Page 75 - PYTHON-11
P. 75

(b)  Predict the output of the following code.
                     s="wELCOMe2PyTHONLEaRNInG"
                     n=len(s)
                     p=""
                     for x in range(0,n):
                         if(s[x]>='a' and s[x] <='m'):
                          p= p+ s[x].upper()
                         elif(s[x] >= 'n' and s[x] <= 'z'):
                          p= p+ s[x-1]
                         elif(s[x] . isupper()):
                          p= p+ s[x].lower()
                        else:
                          p= p + '$'
                     print(p)
              33.  Explain the Von Neumann Architecture along with well-labelled diagram.                  (4)
              34.  (a)  Write an algorithm and draw a flowchart to calculate and display the average of three
                     numbers.                                                                              (4)
                                                           OR
                  (b)  Explain any four methods of tracking identity.
              35.  Answer the following questions:                                                         (4)
                  (a)  Differentiate between mutable and immutable data types in Python.
                  (b)  Write any four naming rules of an identifier in Python.

                                                Section-E (2 × 5 = 10 Marks)
              36.  Consider the following scenario and answer questions (A) to (E).                        (5)
                  Technologies Hub Innovations Ltd. provides online services and handles sensitive client data. Recently, an
                 employee clicked on a phishing email that led to a fake website, stealing login credentials. As a result,
                 unauthorized individuals accessed the company’s database and exposed confidential information.
                  The IT team responded quickly by encrypting sensitive data, updating security measures, conducting audits,
                 and training employees on phishing threats. They also introduced multi-factor authentication and a VPN
                 (Virtual Private Network) for remote workers.
                  (a)  What type of cyberattack occurred when the employee clicked on the email link?
                  (b)  Which software/hardware is used to protect the network from unauthorized access by monitoring
                     incoming and outgoing traffic?
                  (c)  If sensitive data had been stolen, what type of cybercrime would the attackers be charged with?
                  (d)  Write the term used for protecting data by converting it to an unreadable format.
                  (e)  What term refers to an attempt to gain unauthorized access to computer systems or networks?
              37.  Write a menu-driven Python program that performs the following operations on a list.    (5)
                  (a)  Adds an item to the list.
                  (b)  Removes an item from the list.
                  (c)  Displays all the items in the list.
                  (d)  Searches for a specific item in the list.
                  (e)  Counts and displays the total number of items in the list.

















                                                               P.8
   70   71   72   73   74   75   76