Computer Science CUET Previous Year Paper
Q1. Which of the following are used in python exception handling?
(A) try (B) except (C finally (D) seek Choose the correct answer from the options given below: |
||||||||||||||||||||||||
Q2. Match List-I with List-II:
Choose the correct answer from the options given below: (1) (A)-(1), (B)-(II), (C)- (III), (D)-(IV) |
||||||||||||||||||||||||
Q3. Arrange the following in correct order of exception handling in python :
(A) Write the code that may raise an exception inside a try block |
||||||||||||||||||||||||
Q4. Consider the following, table called ‘student’
How many candidate keys are possible with above table? (1) One |
||||||||||||||||||||||||
Q5. Which of the following is not a limitation of file system?
(1) Data Redundancy |
||||||||||||||||||||||||
Q6. Match List-I with List-II:
Choose the correct answer from the options given below: |
||||||||||||||||||||||||
Q7. Which of the following is called database instance? (A)Overall design of the database (B) The snapshot of the database at any given time. (C) Data about the data (D) Restriction on the type of data inserted. |
||||||||||||||||||||||||
Q8. What is output of the following SQL statement?
SELECT MID('CUET2024',2,5) |
||||||||||||||||||||||||
Q9. SQL applies conditions on the groups through _clause after groups have been formed.
(1) where |
||||||||||||||||||||||||
Q10. Consider the following two tables empl and emp2 empl
What is output of the following query. |
||||||||||||||||||||||||
Q.11 Which of the following statement(s) is/are TRUE regarding computer network? |
||||||||||||||||||||||||
Q12. Communication over mobile phone is an example of which type of communication mode? |
||||||||||||||||||||||||
Q13. Which of the following device provides the necessary translation of data received from network into a format or protocol recognized by devices with the internal network? |
||||||||||||||||||||||||
Q14. A long cable that helps to connect several devices in bus topology having terminators at both end to prevent signal bounce is known as |
||||||||||||||||||||||||
Q15. Match List-I with List-II:
Choose the correct answer from the options given below: |
||||||||||||||||||||||||
Q16. What is pickling? (1) It is used to deserialize objects i.e. converting the byte stream to object hierarchy (2) It is used to serialize objects i.e. to convert python object hierarchy to byte stream (3) It is used to move the file pointer to specific location (4) It is used in exception handling |
||||||||||||||||||||||||
Q17. Consider the following code and specify the correct order of the statements to be written (A) f.write("CUET EXAMINATION") Choose the correct answer from the options given below: (1) (A), (B), (C), (D) (2) (B), (A), (C), (D) (3) (B), (D), (C),(A) (4) (B), (D), (A),(C) |
||||||||||||||||||||||||
Q18. Which method from below will take a file pointer to nth character with respect to r position? (1) fp.seek(r) (2) fp.seek(n) (3) fp.seek(n,r) (4) seek(n,r).fp |
||||||||||||||||||||||||
Q19. Evaluate the given postfix expression: 3 5 * 6 + 2 3 * |
||||||||||||||||||||||||
Q20. Stack works on the principle of _______ |
||||||||||||||||||||||||
Q21. Match List-I with List-II:
Choose the correct answer from the options given below: |
||||||||||||||||||||||||
Q22. What will be the sequence of elements removed from the stack after performing the following operations |
||||||||||||||||||||||||
Q23. In Python, counter _____ module need to be imported for implementing Double Ended Queue. |
||||||||||||||||||||||||
Q24. What will be the position of front and rear after execution of the following statements, the Queue already had the given elements in FIFO order (2) Front 100, Rear 100 (3) Front 77, Rear 100 (4) Front 73, Rear 77 |
||||||||||||||||||||||||
Q25. ______data type is used to implement Queue data structure in Python. |
||||||||||||||||||||||||
Q26. Choose the statements that are correct. |
||||||||||||||||||||||||
Q27. Arrange the following in the ascending order of their time complexity. (A) Worst Case of Linear Search (B) Best Case of Binary Search (C) Worst Case of Binary Search (D) Worst Case of Bubble Sort Choose the correct sequence from the options given below: |
||||||||||||||||||||||||
Q28. How many minimum number of comparison(s) can be required to search an element from 'n' elements, in case of Linear Search? |
||||||||||||||||||||||||
Q29. Which of the statement(s) is/are True for the given question. |
||||||||||||||||||||||||
Q30. If a list contain 'n' number of elements and all the elements by default sorted in ascending order then how many comparisons will be required during 1st pass of bubble sort to arrange the list in ascending order? |
||||||||||||||||||||||||
Q31. What will be the result after the pass 2 using Bubble Sort, if we are sorting elements in ascending order?
|
||||||||||||||||||||||||
Q32. _______ compares neighbouring elements only and swaps them when necessary. |
||||||||||||||||||||||||
Q33. ______are the unorganized facts that can be processed to generate meaningful information. (1) Information |
||||||||||||||||||||||||
Q34. ____ is the positive square root of the average of squared difference of each value from the mean. |
||||||||||||||||||||||||
Q35. Consider the stock prices for shares of a company A for a week. To find difference of maximum and minimum value of the share price which statistical technique can be used: (1) Range (2) Mode (3) Mean (4) Median |
||||||||||||||||||||||||
Q36. What is the primary difference between a database and a file system? (1) Databases are slower than file systems for retrieving data. (2) Databases offer structured data and relationships, while file systems do not. (3) File systems can support complex queries, unlike databases. (4) Both databases and file systems handle data in the same way. |
||||||||||||||||||||||||
Q37. A domain in a relational database refers to: (1) The overall database structure (2) A specific set of valid values for an attribute (3) A table containing multiple records (4) A relationship between two tables |
||||||||||||||||||||||||
Q38. A relation in a relational database is also known as: (1) A data type (2) An attribute (3) A schema (4) A table |
||||||||||||||||||||||||
Q39. The primary key is chosen from ________ (1) The most complex candidate key available. (2)All available candidate keys for a table. (3) The simplest candidate key available. (4) Any attribute within the table. |
||||||||||||||||||||||||
Q40. An alternate key is______ (1) Another name for the primary key (2) A unique identifier besides the primary key (3) A relationship between two tables (4) A synonym for a tuple |
||||||||||||||||||||||||
Q41. Consider the following SQL functions. Which of the above function/functions returns current date. (2) (A), (B) and (C) only (3) (A), (B), (C) and (D) (4) (B), (C) and (D) only |
||||||||||||||||||||||||
Q42. Which of the following is correct syntax for inserting foreign key constraint in a relation? |
||||||||||||||||||||||||
Q43. What is result of following arithmetic operation in SQL? |
||||||||||||||||||||||||
Q44. Which of the following expression in SQL would calculate the square root of 16? (1) POWER(16,2) (2) POWER(16,0.5) (3) POWER(16,1) (4) MOD(16) |
||||||||||||||||||||||||
Q45. Which of the following statement(s) is/are TRUE in respect of Media Access Control (MAC) Address? (A) It can be changed if a node is removed from one network and connected to another network. (B) Each MAC address is a 12-digit hexadecimal number. (C) It is a unique value associated with a network adapter called NIC. (D) It is provided by the Internet Service Provider to locate computers connected to the internet Choose the correct answer from the options given below: (1) (B) and (C) only |
||||||||||||||||||||||||
Q46. Match List-I with List-II :
Choose the correct answer from the options given below: (1) (A)- (IV), (B) - (III), (C) - (II), (D)-(I) (2) (A)-(III), (B)- (II), (C) - (I), (D) - (IV) (3) (A)-(III), (B)- (I), (C)- (IV), (D) (II) (4) (A)-(IV), (B)-(I), (C)-(III), (D)-(II) |
||||||||||||||||||||||||
Q47. What is the purpose of Domain Name System Server in networking? (1) To encrypt data during transmission. (2) To convert domain names into IP addresses (3) To regulate network traffic flow. (4) To establish a secure connection between devices. |
||||||||||||||||||||||||
Q48. 140.168.220.200 is a 32-bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 separated by decimal points. What is this number called? (1) IP Address (2) Web Address (3) MAC Address (4) Port Address |
||||||||||||||||||||||||
Q49. In a ____ topology, if there are 11 devices in a network, each device has #1-1 ports for cables. (1) Mesh (2) Bus (3) Star (4) Ring |
||||||||||||||||||||||||
Q50. Amit wants to be familiar with SQL. One of his friends Anand suggest him to execute following sql commands. (A) Create Table Student (B) Use Database DB (C) Select* from Student (D) Insert into Student In which order Amit needs to run above commands. (1) (A), (B), (C), (D) (2) (A), (B), (D), (C) (3) (B), (A), (D), (C) (4) (C), (B), (D), (A) |
Comments
Nam cursus tellus quis magna porta adipiscing. Donec et eros leo, non pellentesque arcu. Curabitur vitae mi enim, at vestibulum magna. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Sed sit amet sem a urna rutrumeger fringilla. Nam vel enim ipsum, et congue ante.
Cursus tellus quis magna porta adipiscin
View All