Q1. Which method is used to write multiple strings to a file?

1. write()

2. writelines()

3. writeline()

4. writes()

 

Q2. <a+ > opens the file in _____and  ______mode.

1. append, read

2. append, write

3. read, write

4. binary mode, read.

 

Q3. The file offset position in <wb+> file mode is _____

1. middle of the file

2. end of the file

3. beginning of the file

4. current position

 

Q4. Which of the following statements is not true?

1. Traditional file system increases data redundancy

2. Metadata is data about data

3. Number of rows in a relation called Degree of a relation

4. Candidate Key can be a Primary Key

 

Q5. Consider the following table.

SID

S.Name

Contact No

Age

Course

Year

2301

Rajar

8167782923

20

CS

2022

2302

Kamal

8168842399

21

HIS

2023

2303

Amit

8167832455

20

ECO

2022

2304

Sujana

7987235422

20

MATH

2022

2305

Anina

6276542311

21

ENG

2023

Identify the correct pair of values:

1. Degree = 5: No. of tuples = 6

2. Cardinality 6: Degree = 5

3. Degree-5; Cardinality - 5

4. Degree=6: Cardinality = 6

 

Q6. Which of the following is the limitation of DBMS

1. Data Consistency

2. Increased Complexity

3. Controlled Data redundancy

4. Data Independency

 

Q7. Match List I with List II

LIST I

LIST II

A.

A. DML

I. 

I. Not NULL

B. 

B. Primary Key

II.

II. Create relations

C. 

C. Alter table

III.

III. Insert records

D. 

D. DDL

IV. 

IV. Add attribute

Choose the correct answer from the options given below:

1. A-IV. B-II, C-III, D-I

2. A-I. B-II, C-III, D-IV

3. A-III, B-L, CIV, D-II

4. A-II, B-III, C-IV, D-I

 

Q8. A row in a table is called ____

1. Cardinality

2. Primary Key

3. Tuple

4. Attribute

 

Q9. What is the output of the following SQL query?

SELECT * FROM STUDENTS WHERE SName like 5 and age > 18.

1. Selects details of all those students whose name ends with 'S' and age greater than 18

2. Selects details of all those students whose name starts with 'S and age is greater than 18

3. Selects details of all those students whose name starts and ends with 'S and age is greater than 18

4. Selects details of all those students whose name starts with 'S" or age greater than 18

 

Q10. Let us consider two relations Student and Major as shown in Table I and Table 2 respectively, 

Table 1: Student

Sr. No.

Name

Course

1

Aman

C.S.

2

Ravi

ECO

3

Mohan

HIS

4

Sanjay

MATH

Table 2: Major

Sr. No.

Name

Course

1

Sanjay

MATH

2

Abhay

ENG

3

Sita

HINDI

4

Aman

C.S.

5

Ravi

ECO

How many Tuples will be in the result table after Student U Major operation

1. 9

2. 8

3. 20

4. 6

 

Q11. Which of the following statements is/are true?

(A) Group by function is used to group rows of a table that contain the same values in a specified column. 

(B) The BETWEEN operator used for pattern matching

(C) The IN operator selects values that match any value in the given list of values

(D) COUNT. MAX. MIN. AVG and SUM are multiple row functions work on a set of records and return a single value

(E) Update table is used to change the data in a table

Choose the correct answer from the options given below

1. A, C, D and E only

2. A, B, C and D only

3. B, C, D and E only

4. A, B, D, and E only

 

Q12. Which of the following address is associated with a network adapter (NIC)

1. IP address

2. Port address

3. MAC address

4. URL

 

Q13. Which device maintains a database of domain names and their corresponding IP addresses.

1. HTTP server

2. DNS server

3. Router

4. Gateway

 

Q14. Match List I with List II

LIST I

LIST II

A.

A. MAC address

I. 

I. 32 bits

B. 

B. RJ-45

II.

II. NIC card

C. 

C. IP address

III.

III. 48 bits

D. 

D. Ethernet card

IV. 

IV. Ethernet cables

Choose the correct answer from the options given below:

1. A-III, B-I, C-II, D-IV

2. A-III, B-II, C-I, D-IV

3. A-I. B-II, CIV, D-III

4. A-III, B-IV, C-I, D-II

 

Q15. What will be returned by the given query?

Select INSTR("DBIT BITSIT", "IT").

1. 2

2. 3

3. 10

4. -2

 

Q16. Which statement is correct to check that the series is without elements?

1. STA.empty

2. A null

3. STA.blank

4. TA.nan

 

Q17. STASTB-STA[0:3]-STB['a':c']

As per the above statement, what are the values of objects AssB. Choose correct output-

A class teacher wants to manage her class results on her computer using Pandas. Help her to choose the data structure which is best suited for her to manage class results.

1. Series

2. Numpy Array

3. DataFrame

4. List

 

Q18. ______leads to an error, if there are multiple entries for a column's value for the same values for index (row).

1. Pivot_table( )

2. pivot( )

3. describe( )

4. describe all ( )

 

Q19. ______will drop all rows that have NaN values in them while______will drop only those rows that have all NaN values

1. dropna (how 'all'), dropaa( )

2. dropnal(), dropna (how 'all')

3. fill( )

4. deletena(how = 'all'), deletena( )

 

Q20. Which of the following is are true statements?

(A) Python integer types can not store NaN values. 

(B) Python float types can not store NaN values 

(C) Python integer types can store NaN values 

(D) Python float types can store NaN values

Choose the correct answer from the options given below:

1. B and C only

2. A and B only

3. C and D only

4. A and D only

 

Q21. Which of the following is not a line style?

1. Solid

2. dotted

3. dashdot

4. Darke

 

Q22. What is the full form of OGD?

1. Open Governance Data

2. Open Government Data

3. Only Government Data

4. Open Government Digital

 

Q23. To define the limit of axes of a chart, which function can be used?

1. xlabel() and ylabel()

2. xticks() and yticks()

3. xlimit) and ylimit()

4. xlim and ylim()

 

Q24. Match List I with List II

List I

List II

A.

IP Address

I. 

www.ncert.nic.in

B. 

URL

II.

FC:F8:AE:CE:7B:16

C. 

Domain Name

III.

https://www.cbse.nic.in/skillsubject

D. 

MAC

IV. 

164.100.163.65

Choose the correct answer from the options given below:

1. A-III, B-IV, C-I, D-II

2. A-IV, B-III, C-II, D-I

3. A-IV, B-III C-I, D-II

4. A-III, B-II, C-I, D-IV

 

Q25. Modulation is the process of ____________

1. Sending a file from one computer to another computer

2. converting digital signals to analog signals

3. converting analog signals to digital signals

4. echoing every character that is received

 

Q26. Match List I with List II

List I

List II

A.

Mesh

I. 

Nodes connected linearly

B. 

Bus

II.

in connections

C. 

Ring

III.

Central device connected to all nodes

D. 

Star

IV. 

n*(n−1)/2n connections

Choose the correct answer from the options given below:

1. A-II, B-I, C-IV, D-III

2. A-IV, B-I, C-II, D-III

3. A-II, B-IV, C-I, D-III

4. A-I, B-IV, C-II, D-III

 

Q27. The number of pins in an RJ45 connector is:

1. 5

2. 6

3. 8

4. 10

 

Q28. A sender wants to transmit their data at the rate of 3200 bit-per 16 second. What will be the data rate of the channel?

1. 1200 bps.

2. 200 bps

3. 2000 bps

4. 3216 bps

 

Q29. Which of the following is measured in Kbps. Mbps and Gbps?

1. Memory capacity

2. Data Transfer Rate

3. Bandwidth

4. Radio Waves

 

Q30. The File Transfer Protocol (FTP) requires a reliable transport service. Which protocol of the TCP/IP suite does it use?

1. Transmission Control Protocol (TCP)

2. Simple Mail Transfer Protocol (SMTP)

3. Telnet

4. Hyper Text Transfer Protocol (HTTP) 

 

Q31. Which of the following are correct about firewall?

(A) Firewall can be implemented only in software

(B) Firewall can be implemented only in hardware

(C) Firewall can be implemented both hardware as well as software

(D) Firewall can be implemented among two or more networks

(E) Firewall act as a first barrier against malware

Choose the correct answer from the options given below:

1. A, C, D and E only

2. A, B, D and E only

3. C, D and E only

4. A, C, D and E only

 

Q32. A scenario wherein a hacker limit or stop an authorised used to access service, device or other resource by overloading that resource with illegitimate request-

1. DOS (Denial of Service)

2. Spoofing

3. Eavesdropping

4. Gray hats

 

Q33. When a hacker uses knowledge to find and help in fixing the security flaws in the system is called-

1. Unethical Hacking

2. Ethical Hacking

3. Black Hat Hacking

4. Grey Hat Hacking

 

Q34. A_________is a hardware device or software program that prevents unwanted traffic,

1. Firewall

2. Denial of service (DoS)

3. Malware

4. Virus

 

Consider the following table and answer the questions that follow:

Teacher

No

Name

Age

Department

Doj

Salary

Sex

1

jagan

34

Comp

10/1/97

12000

M

2

Sheena

31

Hist

24/3/98

NULL

F

3

Sandeep

32

Maths

12/12/98

30000

M

4

Sangita

35

Hist

01/07/99

10000

F

5

Rohit

42

Maths

05/09/97

25000

M

6

Sharma

50

Hist

27/06/98

30000

M

7

Amit

44

Comp

25/02/97

21000

M

8

Girisha

NULL

Maths

31/07/97

20000

F

Q35. Choose the correct output of the following SQL query

Select min Doj) from Teacher.

1. 01/07/99

2. 25/02/97

3. 31/07/97

4. 10/197

 

Q36. select count Age) from Teacher.

1. 9

2. 7

3. 8

4. NULL

 

Q37. Choose the correct query to display Names of Teachers along with Salary of those Teachers who are in History department?

1. Select Name from Teacher where Department- 'History':

2. Select Name, Salary from Teacher where Department = 'Hist":

3. Select Name, Salary from Teacher where Department History':

4. Select Salary from Teacher where Department = 'Hist":

 

Q38. Suppose the teacher with No - 7 left the school, suggest the correct query to delete that record from the teacher table:

1. Delete from Teacher:

2. Delete from Teacher where No = 7;

3. Delete from Teacher, where No - 17:

4. Delete from Teacher where No = 7

 

Q39. Choose the correct statement with reference to SQL table Teacher

(A) Alter table Teacher is used to make changes in the structure of the table

(B) Upate Teacher is used to modify existing data in the table

(C) Desc Teacher will display the tuples in sorted order

(D) Select * from Teacher will display all the attributes along with their data types.

Choose the correct answer from the options given below:

1. A, Band D only

2. C and D only

3. A and D only

4. B, C and D only

 

Consider the following paragraph and answer the questions that follow:

Mohan keeps working on various IT projects. He is continuously online for many hours. Many a times while working on various softwares, he is required to share his personal sensitive information like mobile number. date of birth etc. He has started facing a number of problems while working on his computer.

1. His bank account showed a debit transaction of 50.000, which was not done by him

2. He cannot open some of the applications

3. He has started getting junk emails.

4. Many a times unwanted advertisements have started popping up onto his computer.

5. He has started getting backache, shoulder pain and stress.

Q41. The unwanted and unnecessary advertisements that have started poping up on his system. According to you. which of the following may be the reason?

1. Virus

2. Trojan

3. Adware

4. Hacking

 

Q42. As his account was hacked and a debit transaction was made in his bank account. What do you suggest him to install?

1. Router

2. Firewall

3. Antivirus

4. Modem

 

Q43. He has started facing health issues. These can be resolved by arranging and designing the workplace including furniture and system. These changes come under which of the following branch of science?

1. Carcinogenic

2. Leaching

3. e-waste management

4. Ergonomics

 

Q44. Mohan is blocked from accessing data and some money is demanded. This is an example of -

1. Trojan attack

2. adware

3. Malware

4. Ransomware

 

Q45. As Mohan remains online continuously for hours, what is he leaving on the internet?

1. Digital footprints

2. Digital Handprints

3. Offline Footprints

4. Online Handprints

 

Q46. The purpose of attribute dataframe.dtypes is:

1. To display data type of each column in the dataframe.

2. To display a tuple representing the dimensionality of the dataframe.

3. To display the first n rows in the dataframe,

4. To display the last n rows in the dataframe.

 

Q47. Match List I with List II

List I

List II

A.

DataFrame.min()

I. 

Display the minimum values from the DataFrame.

B. 

DataFrame.sum()

II.

Display the sum of the values from the DataFrame.

C. 

DataFrame.court()

III.

Display the middle value of the data.

D. 

DataFrame.median()

IV. 

Display the total number of values for each column or row of a DataFrame.

Choose the correct answer from the options given below.

1. A-II, B-I, C-IV, D-III

2. A-I, B-II, C-IV, D-III

3. A-III, B-IV, C-I, D-II

4. A-IV, B-II, C-I, D-III

 

Q48. Which of the following is a Frequency range of Radio waves?

1. 3 KHz - 1 GHz

2. 1 GHz - 300 GHz

3. 300 GHz 400 THz

4. 400 THz-900 THz

 

Q49. The e-banking page logged out automatically by___________

1. Authentication cookies

2. Session cookies

3. Super cookies

4. Zombie cookies

 

Q50. Which of the following is correct code to plot line Chart with dotted linestyle?

1. plt.plot(x, y)

plt.linestyle "dotted"

plt.show( )

2. plt.plot(x, y)

plt.linestyle | "dotted")

plt.show ( )

3. plt.plot(x, y), linestyle-dotted)

plt.show( )

4. plt.plot(x, y, linestyle = "dotted")

plt.show( )