Q1. Which of the following are used in python exception handling?

(A) try

(B) except

(C finally

(D) seek

Choose the correct answer from the options given below:
(A), (B) and (D) only
(2) (A), (B) and (C) only
(3) (A), (B), (C) and (D)
(4) (B), (C) and (D) only

Q2. Match List-I with List-II:

List-I List-II
(A) fseek(-10,1) (I) from beginning of file, move 10 bytes forward 
(B) f.seek(10,1) (II) from current position moves 10 bytes backward 
(C) f.seek(10) (III) from current position moves 10 bytes forward
(D) f.seek(-10,2) (IV) from end of the file, move to the 10 bytes backward

Choose the correct answer from the options given below:

(1) (A)-(1), (B)-(II), (C)- (III), (D)-(IV)
(2) (A)-(II), (B) - (III), (C) - (IV), (D) - (I)
(3) (A)-(III), (B) - (II), (C) - (IV), (D) - (I)
(4) (A)-(II), (B)-(III), (C) - (I), (D) - (IV)

Q3. Arrange the following in correct order of exception handling in python :

(A) Write the code that may raise an exception inside a try block
(B) Execute some code regardless of whether the exception occurs or not using the finally block
(C) Handle the specific exception using the except block
(D) Raise the exception using the raise statement if necessary
Choose the correct answer from the options given below:
(1) (A), (B), (C), (D)
(2) (A), (C), (B), (D)
(3) (B), (A), (D), (C)
(4) (C), (B), (D), (A)

Q4. Consider the following, table called ‘student’

Roll No

Name

Mobile

City 

1

Arun

91

Delhi

2

Sanjay

92

Mumbai

3

Arun

93

Noida

4

Varun

94

Guwahati

5

Aarti

95

Kolkata

How many candidate keys are possible with above table?

(1) One
(2) Two
(3) Three
(4) Four

Q5. Which of the following is not a limitation of file system?

(1) Data Redundancy
(2) Data Inconsistency
(3) Data dependence
(4) Storing Space

Q6. Match List-I with List-II:

List-I
(A) Controlled Data Sharing
(B) Data Isolation
(C) Data Dependence
(D Data Inconsistency

List-II

(I) Same data maintained in different places do not match. 

(II) Limited Access given to users.

(III) There is no mapping between two files.

(IV) If the structure of a file is changed, all the existing programs accessing that file also need to be changed.

Choose the correct answer from the options given below:
(A)-(II), (B)-(III), (C) - (IV), (D)-(I)
(B) (A)-(II), (B)-(III), (C) - (I), (D) - (IV)
(C) (A)-(IV), (B)-(II), (C) - (III), (D) - (I)
(D)-(III), (B)-(IV), (C)- (I), (D)-(II)

Q7. Which of the following is called database instance? 

(A)Overall design of the database

(B) The snapshot of the database at any given time.

(C) Data about the data

(D) Restriction on the type of data inserted.

Q8. What is output of the following SQL statement?

SELECT MID('CUET2024',2,5)
(1) UET2
(2) UET20
(3) ET202
(4) CUET2

Q9. SQL applies conditions on the groups through  _clause after groups have been formed.

(1) where
(2) having
(3) new
(4) all

Q10. Consider the following two tables empl and emp2 empl

Id

name

1

amit

2

punita

 

Id

name

1

amit

2

punita

What is output of the following query.
SELECT name from empl minus SELECT name from emp2
(1) punita
(2) amit
(3) anand
(4) amit punita

Q.11 Which of the following statement(s) is/are TRUE regarding computer network?
(A) Interspace is a software that allows multiple users in a client-server environment to communicate with each other by sending and receiving data of various types.
(B) IP address is a unique permanent value associated with a network adapter called a NIC. (C) A computer network is an interconnection among two or more computers or computing devices to share data and resources.
(D) The term Workstation' refers to the most powerful computer of the network that facilitates sharing of data, software and hardware resources on the network and have more memory, processing power and storage than a normal node.
Choose the correct answer from the options given below:
(1) (A) and (C) only
(2) (A), (B) and (C) only
(3) (C) and (D) only
(4) (B) and (D) only

Q12. Communication over mobile phone is an example of which type of communication mode?
(1) Simplex
(2) Half-Duplex
(3) Full-Duplex
(4) Double-Duplex

Q13. Which of the following device provides the necessary translation of data received from network into a format or protocol recognized by devices with the internal network?
(1) Bridge
(2) Gateway
(3) Router
(4) Modem

Q14. A long cable that helps to connect several devices in bus topology having terminators at both end to prevent signal bounce is known as
(1) Drop Line
(2) Taps
(3) Analog cable
(4) Backbone

Q15. Match List-I with List-II:

List-I

(A) readline()

(B) writelines()

(C) seek()

(D) flush()

List-II

(I) Writes a sequence of strings to the file 

(II) Reads a single line from the file

(III) Force any buffered output to be written to the file

(IV) Moves the file pointer to the specified position 

Choose the correct answer from the options given below:
(1) (A)-(1), (B) - (II), (C) - (III), (D) - (IV)
(2) (A)-(II), (B) - (I), (C)- (IV), (D) - (III)
(3) (A)-(II), (B)-(I), (C) - (III), (D) - (IV)
(4) (A)-(III), (B) - (IV), (C)- (I), (D) - (II)

Q16. The SQL keyword_______is used with wildcards.
(1) LIKE
(2) IN
(3) NOT IN
(4) DISTINCT

Q17. Aggregate functions can be used with ____ clause.They can not be used with ____ clause 

(1) WHERE,HAVING
(2) HAVING, WHERE
(3) GROUP BY,HAVING
(4) SELECT,HAVING

Q18. Match List-I with List-II:

List-I
(A) UNIQUE CONSTRAINT

(B) PRIMARY KEY CONSTRAINT

(C) DEFAULT CONSTRAINT
(D) CHECK CONSTRAINT

List-II
(I) Does not allow NULL value and there can exist only one column or one combination with this constraint.
(II) Automatically value is inserted when user does not enter a value for the column.
(III) Allows NULL values and their can exist multiple columns with this constraint.
(IV) Limits values that can be inserted into a column of a table.

Choose the correct answer from the options given below:
(1) (A)-(III), (B)-(I), (C)- (IV), (D)-(II)
(2) (A)-(III), (B)- (IV), (C)- (I), (D)-(II)
(3) (A)-(III), (B)- (I), (C)- (II), (D) - (IV)
(4) (A)-(1), (B)-(III), (C)-(II), (D) - (IV)

Q19. Which function should be used to get first n rows of a dataframe?
(1) print(n)
(2) head(n)
(3) get(n)
(4) call(n)

Q20. ____is two dimensional data structure in Python with row index and column index.             

(1) DataFrame

(2) List

(3) Tuple

(4) Series

Q21. Which of the following is used in a dataframe df, to check for the rows with roll no above 101 and display boolean True or false.
(1) dff'roll_no'>101
(2) df.roll no<101
(3) df.check(roll_no>101)
(4) df.apply(check(roll_no>101))

Q22. To save data of a dataframe to a csv file use:
(1) to_csv()
(2) to.csv()
(3) from_csv
(4) fill_csv()

Q23. Consider the task of printing records from a MySQL table named Student. Identify the correct order of the commands given below.
(A) print(df)
(B) import sqlalchemy as sq
(C) con-sq.create_engine("mysql-mysqlconnector//root@localhost/")
(D) df-pd.read_sql("Student",con)
Choose the correct answer from the options given below:
(1) (A), (B), (C), (D)
(2) (A), (C), (B), (D)
(3) (B), (C), (D), (A)
(4) (C), (B), (D), (A)

Q24. To get the total of a numeric column in a dataframe df, use:

(1) dfl'column_name'].sum()

(2) column_name.df.sum() 

(3) column_name.df.total()

(4) df_total(column_name)

Q25. _______method is used to sort the data on the basis of index value.
(1) sort_asc()
(2) sort_desc()
(3) sort_value()
(4) sort_index()

Q26. _________argument of hist() is used to create a horizontal histogram.
(1) landscape
(2) portrait
(3) orientation
(4) type

Q27. ________ plot is used to show the spread and centers of a dataset.
(1) box
(2) line
(3) bar
(4) histogram

Q28. Which of the following is the correct command to use matplotlib?
import plt matplotlib as plot
(2) import matplotlib.plt at plot
(3) import matplotlib.pyplot as plt
(4) import matplotlib.plot as plot

Q29. Consider a CSV file containing number of medals won by some countries in Olympics 2020 medal.csv

country

Medals

UK

46

USA

53

CHINA

49

GERMANY

39

The task is to create a pie chart from the above data:
(A) plt.pie(medal data, labels-'country_data')
(B) medal_data=df['medals']
(C) df pd.read_csv('medal.csv")
(D) country_data=df['country"]
Choose the correct sequence of the above commands from the options given below:
(1) (C), (A), (B), (D)
(2) (D), (C), (B), (A)
(3) (B), (A), (D), (C)
(4) (C), (B), (D), (A)

Q30. ______is a third party software that is installed on the host computer and can be used by the browser for multiple functionalities.
(1) Cookies
(2) Plug-ins
(3) Shortcuts
(4) router

Q31. Which of the following is the domain name in the given URL below? http://www.ncert.nic.in/exam/samplepaper.htm
(1) http://www.ncert.nic.in
(2) www.ncert.nic.in/exam/samplepaper.htm
(3) http://
(4) ncert.nic.in

Q32. _____uses packet switching technology to carry voice traffic over an IP network where each packet follows best route to reach its destination.
(1) E-mail
(2) HTTP
(3) VoIP
(4) SMTP

Q33. Which among the following was the first web browser?
(1) Internet Explorer
(2) Mosaic
(3) Google Chrome
(4) Opera

Q34. Stealing someone's intellectual work and representing it as your own is known as.......... 

(1) Fraud
(2) Identity Theft
(3) Online Stealing
(4) Plagiarism

Q35. Which of the following could be a disadvantage of 'open source' software?
(1) High quality software with lots of features
(2) Not as customizable
(3) May not have been tested as much as proprietary software so might have bugs
(4) You can edit the source code to customize it

Q36. Match List-I with List-II :

List-I

(A) Ethical Hacking

(B) Legal mechanism to establish a sort of ownership of intellectual property

(C) Attempt to acquire sensitive information by masquerading as a trustworthy party in electronic communication

(D) Gaining unauthorized access to a computing device or a group of computer systems for
some illicit purpose

List-II 

(I) Phishing
(II) White Hat Hackers
(III) Hacking
(IV) Copyright

Choose the correct answer from the options given below:
(1) (A)-(II), (B)-(I), (C)-(III), (D)-(IV)
(2) (A)-(II), (B) - (III), (C)-(IV), (D) - (I)
(3) (A)-(II), (B) - (III), (C) - (I), (D) - (IV)
(4) (A)-(II), (B)-(IV), (C) - (I), (D) - (III)

Q37. Which of the following is not considered as a type of e-waste?
(1) Televisions
(2) Personal Electronic Devices
(3) Scanner and Copier
(4) Newspaper

Q38. Cat-5, Cat-5E and Cat-6 are examples of which of the following cables ?
(1) Coaxial Cable
(2) Shielded Twisted Pair Cable
(3) Fiber Optic cable
(4) Unshielded Twisted Pair Cable

Q39. _____is an agreement between the communicating parties on how communication is to
proceed over a network.
(1) Ethernet
(2) Protocol
(3) Operating System
(4) Antivirus

Q40. Which of the following protocol defines that how the data is formatted and transmitted over the network?
(1) HTTP
(2) SMTP
(3) FTP
(4) POP3

Q41. Arrange the following electromagnetic waves in increasing order of their frequency range.
(A) Microwaves
(B) Infrared Waves
(C) Light Waves
(D) Radio Waves
Choose the correct answer from the options given below:
(1) (A), (C), (D), (B)
(2) (D), (C), (B), (A)
(3) (B), (A), (D), (C)
(4) (D), (A), (B), (C)

Q42. Which of the following are considered as the threats in network security?
(A) Malware
(B) Virus
(C) Firewall
(D) Keyloggers
Choose the correct combination from the options given below:
(1) (A), (B) and (D) only
(2) (A), (B) and (C) only
(3) (A) and (D) only
(4) (A) and (B) only

Q43. Which of the following is done by secretly listening to a conversation?
(A) Snooping
(B) Denial of Service
(C) Eavesdropping
(D) Buffer Overflow
Choose the correct answer from the options given below:
(1) (A) only
(2) (A) and (C) only
(3) (A) and (D) only
(4) (B) and (C) only

Q44. Match List-I with List-II:

List-I

(A) Cookies

(B) Firewall

(C) Ransomware

(D) Spam

List-II

(I) Type of malware that targets user data

(II) Undetected unsolicited emails or messages

(III) Small file or data packet which is stored by a website on the client's computer

(IV) Network Security system designed to protect a trusted private network

Choose the correct answer from the options given below:
(1) (A)-(III), (B)-(II), (C)-(1), (D)-(IV)
(2) (A)-(III), (B)- (IV), (C)- (I), (D)-(II)
(3) (A)-(III), (B)- (I), (C)- (IV), (D)- (II)
(4) (A)-(III), (B) (IV), (C)-(II), (D)-(I)

Q45.The software developed to detect and remove viruses only is called
(1) Malware
(2) Antivirus
(3) Spyware
(4) Adware

Q46. ________are the set of rules that governs how data can be transmitted over world wide web. 

(1) Hyper Text Transfer Protocol
(2) Encryption Standards
(3) Cyber forensic
(4) Digital Certificates

Q47. What is the difference between COUNT(*) and COUNT(column_name) in a SQL query?
(1) COUNT(*) counts all rows, while COUNT(column_name) counts only non-null values in the specified column
(2) COUNT(*) counts only distinct values, while COUNT(column_name) counts all duplicate values.
(3) COUNT(*) is faster than COUNT(column_name).
(4) There is no difference; they both do the same thing.

Q48. A table Student has two text fields defined as below:
firstname varchar(10)
lastname char(10)
If firstname stores value as 'sachin' and lastname stores value as 'kumar', then firstname will consume____characters space and lastname will consume ____ characters space.
(1) 6,5
(2) 6,10
(3) 10,6
(4) 5,6

Q49. ___________function is used to modify values of a dataframe in conjunction with group by. 

(1) index()
(2) transform()
(3) reindex()
(4) import()

Q50. Which of the following are good net surfing etiquettes?
(A) Share personal information freely
(B) Closing browser tabs after use on public computers
(C) Posting verified facts
(D) Post controversial opinion without regards for others Choose the correct answer from the options given below: 

(1) (A) and (D) only

(2) (B) and (C) only 

(3) (C) and (D) only 

(4) (A) and (C) only