CUET Computer Science Question Paper 2024 (Available)- Download Solutions and Answer Key pdf

Shivam Yadav's profile photo

Shivam Yadav

Updated on - Jan 13, 2026

CUET Computer Science Question Paper 2024 is available here for download. NTA conducted CUET 2024 Computer Science paper on 22 May in Shift 1. CUET Computer Science Question Paper 2024 is based on objective-type questions (MCQs). Candidates get 60 minutes to solve 40 MCQs out of 50 in CUET 2024 question paper for Computer Science.

CUET Computer Science Question Paper 2024 PDF Download

CUET 2024 Computer Science Question Paper with Solution download iconDownload Check Solutions

CUET Computer Science Question Paper 2024 with Solution

Question 1:

Which of the following are used in python exception handling?

(A) try
(B) except
(C) finally
(D) seek

Choose the correct answer from the options given below:

  • (1) (A), (B), and (D) only
  • (2) (A), (B), and (C) only
  • (3) (A), (B), (C), and (D)
  • (4) (B), (C), and (D) only

Question 2:

Match List-I with List-II:

List-I
(A) f.seek(-10,1)
(B) f.seek(10,1)
(C) f.seek(10)
(D) f.seek(-10,2)

List-II
(II) From current position, move 10 bytes backward
(III) From current position, move 10 bytes forward
(I) From beginning of file, move 10 bytes forward
(IV) From end of the file, move 10 bytes backward

Choose the correct answer from the options given below:

  • (1) (A) - (I), (B) - (II), (C) - (III), (D) - (IV)
  • (2) (A) - (II), (B) - (III), (C) - (IV), (D) - (I)
  • (3) (A) - (III), (B) - (II), (C) - (IV), (D) - (I)
  • (4) (A) - (II), (B) - (III), (C) - (I), (D) - (IV)

Question 3:

Arrange the following in correct order of exception handling in python:

(A) Write the code that may raise an exception inside a try block
(B) Execute some code regardless of whether the exception occurs or not using the finally block
(C) Handle the specific exception using the except block
(D) Raise the exception using the raise statement if necessary

Choose the correct answer from the options given below:

  • (1) (A), (B), (C), (D)
  • (2) (A), (C), (B), (D)
  • (3) (B), (A), (D) ,(C)
  • (4) (C), (B), (D), (A)

Question 4:

How many candidate keys are possible with the table below?

(Table with columns: RollNo, Name, Mobile, City)

  • (1) One
  • (2) Two
  • (3) Three
  • (4) Four

Question 5:

Which of the following is not a limitation of file systems?

  • (1) Data Redundancy
  • (2) Data Inconsistency
  • (3) Data dependence
  • (4) Storing Space

Question 6:

Match List-I with List-II:

List-I
(A) Controlled Data Sharing
(B) Data Isolation
(C) Data Dependence
(D) Data Inconsistency

List-II
(II) Limited Access given to users
(III) There is no mapping between two files
(IV) If the structure of a file is changed, all the existing programs accessing that file also need to be changed
(I) Same data maintained in different places does not match

Choose the correct answer from the options given below:

  • (1) (A) - (II), (B) - (III), (C) - (IV), (D) - (I)
  • (2) (A) - (II), (B) - (III), (C) - (I), (D) - (IV)
  • (3) (A) - (IV), (B) - (II), (C) - (III), (D) - (I)
  • (4) (A) - (III), (B) - (IV), (C) - (I), (D) - (II)

Question 7:

Which of the following is called database instance?

  • (1) Overall design of the database
  • (2) The snapshot of the database at any given time
  • (3) Data about the data
  • (4) Restriction on the type of data inserted

Question 8:

What is the output of the following SQL statement? SQL: SELECT MID('CUET2024',2,5)

  • (1) UET2
  • (2) UET20
  • (3) ET202
  • (4) CUET2

Question 9:

SQL applies conditions on the groups through ____ clause after groups have been formed.

  • (1) where
  • (2) having
  • (3) new
  • (4) all

Question 10:

Consider the following two tables emp1 and emp2:
emp1 (Id, Name) : (1, Amit), (2, Punita)
emp2 (Id, Name) : (1, Punita), (2, Anand)
What is the output of the following query? SELECT name from emp1 minus SELECT name from emp2;

  • (1) Punita
  • (2) Amit
  • (3) Anand
  • (4) Amit, Punita

Question 11:

Which of the following statement(s) is/are TRUE regarding computer network?

(A) Interspace is a software that allows multiple users in a client-server environment to communicate with each other by sending and receiving data of various types.
(B) IP address is a unique permanent value associated with a network adapter called a NIC.
(C) A computer network is an interconnection among two or more computers or computing devices to share data and resources.
(D) The term 'Workstation' refers to the most powerful computer of the network that facilitates sharing of data, software, and hardware resources on the network and has more memory, processing power, and storage than a normal node.

Choose the correct answer from the options given below:

  • (1) (A) and (C) only
  • (2) (A), (B) and (C) only
  • (3) (C) and (D) only
  • (4) (B) and (D) only

Question 12:

Communication over mobile phone is an example of which type of communication mode?

  • (1) Simplex
  • (2) Half-Duplex
  • (3) Full-Duplex
  • (4) Double-Duplex

Question 13:

Which of the following device provides the necessary translation of data received from network into a format or protocol recognized by devices within the internal network?

  • (1) Bridge
  • (2) Gateway
  • (3) Router
  • (4) Modem

Question 14:

A long cable that helps to connect several devices in bus topology having terminators at both ends to prevent signal bounce is known as ________.

  • (1) Drop Line
  • (2) Taps
  • (3) Analog Cable
  • (4) Backbone

Question 15:

Match List-I with List-II:

List-I
(A) readline()
(B) writelines()
(C) seek()
(D) flush()

List-II
(I) Writes a sequence of strings to the file
(II) Reads a single line from the file
(III) Force any buffered output to be written to the file
(IV) Moves the file pointer to the specified position

Choose the correct answer from the options given below:

  • (1) (A) - (I), (B) - (II), (C) - (III), (D) - (IV)
  • (2) (A) - (II), (B) - (I), (C) - (IV), (D) - (III)
  • (3) (A) - (II), (B) - (I), (C) - (III), (D) - (IV)
  • (4) (A) - (III), (B) - (IV), (C) - (I), (D) - (II)

Question 16:

What is pickling?

  • (1) It is used to deserialize objects, i.e., converting the byte stream to object hierarchy.
  • (2) It is used to serialize objects, i.e., to convert Python object hierarchy to byte stream.
  • (3) It is used to move the file pointer to a specific location.
  • (4) It is used in exception handling.

Question 17:

Consider the following code and specify the correct order of the statements to be written:

Code:
(A) f.write("CUET EXAMINATION”)
(B) f=open("CUET.TXT", "w")
(C) print("Data is Written Successfully")
(D) f.close()

Choose the correct answer from the options given below:

  • (1) (A), (B), (C), (D)
  • (2) (B), (A), (C), (D)
  • (3) (B), (D), (C), (A)
  • (4) (B), (D), (A), (C)

Question 18:

Which method from below will take a file pointer to nth character with respect to r position?

  • (1) fp.seek(r)
  • (2) fp.seek(n)
  • (3) fp.seek(n,r)
  • (4) seek(n,r).fp

Question 19:

Evaluate the given postfix expression: Expression: 3 5 * 6 + 2 3 * -

  • (1) 39
  • (2) 15
  • (3) -9
  • (4) -17

Question 20:

Stack works on the principle of ________.

  • (1) Mid Element First
  • (2) First In First Out
  • (3) Last In First Out
  • (4) Last In Last Out

Question 21:

Match List-I with List-II:

List-I (Term)
(A) Prefix
(B) Postfix
(C) Queue
(D) Stack

List-II (Description)
(I) In this, the element entered first will be removed last
(II) In this, the element entered first will be removed first.
(III) In this, the operator is placed before the operands.
(IV) In this, the operator is placed after the operands.

Choose the correct answer from the options given below:

  • (1) (A) - (III), (B) - (IV), (C) - (II), (D) - (I)
  • (2) (A) - (IV), (B) - (III), (C) - (II), (D) - (I)
  • (3) (A) - (I), (B) - (II), (C) - (IV), (D) - (III)
  • (4) (A) - (II), (B) - (I), (C) - (III), (D) - (IV)

Question 22:

What will be the sequence of elements removed from the stack after performing the following operations?

Operations:
PUSH(10)
PUSH(20)
POP()
POP()
PUSH(30)
PUSH(40)
POP()
POP()

Options:
(A) 10
(B) 20
(C) 30
(D) 40

Choose the correct sequence from the options given below:

  • (1) (A), (B), (C), (D)
  • (2) (B), (A), (D), (C)
  • (3) (B), (A), (D), (C)
  • (4) (B), (A), (C), (D)

Question 23:

In Python, ______ module needs to be imported for implementing Double Ended Queue.

  • (1) counter
  • (2) collections
  • (3) random
  • (4) numpy

Question 24:

What will be the position of front and rear after execution of the following statements, the Queue already had the given elements in FIFO order:
F-> 50 -> 90 -> 7 -> 21 -> 73 -> 77->R
dequeue()
dequeue()
dequeue()
dequeue()
dequeue()
enqueue(100)
dequeue()

  • (1) Front 50, Rear 77
  • (2) Front 100, Rear 100
  • (3) Front 77, Rear 100
  • (4) Front 73, Rear 77

Question 25:

________ data type is used to implement Queue data structure in Python.

  • (1) Sets
  • (2) Dictionary
  • (3) Tuple
  • (4) List

Question 26:

Choose the statements that are correct.

(A) For Binary Search, all the elements have to be sorted.
(B) For Linear Search, all the elements have to be sorted.
(C) Linear Search takes less time for searching in worst case than binary search's worst case.
(D) Linear Search always gives fast result whether elements are sorted or not.

Choose the correct answer from the options given below:

  • (1) (A) only
  • (2) (A) and (C) only
  • (3) (B), and (C) only
  • (4) (A), (B), and (D) only

Question 27:

Arrange the following in the ascending order of their time complexity.

(A) Worst Case of Linear Search
(B) Best Case of Binary Search
(C) Worst Case of Binary Search
(D) Worst Case of Bubble Sort

Choose the correct sequence from the options given below:

  • (1) (A), (B), (C), (D)
  • (2) (B), (D), (A), (C)
  • (3) (B), (A), (C), (D)
  • (4) (B), (C), (A), (D)

Question 28:

How many minimum number of comparison(s) can be required to search an element from 'n' elements, in case of Linear Search?

  • (1) 1
  • (2) n - 1
  • (3) n
  • (4) n + 1

Question 29:

Which of the statement(s) is/are True for the given question.

Data elements are: 7, 5, 17, 13, 9, 27, 31, 25, 35.
Hash Table Size: 7
Hash Function: H(I) = (Data element) mod (Hash Table Size)

(A) Element 27 will create collision.
(B) Element 25 will create collision.
(C) Element 35 will create collision.
(D) Element 31 will create collision.

Choose the correct answer from the options given below:

  • (1) (A), (B), and (C) only
  • (2) (A), (C), and (D) only
  • (3) (B), (C), and (D) only
  • (4) (A), and (D) only

Question 30:

If a list contains 'n' number of elements and all the elements are by default sorted in ascending order, how many comparisons will be required during 1st pass of bubble sort to arrange the list in ascending order?

  • (1) 0
  • (2) 1
  • (3) n - 1
  • (4) n

Question 31:

What will be the result after pass 2 using Bubble Sort, if we are sorting elements in ascending order?

Initial List: 7 19 18 9 23 51 12 54 73

  • (1) 7 18 19 9 23 12 51 54 73
  • (2) 7 9 18 19 12 23 51 54 73
  • (3) 7 9 19 18 12 23 51 54 73
  • (4) 7 9 18 19 23 51 12 54 73

Question 32:

______ compares neighboring elements only and swaps them when necessary.

  • (1) Selection Sort
  • (2) Bubble Sort
  • (3) Insertion Sort
  • (4) Quick Sort

Question 33:

______ are the unorganized facts that can be processed to generate meaningful information.

  • (1) Information
  • (2) Data
  • (3) Blog
  • (4) Contexts

Question 34:

______ is the positive square root of the average of squared differences of each value from the mean.

  • (1) Mode
  • (2) Variance
  • (3) Median
  • (4) Standard Deviation

Question 35:

Consider the stock prices for shares of a company A for a week. To find the difference of maximum and minimum value of the share price which statistical technique can be used:

  • (1) Range
  • (2) Mode
  • (3) Mean
  • (4) Median

Question 36:

What is the primary difference between a database and a file system?

  • (1) Databases are slower than file systems for retrieving data.
  • (2) Databases offer structured data and relationships, while file systems do not.
  • (3) File systems can support complex queries, unlike databases.
  • (4) Both databases and file systems handle data in the same way.

Question 37:

A domain in a relational database refers to:

  • (1) The overall database structure
  • (2) A specific set of valid values for an attribute
  • (3) A table containing multiple records
  • (4) A relationship between two tables

Question 38:

A relation in a relational database is also known as:

  • (1) A data type
  • (2) An attribute
  • (3) A schema
  • (4) A table

Question 39:

The primary key is chosen from ________.

  • (1) The most complex candidate key available.
  • (2) All available candidate keys for a table.
  • (3) The simplest candidate key available.
  • (4) Any attribute within the table.

Question 40:

An alternate key is ________.

  • (1) Another name for the primary key
  • (2) A unique identifier besides the primary key
  • (3) A relationship between two tables
  • (4) A synonym for a tuple

Question 41:

Consider the following SQL functions:

(A) CURDATE()
(B) CURRENT_DATE()
(C) CURRENT_DATE
(D) TODAY()

  • (1) (A), (B), and (D) only
  • (2) (A), (B), and (C) only
  • (3) (A), (B), (C) and (D)
  • (4) (B), (C), and (D) only

Question 42:

Which of the following is correct syntax for inserting foreign key constraint in a relation?

  • (1) ALTER TABLE table_name ADD FOREIGN KEY(attribute name) REFERENCES referenced_table_name(attribute name)
  • (2) ADD TABLE table_name ADD FOREIGN KEY(attribute name) REFERENCES referenced_table_name(attribute name)
  • (3) ALTER TABLE table_name REFERENCES referenced_table_name(attribute name) ADD FOREIGN KEY(attribute name)
  • (4) MODIFY TABLE table_name ADD FOREIGN KEY(attribute name) REFERENCES referenced_table_name(attribute name)

Question 43:

What is the result of the following arithmetic operation in SQL? SELECT 5 + NULL AS RESULT

  • (1) 5
  • (2) NULL
  • (3) 0
  • (4) 5NULL

Question 44:

Which of the following expressions in SQL would calculate the square root of 16?

  • (1) POWER(16,2)
  • (2) POWER(16,0.5)
  • (3) POWER(16,1)
  • (4) MOD(16)

Question 45:

Which of the following statement(s) is/are TRUE in respect of Media Access Control (MAC) Address?

(A) It can be changed if a node is removed from one network and connected to another network.
(B) Each MAC address is a 12-digit hexadecimal number.
(C) It is a unique value associated with a network adapter called NIC.
(D) It is provided by the Internet Service Provider to locate computers connected to the internet.

Choose the correct answer from the options given below:

  • (1) (B) and (C) only
  • (2) (A), (B), and (C) only
  • (3) (C) and (D) only
  • (4) (A) and (B) only

Question 46:

Match List-I with List-II:

List-I (Device)
(A) RJ45 Connector
(B) Bridge
(C) Gateway
(D) Repeater

List-II (Use)
(I) Relay frames between two originally separate segments that follow same protocols.
(II) Amplifies a signal that is transmitted across the network so that the signal is received same as it is sent.
(III) Establishes an intelligent connection between a local area network and external networks with completely different structures.
(IV) Plug-in device primarily used for connecting LANs particularly Ethernet.

  • (1) (A) - (IV), (B) - (III), (C) - (II), (D) - (I)
  • (2) (A) - (III), (B) - (II), (C) - (I), (D) - (IV)
  • (3) (A) - (III), (B) - (I), (C) - (IV), (D) - (II)
  • (4) (A) - (IV), (B) - (I), (C) - (III), (D) - (II)

Question 47:

What is the purpose of Domain Name System (DNS) Server in networking?

  • (1) To encrypt data during transmission.
  • (2) To convert domain names into IP addresses.
  • (3) To regulate network traffic flow.
  • (4) To establish a secure connection between devices.

Question 48:

140.168.220.200 is a 32-bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 separated by decimal points. What is this number called?

  • (1) IP Address
  • (2) Web Address
  • (3) MAC Address
  • (4) Port Address

Question 49:

In a ______ topology, if there are n devices in a network, each device has (n-1) ports for cables.

  • (1) Mesh
  • (2) Bus
  • (3) Star
  • (4) Ring

Question 50:

Amit wants to be familiar with SQL. One of his friends Anand suggests him to execute the following SQL commands:

(A) Create Table Student
(B) Use Database DB
(C) Select * from Student
(D) Insert into Student

In which order Amit needs to run the above commands?

  • (1) (A), (B), (C), (D)
  • (2) (A), (B), (D), (C)
  • (3) (B), (A), (D), (C)
  • (4) (C), (B), (D), (A)


0

Fees Structure

Structure based on different categories

CategoriesState
General1750
sc1650

In case of any inaccuracy, Notify Us! 

Comments


No Comments To Show