) tuple1 [: 2]
(v) tuple [3 :]
(vi) tuple1 [1 : 8 : 2]
Answer: (i) [10, 20, 30]
(ii) [60, 70, 80, 90, 100]
(iii) [20, 40, 60, 80, 100]
Or (i) 7
(ii) 20
(iii) ‘Two’
(iv) (10, 20)
(v) (‘Two’, 30, (40, 50), ‘Three’)
(vi) (20, ‘Two’, (40, 50))

3. Predict the output.
dic1 = {}
dic1 [1] = 2
dic1 [‘1’] = 4
dic1 [1.0] = 8
sum = 0
for i in dic1:
sum = sum+ dic1 [i]
print (sum)
print (dic1)
Or Define the insert () method of list with an example.
Answer: l2
{‘1 : 4’, ‘1.0’ : 8}
Or insert () method is used to insert an element at specified
position in the list. This method takes two arguments : one
for index number and second for element value.
Syntax
list_name. insert (index, element)
e.g. l1 = [1,2,3,4]
l1. insert (2, 10)
print (l1)
Output
[1, 2, 10, 3, 4]

4. What is dictionary? Also, write the ways to delete elements from a dictionary.
Answer: Dictionary is an unordered collection of data values that stored the key: value pair instead of single value as an element.
There are following ways to delete elements from a dictionary as follows :
(i) Using del keyword This keyword is used to delete the key that is present in the dictionary.
Syntax del dictionary_name [key]
(ii) Using pop () method This method is used to delete key and respective value from dictionary.
Syntax dictionary_name.pop (key)

5. Define the ways to stop online frauds.
Or
Explain the identity protection while using Internet.

Answer: (i) Strong security mechanism by the E-commerce site and payment gateways to prevent stealing of crucial information.
(ii) A monitoring official site that ensures the sancity of E-commerce company and delivery of goods services as promised.
(iii) Official guidelines and safeguards on selling of user’s
data to third parties.
Or
Your personal identity is important as it defines who you are.
Your identity includes your personal information such as name, address, contact information, bank account, credit card numbers and social security numbers should be kept private. We surf the internet for a variety of reasons from using social media, buying and selling goods etc., and many more. When we give out our private data to businesses and other internet users such as while filling forms or making
payment etc., we trust them to use that information for appropriate purposes.
This is not always the case though and financial and personal data can be used for harmful reasons such as hacking, stalking and identity fraud. Identity fraud is when personal details that have accessed or stolen are used to commit fraudulent acts.

6. What is active digital footprint? Write any two examples of it.
Answer: Active digital footprint done when you intentionally put something online.
e.g.
(i) Posting on Facebook, Instagram, Snapchat, Twitter and other social media platforms.
(ii) Filling out online forms, such as when signing up to receive E-mails or text.

7. Write Python program to count the frequencies in a list using dictionary.
Or
Write the best suited method’s name for the following conditions.
(i) Calculate the sum of all the elements.
(ii) Calculate the total occurrence of given element of list.
(iii) Returns the index of first occurrence.
(iv) Calculate the total length of list.
(v) Used to remove all the items of a list.
Answer: lst = []
n = int (input(“Enter number of elements:”))
for i in range (0, n):
ele = int (input ())
lst . append (ele)
print (“Original list :”, lst)
print (“Elements with their frequency”)
freq = {}
for item in lst :
if (item in freq):
freq [item] + = 1
else :
freq [item]=1
for key, value in freq. items ():
print (“% d : % d”% (key, value))
Or
(i) sum ()
(ii) count ()
(iii) index ()
(iv) len ()
(v) clear ()

8. What are Intellectual Property Rights (IPR)? Also, explain Patent is one of the types of IPR.
Or
Explain E-Waste disposal management.
Answer: Intellectual Property Rights (IPR) are the rights given to persons over the creations of their minds. Common types of IPR include copyright, trademarks, patents, industries design rights and in some jurisdictions trade secrets.
Patent It is usually granted for inventions. Unlike copyright, the inventor needs to apply (file) for patenting the invention.
When a patent is granted, the owner gets an exclusive right to prevent others from using, selling or distributing the protected invention. Patent gives full control to the patentee to decide whether or how the invention can be used by others. Thus, it encourages inventors to share their scientific or technological findings with other. A patent protects an invention for 20 years, after which it can be freely used.
Or Some of the feasible methods of E-Waste management are reduce, reuse and recycle.
(i) Reduce We should try to reduce the generation of E-Waste by purchasing the electronic or electrical devices only according to our need.
Also, they should be used to their maximum capacity and discarded only after their useful life has ended. Good maintenance of electronics devices also increases the life of the devices.
(ii) Reuse It is the process of reusing the electronic or electric waste after slight modification. The electronic equipment that is still functioning should be donated or sold to someone who is still willing to use it. The process of reselling old electronic goods at lower prices is called refurbishing.
(iii) Recycle Recycling is the process of conversion of electronic devices into something that can be used again and again in some or the other manner. Only those products should be recycled that cannot be repaired, refurbished or reused.
To promote recycling of E-Waste many companies and NGOs are providing door-to-door pick up facilities for collecting the E-Waste from homes and offices.

9. What is digital footprint? Also, write the differences between active digital footprint and passive digital footprint.
Or Define the following terms :
(i) Hacking (ii) Piracy
(iii) Cyber crime (iv) Plagiarism
(v) Netiquette

Answer: On the Internet, a digital footprint is the word used to describe the traces or footprints that people leave online. This is information transmitted online, such as forum registration, E-mails and attachments, uploaded videos or images and any other form of transmission of information all of which leaves traces of personal information about yourself available to others online. Digital footprints are created when personal data is released by the user for the purpose of sharing information about oneself on websites or social media.
Active digital footprint Passive digital footprint Active digital footprint is where the user has deliberately shared information about themselves either by using social media sites or by using websites.
Passive digital footprint is a data trail you unintentionally leave online.
It would be where a user has been online and information has been stored on an online database.
When you visit a website, the web server may log your IP address, which identifies your Internet service provider and your approximate location.
Or
(i) Hacking refers to the misuse of devices like computers, smartphones, tablets and networks to cause damage to or corrupt systems, gather information on users, steal data and documents or disrupt data-related activity.
(ii) Piracy refers to the unauthorised duplication of copyrighted content that is then sold at substantially lower prices in the ‘grey’ market. The ease of access to technology has meant that over the years, piracy has become more rampant.
(iii) Cyber crime is also called computer crime. The use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities or violating privacy.
(iv) Plagiarism is presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement.
(v) Netiquette is short for ‘‘Internet etiquette’’. Just like etiquette is a code of polite behavior in society, netiquette is a code of good behavior on the Internet. This includes several aspects of the Internet, such as E-mail, social media, online chat, web forums, website comments, multiplayer gaming and
other types of online communication .