XI SCIENCE COMPUTER PRACTICAL 2025

 

Class 11

Half yearly practical 2025

 

Odd roll numbers do question 1-10 MCQ and even roll numbers do from question 11 to 20 in notebook                                                                                                      (10)

Do 10 MCQ questions in your notebook according to roll number.

1.      Which of the following is considered a cyber-crime?
a) Creating a blog
b) Downloading music from a licensed source
c) Phishing
d) Using a search engine

2.      Copyright protects which of the following?
a) Ideas
b) Software code
c) Trademarks
d) Patent designs

3.      Which term refers to unauthorized access to or control over a computer system?
a) Phishing
b) Hacking
c) Piracy
d) Spoofing

4.      The IT Act 2000 was introduced in India to deal with:
a) Agriculture regulations
b) Cyber -rimes and electronic commerce
c) Traffic rules
d) Environmental protection

5.      Which of the following is NOT an ethical practice in cyberspace?
a) Citing sources of information
b) Plagiarizing content
c) Respecting privacy
d) Reporting security flaws

6.      Trademark infringement occurs when someone:
a) Uses copyrighted music
b) Copies a patent
c) Uses a similar logo or brand name without permission
d) Shares open-source software

7.      Which type of computer is the largest in size and processing power?
a) Microcomputer
b) Minicomputer
c) Mainframe computer
d) Supercomputer

8.      Which of the following is an example of system software?
a) MS Word
b) Adobe Photoshop
c) Windows OS
d) Tally ERP

9.      Which of the following is NOT protected under Intellectual Property Rights?
a) Patent
b) Copyright
c) Trademark
d) Public domain works

10.  Which of these is an example of a hardware component?
a) Keyboard
b) Antivirus software
c) Operating System
d) Word Processor

11.  A personal computer is best classified as a:
a) Microcomputer
b) Supercomputer
c) Mainframe
d) Minicomputer

12.  What is phishing?
a) An ethical hacking technique
b) A way to speed up the internet
c) Fraudulent attempt to obtain sensitive data
d) A type of firewall

13.  Which law governs cyber crimes and electronic commerce in India?
a) Indian Penal Code
b) Consumer Protection Act
c) Information Technology Act
d) Intellectual Property Act

14.  Which of the following is NOT a type of software license?
a) Open Source
b) Shareware
c) Malware
d) Freeware

15.  Intellectual Property refers to:
a) Physical property
b) Tangible goods
c) Creations of the mind
d) Government property

16.  Which of these is considered a cyber ethics principle?
a) Download pirated software
b) Respect others’ privacy online
c) Steal data for fun
d) Spread malware

17.  What is a patent granted for?
a) Artistic work
b) Scientific discovery
c) Invention of a product or process
d) Trade names

18.  Which of the following is an input device?
a) Printer
b) Monitor
c) Keyboard
d) Speaker

19.  Which device is used to convert digital signals to analog and vice versa for internet access?
a) Router
b) Modem
c) Switch
d) Hub

20.  The unauthorized copying and distribution of software is known as:
a) Hacking
b) Piracy
c) Cracking
d) Encoding

Write all programs in notebook and computer both run it write the output also.          (10)

1)      WAP to take a number and your name from the keyboard print your name inputted number times.

2)      WAP to calculate the average of three numbers

3)      WAP to convert kilometers to meters and centimeters

4)      WAP to print sum of two numbers inputted form keyboard.

 

 

Comments

Popular posts from this blog

CLASS 8 DATA TYPES IN PYTHON

CHAPTER 4 RAISING QUERIES CLASS 8 COMPUTER