CUET Computer Science Question Paper 2024 is available here for download. NTA conducted CUET 2024 Computer Science paper on 22 May in Shift 1. CUET Computer Science Question Paper 2024 is based on objective-type questions (MCQs). Candidates get 60 minutes to solve 40 MCQs out of 50 in CUET 2024 question paper for Computer Science.
CUET Computer Science Question Paper 2024 PDF Download
| CUET 2024 Computer Science Question Paper with Solution | Check Solutions |
CUET Computer Science Question Paper 2024 with Solution
Question 1:
Which of the following are used in python exception handling?
(A) try
(B) except
(C) finally
(D) seek
Choose the correct answer from the options given below:
Match List-I with List-II:
List-I
(A) f.seek(-10,1)
(B) f.seek(10,1)
(C) f.seek(10)
(D) f.seek(-10,2)
List-II
(II) From current position, move 10 bytes backward
(III) From current position, move 10 bytes forward
(I) From beginning of file, move 10 bytes forward
(IV) From end of the file, move 10 bytes backward
Choose the correct answer from the options given below:
Arrange the following in correct order of exception handling in python:
(A) Write the code that may raise an exception inside a try block
(B) Execute some code regardless of whether the exception occurs or not using the finally block
(C) Handle the specific exception using the except block
(D) Raise the exception using the raise statement if necessary
Choose the correct answer from the options given below:
How many candidate keys are possible with the table below?
(Table with columns: RollNo, Name, Mobile, City)
Which of the following is not a limitation of file systems?
Match List-I with List-II:
List-I
(A) Controlled Data Sharing
(B) Data Isolation
(C) Data Dependence
(D) Data Inconsistency
List-II
(II) Limited Access given to users
(III) There is no mapping between two files
(IV) If the structure of a file is changed, all the existing programs accessing that file also need to be changed
(I) Same data maintained in different places does not match
Choose the correct answer from the options given below:
Which of the following is called database instance?
What is the output of the following SQL statement? SQL: SELECT MID('CUET2024',2,5)
SQL applies conditions on the groups through ____ clause after groups have been formed.
Consider the following two tables emp1 and emp2:
emp1 (Id, Name) : (1, Amit), (2, Punita)
emp2 (Id, Name) : (1, Punita), (2, Anand)
What is the output of the following query? SELECT name from emp1 minus SELECT name from emp2;
Which of the following statement(s) is/are TRUE regarding computer network?
(A) Interspace is a software that allows multiple users in a client-server environment to communicate with each other by sending and receiving data of various types.
(B) IP address is a unique permanent value associated with a network adapter called a NIC.
(C) A computer network is an interconnection among two or more computers or computing devices to share data and resources.
(D) The term 'Workstation' refers to the most powerful computer of the network that facilitates sharing of data, software, and hardware resources on the network and has more memory, processing power, and storage than a normal node.
Choose the correct answer from the options given below:
Communication over mobile phone is an example of which type of communication mode?
Which of the following device provides the necessary translation of data received from network into a format or protocol recognized by devices within the internal network?
A long cable that helps to connect several devices in bus topology having terminators at both ends to prevent signal bounce is known as ________.
Match List-I with List-II:
List-I
(A) readline()
(B) writelines()
(C) seek()
(D) flush()
List-II
(I) Writes a sequence of strings to the file
(II) Reads a single line from the file
(III) Force any buffered output to be written to the file
(IV) Moves the file pointer to the specified position
Choose the correct answer from the options given below:
What is pickling?
Consider the following code and specify the correct order of the statements to be written:
Code:
(A) f.write("CUET EXAMINATION”)
(B) f=open("CUET.TXT", "w")
(C) print("Data is Written Successfully")
(D) f.close()
Choose the correct answer from the options given below:
Which method from below will take a file pointer to nth character with respect to r position?
Evaluate the given postfix expression: Expression: 3 5 * 6 + 2 3 * -
Stack works on the principle of ________.
Match List-I with List-II:
List-I (Term)
(A) Prefix
(B) Postfix
(C) Queue
(D) Stack
List-II (Description)
(I) In this, the element entered first will be removed last
(II) In this, the element entered first will be removed first.
(III) In this, the operator is placed before the operands.
(IV) In this, the operator is placed after the operands.
Choose the correct answer from the options given below:
What will be the sequence of elements removed from the stack after performing the following operations?
Operations:
PUSH(10)
PUSH(20)
POP()
POP()
PUSH(30)
PUSH(40)
POP()
POP()
Options:
(A) 10
(B) 20
(C) 30
(D) 40
Choose the correct sequence from the options given below:
In Python, ______ module needs to be imported for implementing Double Ended Queue.
What will be the position of front and rear after execution of the following statements, the Queue already had the given elements in FIFO order:
F-> 50 -> 90 -> 7 -> 21 -> 73 -> 77->R
dequeue()
dequeue()
dequeue()
dequeue()
dequeue()
enqueue(100)
dequeue()
________ data type is used to implement Queue data structure in Python.
Choose the statements that are correct.
(A) For Binary Search, all the elements have to be sorted.
(B) For Linear Search, all the elements have to be sorted.
(C) Linear Search takes less time for searching in worst case than binary search's worst case.
(D) Linear Search always gives fast result whether elements are sorted or not.
Choose the correct answer from the options given below:
Arrange the following in the ascending order of their time complexity.
(A) Worst Case of Linear Search
(B) Best Case of Binary Search
(C) Worst Case of Binary Search
(D) Worst Case of Bubble Sort
Choose the correct sequence from the options given below:
How many minimum number of comparison(s) can be required to search an element from 'n' elements, in case of Linear Search?
Which of the statement(s) is/are True for the given question.
Data elements are: 7, 5, 17, 13, 9, 27, 31, 25, 35.
Hash Table Size: 7
Hash Function: H(I) = (Data element) mod (Hash Table Size)
(A) Element 27 will create collision.
(B) Element 25 will create collision.
(C) Element 35 will create collision.
(D) Element 31 will create collision.
Choose the correct answer from the options given below:
If a list contains 'n' number of elements and all the elements are by default sorted in ascending order, how many comparisons will be required during 1st pass of bubble sort to arrange the list in ascending order?
What will be the result after pass 2 using Bubble Sort, if we are sorting elements in ascending order?
Initial List: 7 19 18 9 23 51 12 54 73
______ compares neighboring elements only and swaps them when necessary.
______ are the unorganized facts that can be processed to generate meaningful information.
______ is the positive square root of the average of squared differences of each value from the mean.
Consider the stock prices for shares of a company A for a week. To find the difference of maximum and minimum value of the share price which statistical technique can be used:
What is the primary difference between a database and a file system?
A domain in a relational database refers to:
A relation in a relational database is also known as:
The primary key is chosen from ________.
An alternate key is ________.
Consider the following SQL functions:
(A) CURDATE()
(B) CURRENT_DATE()
(C) CURRENT_DATE
(D) TODAY()
Which of the following is correct syntax for inserting foreign key constraint in a relation?
What is the result of the following arithmetic operation in SQL? SELECT 5 + NULL AS RESULT
Which of the following expressions in SQL would calculate the square root of 16?
Question 45:
Which of the following statement(s) is/are TRUE in respect of Media Access Control (MAC) Address?
(A) It can be changed if a node is removed from one network and connected to another network.
(B) Each MAC address is a 12-digit hexadecimal number.
(C) It is a unique value associated with a network adapter called NIC.
(D) It is provided by the Internet Service Provider to locate computers connected to the internet.
Choose the correct answer from the options given below:
Match List-I with List-II:
List-I (Device)
(A) RJ45 Connector
(B) Bridge
(C) Gateway
(D) Repeater
List-II (Use)
(I) Relay frames between two originally separate segments that follow same protocols.
(II) Amplifies a signal that is transmitted across the network so that the signal is received same as it is sent.
(III) Establishes an intelligent connection between a local area network and external networks with completely different structures.
(IV) Plug-in device primarily used for connecting LANs particularly Ethernet.
What is the purpose of Domain Name System (DNS) Server in networking?
140.168.220.200 is a 32-bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 separated by decimal points. What is this number called?
In a ______ topology, if there are n devices in a network, each device has (n-1) ports for cables.
Amit wants to be familiar with SQL. One of his friends Anand suggests him to execute the following SQL commands:
(A) Create Table Student
(B) Use Database DB
(C) Select * from Student
(D) Insert into Student
In which order Amit needs to run the above commands?





Comments