Q1. Which of the following are used in python exception handling?

(A) try

(B) except

(C finally

(D) seek

Choose the correct answer from the options given below:
(A), (B) and (D) only
(2) (A), (B) and (C) only
(3) (A), (B), (C) and (D)
(4) (B), (C) and (D) only

Q2. Match List-I with List-II:

List-I List-II
(A) fseek(-10,1) (I) from beginning of file, move 10 bytes forward 
(B) f.seek(10,1) (II) from current position moves 10 bytes backward 
(C) f.seek(10) (III) from current position moves 10 bytes forward
(D) f.seek(-10,2) (IV) from end of the file, move to the 10 bytes backward

Choose the correct answer from the options given below:

(1) (A)-(1), (B)-(II), (C)- (III), (D)-(IV)
(2) (A)-(II), (B) - (III), (C) - (IV), (D) - (I)
(3) (A)-(III), (B) - (II), (C) - (IV), (D) - (I)
(4) (A)-(II), (B)-(III), (C) - (I), (D) - (IV)

Q3. Arrange the following in correct order of exception handling in python :

(A) Write the code that may raise an exception inside a try block
(B) Execute some code regardless of whether the exception occurs or not using the finally block
(C) Handle the specific exception using the except block
(D) Raise the exception using the raise statement if necessary
Choose the correct answer from the options given below:
(1) (A), (B), (C), (D)
(2) (A), (C), (B), (D)
(3) (B), (A), (D), (C)
(4) (C), (B), (D), (A)

Q4. Consider the following, table called ‘student’

Roll No

Name

Mobile

City 

1

Arun

91

Delhi

2

Sanjay

92

Mumbai

3

Arun

93

Noida

4

Varun

94

Guwahati

5

Aarti

95

Kolkata

How many candidate keys are possible with above table?

(1) One
(2) Two
(3) Three
(4) Four

Q5. Which of the following is not a limitation of file system?

(1) Data Redundancy
(2) Data Inconsistency
(3) Data dependence
(4) Storing Space

Q6. Match List-I with List-II:

List-I
(A) Controlled Data Sharing
(B) Data Isolation
(C) Data Dependence
(D Data Inconsistency

List-II

(I) Same data maintained in different places do not match. 

(II) Limited Access given to users.

(III) There is no mapping between two files.

(IV) If the structure of a file is changed, all the existing programs accessing that file also need to be changed.

Choose the correct answer from the options given below:
(A)-(II), (B)-(III), (C) - (IV), (D)-(I)
(B) (A)-(II), (B)-(III), (C) - (I), (D) - (IV)
(C) (A)-(IV), (B)-(II), (C) - (III), (D) - (I)
(D)-(III), (B)-(IV), (C)- (I), (D)-(II)

Q7. Which of the following is called database instance? 

(A)Overall design of the database

(B) The snapshot of the database at any given time.

(C) Data about the data

(D) Restriction on the type of data inserted.

Q8. What is output of the following SQL statement?

SELECT MID('CUET2024',2,5)
(1) UET2
(2) UET20
(3) ET202
(4) CUET2

Q9. SQL applies conditions on the groups through  _clause after groups have been formed.

(1) where
(2) having
(3) new
(4) all

Q10. Consider the following two tables empl and emp2 empl

Id

name

1

amit

2

punita

 

Id

name

1

amit

2

punita

What is output of the following query.
SELECT name from empl minus SELECT name from emp2
(1) punita
(2) amit
(3) anand
(4) amit punita

Q.11 Which of the following statement(s) is/are TRUE regarding computer network?
(A) Interspace is a software that allows multiple users in a client-server environment to communicate with each other by sending and receiving data of various types.
(B) IP address is a unique permanent value associated with a network adapter called a NIC. (C) A computer network is an interconnection among two or more computers or computing devices to share data and resources.
(D) The term Workstation' refers to the most powerful computer of the network that facilitates sharing of data, software and hardware resources on the network and have more memory, processing power and storage than a normal node.
Choose the correct answer from the options given below:
(1) (A) and (C) only
(2) (A), (B) and (C) only
(3) (C) and (D) only
(4) (B) and (D) only

Q12. Communication over mobile phone is an example of which type of communication mode?
(1) Simplex
(2) Half-Duplex
(3) Full-Duplex
(4) Double-Duplex

Q13. Which of the following device provides the necessary translation of data received from network into a format or protocol recognized by devices with the internal network?
(1) Bridge
(2) Gateway
(3) Router
(4) Modem

Q14. A long cable that helps to connect several devices in bus topology having terminators at both end to prevent signal bounce is known as
(1) Drop Line
(2) Taps
(3) Analog cable
(4) Backbone

Q15. Match List-I with List-II:

List-I

(A) readline()

(B) writelines()

(C) seek()

(D) flush()

List-II

(I) Writes a sequence of strings to the file 

(II) Reads a single line from the file

(III) Force any buffered output to be written to the file

(IV) Moves the file pointer to the specified position 

Choose the correct answer from the options given below:
(1) (A)-(1), (B) - (II), (C) - (III), (D) - (IV)
(2) (A)-(II), (B) - (I), (C)- (IV), (D) - (III)
(3) (A)-(II), (B)-(I), (C) - (III), (D) - (IV)
(4) (A)-(III), (B) - (IV), (C)- (I), (D) - (II)

Q16. What is pickling?

(1) It is used to deserialize objects i.e. converting the byte stream to object hierarchy 

(2) It is used to serialize objects i.e. to convert python object hierarchy to byte stream 

(3) It is used to move the file pointer to specific location

(4) It is used in exception handling

Q17. Consider the following code and specify the correct order of the statements to be written 

(A) f.write("CUET EXAMINATION")
(B) fopen("CUET.TXT", "w")
(C) print("Data is Written Successfully")
(D) f.close()

Choose the correct answer from the options given below:

(1) (A), (B), (C), (D)

(2) (B), (A), (C), (D)

(3) (B), (D), (C),(A)

(4) (B), (D), (A),(C)

Q18. Which method from below will take a file pointer to nth character with respect to r position?

(1) fp.seek(r)

(2) fp.seek(n) 

(3) fp.seek(n,r)

(4) seek(n,r).fp

Q19. Evaluate the given postfix expression:

3  5  *  6  + 2  3   *
(1) 39
(2) 15
(3) -9
(4) -17

Q20. Stack works on the principle of _______
(1) Mid Element First
(2) First In First Out
(3) Last In First Out
(4) Last In Last Out

 Q21. Match List-I with List-II:

List-I Term

(A) Prefix

(B) Postfix 

(C) Queue 

(D) Stack

List-II Description

(I) In this the element entered first will be removed last. 

(II) In this the element entered first will be removed first. 

(III) In this the operator is placed before the operands. 

(IV) In this the operator is placed after the operands.

Choose the correct answer from the options given below:
(1) (A)-(III), (B) - (IV), (C)- (II), (D) - (I)
(2) (A)- (IV), (B) - (III), (C) - (II), (D) - (I)
(3) (A)-(1), (B)-(II), (C)- (IV), (D)-(III)
(4) (A)-(II), (B) - (I), (C)- (III), (D) - (IV)

Q22. What will be the sequence of elements removed from the stack after performing the following operations
PUSH(10)
PUSH(20)
POP()
POP()
PUSH(30)
PUSH(40)
POP()
POP()
(A) 10
(B) 20
(C) 30
(D) 40
Choose the correct sequence from the options given below:
(1) (A), (B), (C), (D)
(2) (B), (A), (D), (C)
(3) (A), (B), (D), (C)
(4) (B), (A), (C), (D)

Q23. In Python, counter _____ module need to be imported for implementing Double Ended Queue.
(1) counter
(2) collections
(3) random
(4) numpy

Q24. What will be the position of front and rear after execution of the following statements, the Queue already had the given elements in FIFO order
50→90→7→21→ 73→77
                              个
F                                R
dequeue()
dequeue()
dequeue()
dequeue()
dequeue()
enqueue(100)
dequeue()
(1) Front 50, Rear 77 

(2) Front 100, Rear 100 

(3) Front 77, Rear 100

(4) Front 73, Rear 77

 Q25. ______data type is used to implement Queue data structure in Python.
(1) Sets
(2) Dictionary
(3) Tuple
(4) List

Q26. Choose the statements that are correct.
(A) For Binary Search, all the elements have to be sorted.
(B) For Linear Search, all the elements have to be sorted.
(C) Linear Search takes less time for searching in worst case than binary search's worst case.
(D) Linear Search always give fast result whether elements are sorted or not.
Choose the correct answer from the options given below:
(1) (A) only
(2) (A) and (C) only
(3) (B) and (C) only
(4) (A), (B) and (D) only

Q27. Arrange the following in the ascending order of their time complexity.

(A) Worst Case of Linear Search

(B) Best Case of Binary Search 

(C) Worst Case of Binary Search

(D) Worst Case of Bubble Sort

Choose the correct sequence from the options given below:
(1) (A), (B), (C), (D)
(2) (B), (D), (A), (C)
(3) (B), (A), (C), (D)
(4) (B), (C), (A), (D)

Q28. How many minimum number of comparison(s) can be required to search an element from 'n' elements, in case of Linear Search?
(1) 1
(2) n-1
(3) n
(4) n+1

Q29. Which of the statement(s) is/are True for the given question.
Data elements are: 7, 5, 17, 13, 9, 27, 31, 25, 35.
Hash Table Size: 7
Hash Function: H(I) = (Data element) mod (Hash Table Size)
(A) Element 27 will create collision.
(B) Element 25 will create collision.
(C) Element 35 will create collision.
(D) Element 31 will create collision.
Choose the correct answer from the options given below:
(1) (A), (B) and (C) only
(2) (A), (C) and (D) only
(3) (B), (C) and (D) only
(4) (A) and (D) only

Q30. If a list contain 'n' number of elements and all the elements by default sorted in ascending order then how many comparisons will be required during 1st pass of bubble sort to arrange the list in ascending order?
(1) 0
(2) 1
(3) n-1
(4) n

Q31. What will be the result after the pass 2 using Bubble Sort, if we are sorting elements in ascending order?

 

Q32. _______ compares neighbouring elements only and swaps them when necessary.
(1) Selection Sort
(2) Bubble Sort
(3) Insertion Sort
(4) Quick Sort

Q33. ______are the unorganized facts that can be processed to generate meaningful information. 

(1) Information
(2) Data
(3) Blog
(4) contexts

Q34. ____ is the positive square root of the average of squared difference of each value from the mean.
(1) Mode
(2) Variance
(3) Median
(4) Standard Deviation

Q35. Consider the stock prices for shares of a company A for a week. To find difference of maximum and minimum value of the share price which statistical technique can be used:

(1) Range

(2) Mode

(3) Mean

(4) Median

Q36. What is the primary difference between a database and a file system?

(1) Databases are slower than file systems for retrieving data.

(2) Databases offer structured data and relationships, while file systems do not. 

(3) File systems can support complex queries, unlike databases.

(4) Both databases and file systems handle data in the same way.

Q37. A domain in a relational database refers to:

(1) The overall database structure

(2) A specific set of valid values for an attribute

(3) A table containing multiple records

(4) A relationship between two tables

Q38.  A relation in a relational database is also known as:

(1) A data type

(2) An attribute

(3) A schema 

(4) A table

Q39. The primary key is chosen from ________

(1) The most complex candidate key available. 

(2)All available candidate keys for a table.

(3) The simplest candidate key available.

(4) Any attribute within the table.

Q40. An alternate key is______

(1) Another name for the primary key

(2) A unique identifier besides the primary key

(3) A relationship between two tables

(4) A synonym for a tuple

Q41. Consider the following SQL functions.
(A) CURDATE()
(B) CURRENT_DATE()
(C) CURRENT_DATE
(D) TODAY()

Which of the above function/functions returns current date.
(1) (A), (B) and (D) only

(2) (A), (B) and (C) only

(3) (A), (B), (C) and (D)

(4) (B), (C) and (D) only 

Q42. Which of the following is correct syntax for inserting foreign key constraint in a relation?
(1) ALTER TABLE table_name ADD FOREIGN KEY(attribute name) REFERENCES referenced_table_name(attribute name)
(2) ADD TABLE table_name ADD FOREIGN KEY(attribute name) REFERENCES referenced_table_name(attribute name)
(3) ALTER TABLE table_name REFERENCES referenced_table_name(attribute name) ADD FOREIGN KEY (attribute name)
(4) MODIFY TABLE table_name ADD FOREIGN KEY(attribute name) REFERENCES referenced_table_name(attribute name)

Q43. What is result of following arithmetic operation in SQL?
SELECT 5+NULL AS RESULT
(1) 5
(2) NULL
(3) 0
(4) 5NULL

Q44. Which of the following expression in SQL would calculate the square root of 16?

(1) POWER(16,2)

(2) POWER(16,0.5) 

(3) POWER(16,1)

(4) MOD(16)

Q45. Which of the following statement(s) is/are TRUE in respect of Media Access Control (MAC) Address?

(A) It can be changed if a node is removed from one network and connected to another network. 

(B) Each MAC address is a 12-digit hexadecimal number.

(C) It is a unique value associated with a network adapter called NIC.

(D) It is provided by the Internet Service Provider to locate computers connected to the internet Choose the correct answer from the options given below:

(1) (B) and (C) only
(2) (A), (B) and (C) only
(3) (C) and (D) only
(4) (A) and (B) only

Q46. Match List-I with List-II :

List-I Device

(A) RJ45 Connector

(B) Bridge

(C) Gateway

(D) Repeater

List-II Use

(I) relay frames between two originally separate segments that follow same protocols.

(II) amplifies a signal that is transmitted across the network so that the signal is received same as it is sent.

(III) establishes an intelligent connection between a local area network and external networks with completely different structures.

(IV) plug-in device primarily used for connecting LANs particularly Ethernet

Choose the correct answer from the options given below:

(1) (A)- (IV), (B) - (III), (C) - (II), (D)-(I)

(2) (A)-(III), (B)- (II), (C) - (I), (D) - (IV)

(3) (A)-(III), (B)- (I), (C)- (IV), (D) (II) 

(4) (A)-(IV), (B)-(I), (C)-(III), (D)-(II)

Q47. What is the purpose of Domain Name System Server in networking?

(1) To encrypt data during transmission.

(2) To convert domain names into IP addresses

(3) To regulate network traffic flow.

(4) To establish a secure connection between devices.

Q48. 140.168.220.200 is a 32-bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 separated by decimal points. What is this number called?

(1) IP Address

(2) Web Address

(3) MAC Address

(4) Port Address

Q49. In a ____ topology, if there are 11 devices in a network, each device has #1-1 ports for cables.

(1) Mesh

(2) Bus

(3) Star

(4) Ring

Q50. Amit wants to be familiar with SQL. One of his friends Anand suggest him to execute following sql commands.

(A) Create Table Student

(B) Use Database DB

(C) Select* from Student

(D) Insert into Student

In which order Amit needs to run above commands.

(1) (A), (B), (C), (D)

(2) (A), (B), (D), (C)

(3) (B), (A), (D), (C)

(4) (C), (B), (D), (A)