The CUET Computer Science 2025 exam was held from 13th May to 3rd June, with question paper, answer key, and solutions available for download here. It covers programming concepts, data structures, logic gates, networking, and database management.
Students must attempt 50 questions in 60 minutes. The paper carries 250 marks, with +5 for correct and –1 for incorrect responses.
CUET UG Computer Science 2025 Question Paper with Solutions PDF
Question 1:
Identify the relational algebra operation denoted by:
\[ Course X Student; \]
where 'Course' and 'Student' are two relations and X is an operation.
- (A) Union
- (B) Set Difference
- (C) Cartesian Product
- (D) Intersection
Question 2:
Given the following relations:
TableA
![]()
TableB
![]()
Find \( TableA \cup TableB \).
![]()
Question 3:
Given two relations:
Employee with structure as (ID, Name, Address, Phone, Deptno)
Department with structure as (Deptno, Dname)
_____ is used to represent the relationship between two relations Employee and Department.
- (A) Primary key
- (B) Alternate key
- (C) Foreign key
- (D) Candidate key
Question 4:
A _____ value is specified for the column, if no value is provided.
- (A) unique
- (B) null
- (C) default
- (D) primary
Question 5:
Given table 'StudAtt' with structure as (Rno, Attdate, Attendance).
Identify the suitable command to add a primary key to the table after creation.
Note: We want to make both Rno and Attdate columns as primary key.
- (A) ALTER TABLE StudAtt ADD PRIMARY KEY(Rno, Attdate);
- (B) CREATE TABLE StudAtt ADD PRIMARY KEY(Rno);
- (C) ALTER TABLE StudAtt ADD PRIMARY KEY;
- (D) ALTER TABLE StudAtt ADD PRIMARY KEY(Rno) AND PRIMARY KEY(Attdate);
Question 6:
The SELECT command when combined with DISTINCT clause is used to:
- (A) returns records without repetition
- (B) returns records with repetition
- (C) returns all records with conditions
- (D) returns all records without checking
Question 7:
__________________ is used to search for a specific pattern in a column.
- (A) Between operator
- (B) In operator
- (C) Like operator
- (D) Null operator
Question 8:
Give the output of the query: SELECT MONTH("2010-03-05");
- (A) 3
- (B) 5
- (C) MARCH
- (D) MAY
Question 9:
Match List-I with List-II:
![]()
- (A) (A)-(III), (B)-(I), (C)-(II), (D)-(IV)
- (B) (A)-(I), (B)-(III), (C)-(II), (D)-(IV)
- (C) (A)-(II), (B)-(III), (C)-(IV), (D)-(I)
- (D) (A)-(III), (B)-(IV), (C)-(I), (D)-(II)
Question 10:
Given Relation: STUDENT
Find the value of: SELECT AVG(MARKS) FROM STUDENT;
- (A) 30
- (B) 22.5
- (C) 90
- (D) 23
Question 11:
_____ operation is used to get the common tuples from two relations.
- (A) Union
- (B) Intersect
- (C) Set Difference
- (D) Cartesian product
Question 12:
Identify the correct IP address from the options given:
- (A) FC:F8:AE:CE:7B:16
- (B) 192.168.256.178
- (C) 192.168.0.178
- (D) 192.168.0.-1
Question 13:
Arrange the following Python code segments in order with respect to exception handling:
- (A) except ZeroDivisionError:
print("Zero denominator not allowed")
- (B) finally:
print("Over and Out")
- (C) try:
n = 50
d = int(input("enter denominator"))
q = n/d
print("division performed")
- (D) else:
print("Result=", q)
- (A) (C), (A), (B), (D)
- (B) (C), (A), (D), (B)
- (C) (B), (A), (D), (C)
- (D) (C), (B), (D), (A)
Question 14:
_____ is the process of transforming data or an object in memory (RAM) to a stream of bytes called byte streams.
- (A) read()
- (B) write()
- (C) Pickling
- (D) De-serialization
Question 15:
Identify the correct code to read data from the file notes.dat in a binary file:
- (A) import pickle f1=open("notes.dat","r") data=pickle.load(f1) print(data) f1.close()
- (B) import pickle f1=open("notes.dat","rb") data=f1.load() print(data) f1.close()
- (C) import pickle f1=open("notes.dat","rb") data=pickle.load(f1) print(data) f1.close()
- (D) import pickle f1=open("notes.dat","rb") data=f1.read() print(data) f1.close()
Question 16:
Identify the correct python statement to open a text file "data.txt" in both read and write mode.
- (A) file.open("data.txt")
- (B) file.open("data.txt","r+")
- (C) file.open("data.txt","rw")
- (D) file.open("data.txt","rw+")
Question 17:
Identify the type of expression where operators are placed before the corresponding operands:
- (A) Polish expression
- (B) Infix expression
- (C) Postfix expression
- (D) Reverse polish expression
Question 18:
Evaluate the postfix expression: \[ 24 \; 5 \; 7 \; * \; 5 \; / \; + \]
- (A) 29
- (B) 30
- (C) 31
- (D) 0
Question 19:
STACK follows _____ principle, where insertion and deletion is from _____ end/ends only.
- (A) LIFO, two
- (B) FIFO, two
- (C) FIFO, top
- (D) LIFO, one
Question 20:
Given a scenario:
Suppose there is a web-server hosting a website to declare results. This server can handle a maximum of 100 concurrent requests to view results. So, as to serve thousands of user requests, a _____ would be the most appropriate data structure to use.
- (A) Stack
- (B) Queue
- (C) List
- (D) Dictionary
Question 21:
To perform enqueue and dequeue efficiently on a queue, which of the following operations are required?
A) isEmpty
B) peek
C) isFull
D) update
- (A) (A), (B) and (D) only
- (B) (A), (B) and (C) only
- (C) (B), (C) and (D) only
- (D) (A), (C) and (D) only
Question 22:
Identify the correct place where we have to use repeaters.
- (A) Between A to B
- (B) Between A to C
- (C) Between A to D
- (D) Between A to E
Question 23:
In MAC address, Organisational Unique Identifier (OUI) consists of _____.
- (A) 32 bits
- (B) 48 bits
- (C) 24 bits
- (D) 64 bits
Question 24:
Given a list numList of n elements and key value K, arrange the following steps for finding the position of the key K in the numList using binary search algorithm i.e. BinarySearch(numList, key).
- (A) Calculate mid = (first + last) // 2
- (B) SET first = 0, last = n - 1
- (C) PRINT "Search unsuccessful"
- (D) WHILE first <= last REPEAT
IF numList[mid] = key
PRINT "Element found at position", mid+1
STOP
ELSE
IF numList[mid] > key, THEN last = mid - 1
ELSE first = mid + 1
- (A) (A), (B), (D), (C)
- (B) (D), (B), (A), (C)
- (C) (B), (A), (D), (C)
- (D) (D), (A), (B), (C)
Question 25:
In binary search, after every pass of the algorithm, the search area:
- (A) gets doubled
- (B) gets reduced by half
- (C) remains same
- (D) gets reduced by one third
Question 26:
For binary search, the list is in ascending order and the key is present in the list. If the middle element is less than the key, it means:
- (A) The key is in the first half.
- (B) The key is in the second half.
- (C) The key is not in the list.
- (D) The key is the middle element.
Question 27:
Arrange the following in order related to bubble sort for a list of elements:
Initial list: \[4, -9, 12, 30, 2, 6\]
- (A) \[4, -9, 12, 30, 2, 6\]
- (B) \[-9, 4, 12, 30, 2, 6\]
- (C) \[-9, 4, 12, 2, 30, 6\]
- (D) \[-9, 4, 12, 2, 6, 30\]
- (A) (A), (B), (D), (C)
- (B) (A), (C), (B), (D)
- (C) (B), (A), (D), (C)
- (D) (C), (B), (D), (A)
Question 28:
The amount of time an algorithm takes to process a given data can be called its:
- (A) Process time
- (B) Time period
- (C) Time complexity
- (D) Time bound
Question 29:
Identify the incorrect statement in the context of measures of variability:
- (A) Range is the difference between maximum and minimum values of the data.
- (B) Mean is the average of numeric values of an attribute.
- (C) Standard deviation refers to differences within the set of data of a variable.
- (D) Measures of variability is also known as measures of dispersion.
Question 30:
Identify type of data being collected/generated in the scenario of recording a video:
- (A) Structured Data
- (B) Ambiguous data
- (C) Unstructured data
- (D) Formal Data
Question 31:
Given data:
Weight of 20 students in kgs = [35, 35, 40, 40, 40, 50, 50, 50, 50, 50, 60, 65, 65, 70, 70, 72, 75, 75, 78, 78]
Find the mode.
- (A) 50
- (B) 55
- (C) 57.4
- (D) 57
Question 32:
Match List-I with List-II.
![]()
- (A) (A) - (I), (B) - (II), (C) - (III), (D) - (IV)
- (B) (A) - (III), (B) - (I), (C) - (II), (D) - (IV)
- (C) (A) - (I), (B) - (II), (C) - (IV), (D) - (III)
- (D) (A) - (III), (B) - (IV), (C) - (I), (D) - (II)
Question 33:
In SQL table, the set of values which a column can take in each row is called _____.
- (A) Tuple
- (B) Attribute
- (C) Domain
- (D) Relation
Question 34:
Which of the following is synonym for Meta-data?
- (A) Data Dictionary
- (B) Database Instance
- (C) Database Schema
- (D) Data Constraint
Question 35:
Single row functions are also known as ____ functions.
- (A) Multi row
- (B) Group
- (C) Mathematical
- (D) Scalar
Question 36:
Ms Ritika wants to delete the table 'sports' permanently. Help her in selecting the correct SQL command from the following.
- (A) DELETE FROM SPORTS;
- (B) DROP SPORTS;
- (C) DROP TABLE SPORTS;
- (D) DELETE * FROM SPORTS;
Question 37:
Which of the following are text functions?
- (A) MID()
- (B) INSTR()
- (C) SUBSTR()
- (D) LENGTH()
- (A) (A), (B) and (D) only
- (B) (A), (B) and (C) only
- (C) (A), (B), (C) and (D)
- (D) (B), (C) and (D) only
Question 38:
Match List-I with List-II.
![]()
- (A) (A) - (II), (B) - (IV), (C) - (I), (D) - (III)
- (B) (A) - (I), (B) - (III), (C) - (II), (D) - (IV)
- (C) (A) - (IV), (B) - (I), (C) - (II), (D) - (III)
- (D) (A) - (III), (B) - (IV), (C) - (I), (D) - (II)
Question 39:
______ is a language used to design web pages.
- (A) Web browser
- (B) HTTP
- (C) HTML
- (D) WWW
Question 40:
Match List-I with List-II.
![]()
- (A) (A) - (I), (B) - (II), (C) - (III), (D) - (IV)
- (B) (A) - (II), (B) - (I), (C) - (IV), (D) - (III)
- (C) (A) - (I), (B) - (II), (C) - (IV), (D) - (III)
- (D) (A) - (II), (B) - (IV), (C) - (I), (D) - (III)
Question 41:
Bandwidth of a channel is:
- (A) The range of frequencies available for transmission of data through that channel.
- (B) The path of message travels between source and destination.
- (C) The set of rules on the Internet.
- (D) The data or information that needs to be exchanged.
Question 42:
Data Transfer Rate 1 Gbps is equal to:
- (A) 1024 Mbps
- (B) 1024 Kbps
- (C) \(2^{30}\) bps
- (D) \(2^{20}\) bps
- (A) (A) and (D) only
- (B) (A) and (C) only
- (C) (B) and (D) only
- (D) (B) and (C) only
Question 43:
Identify the wired transmission media for the following:
“They are less expensive and commonly used in telephone lines and LANs. These cables are of two types: Unshielded and shielded.”
- (A) Optical Fibre
- (B) Coaxial Cable
- (C) Twisted pair cable
- (D) Microwaves
Question 44:
The term Cookie is defined as:
- (A) A computer cookie is a small file or data packet which is stored by a website on the server's computer.
- (B) A cookie is edited only by the website that created it, the client’s computer acts as a host to store the cookie.
- (C) Cookies are used by the user to store data on the computer.
- (D) A cookie is a security system to protect your data.
Question 45:
Identify the concept behind the below-given scenario:
“If an attacker limits or stops an authorized user to access a service, device or any such resource by overloading that resource with illegitimate requests.”
- (A) Snooping
- (B) Eavesdropping
- (C) Denial of Service
- (D) Plagiarism
Question 46:
The HTTPS based websites require:
- (A) Search Engine Optimization
- (B) Digital authenticity
- (C) WWW Certificate
- (D) SSL Digital Certificate
Question 47:
State the output of the following query: \[ SELECT LENGTH(MID('INFORMATICS PRACTICES',5,-5)); \]
- (A) NO OUTPUT
- (B) 5
- (C) 0
- (D) ERROR
Question 48:
Match List-I with List-II:
- (A) (A) - (III), (B) - (IV), (C) - (II), (D) - (I)
- (B) (A) - (I), (B) - (III), (C) - (II), (D) - (IV)
- (C) (A) - (II), (B) - (IV), (C) - (I), (D) - (III)
- (D) (A) - (III), (B) - (IV), (C) - (II), (D) - (I)
Question 49:
What will be the format of the output of the NOW() function?
- (A) HH:MM:SS
- (B) YYYY-MM-DD HH:MM:SS
- (C) HH:MM:SS YYYY-MM-DD
- (D) YYYY-DD-MM HH:MM:SS
Question 50:
State the output of the following query: \[ SELECT ROUND(9873.567,-2); \]
- (A) 9900
- (B) 9873
- (C) 9800
- (D) 9873.5
Question 51:
Given the following table:
State the output of the following query:
SELECT COUNT(SALARY) FROM EMPLOYEE;
Question 52:
Match List-I with List-II.
![]()
- (A) (A)-(I), (B)-(II), (C)-(III), (D)-(IV)
- (B) (A)-(II), (B)-(IV), (C)-(I), (D)-(III)
- (C) (A)-(I), (B)-(II), (C)-(IV), (D)-(III)
- (D) (A)-(III), (B)-(IV), (C)-(I), (D)-(II)
Question 53:
Arrange the following statements to create a series from a dictionary.
- (A) Print the series
- (B) Import the pandas library
- (C) Create the series
- (D) Create a dictionary
- (A) (A), (B), (C), (D)
- (B) (A), (C), (B), (D)
- (C) (B), (D), (C), (A)
- (D) (C), (B), (D), (A)
Question 54:
Given the following DataFrame df:
Select the correct commands from the following to display the last five rows:
- (A) print(df.tail(-5))
- (B) print(df.head(-5))
- (C) print(df.tail())
- (D) print(df.tail(5))
Question 55:
Given the following series 'ser1':
![]()
State the output of the following command: print(ser1 >= 70)
![]()
Question 56:
Which of the following are the correct commands to delete a column from the DataFrame df1?
(A) df1 = df1.drop(column_name, axis=1)
(B) df1.drop(column_name, axis=columns, inplace=True)
(C) df1.drop(column_name, axis='columns', inplace=True)
(D) df1.drop(column_name, axis=1, inplace=True)
Choose the \(\textbf{correct}\) answer from the options given below:
- (A) (A), (C) and (D) only
- (B) (A), (B) and (C) only
- (C) (A), (B), (C) and (D)
- (D) (B), (C) and (D) only
Question 57:
Which of the following is the correct command to display the top 2 records of Series tail?
- (A) print(s1.head(2))
- (B) print(tail.head())
- (C) print(tail.head(0))
- (D) print(tail.head(2))
Question 58:
While transferring the data from a DataFrame to a CSV file, if we do not want the column names to be saved to the file on disk, the parameter to be used in to_csv() is _____.
- (A) header=False
- (B) index=False
- (C) header=True
- (D) index=True
Question 59:
HTTP is .............
- (A) a set of rules for email communication.
- (B) a file transfer protocol.
- (C) a set of rules which is used to retrieve linked web pages across the web.
- (D) a set of rules used for secure transmission of data.
Question 60:
Put the following statistical measures in order starting from the simplest measure of data to the most complex one that describes data spread:
- (A) Mode,
(B) Mean,
(C) Median,
(D) Range,
(E) Standard Deviation
- (A) (A), (C), (B), (D), (E)
- (B) (A), (B), (C), (D), (E)
- (C) (B), (A), (D), (E), (C)
- (D) (C), (E), (B), (D), (A)
Question 61:
Dataframe.quantile() is used to get the quartiles. The second quantile is known as ..............
- (A) mode
- (B) mean
- (C) standard deviation
- (D) median
Question 62:
Consider the given DataFrame 'df4':
![]()
We want the following output:
![]()
- (A) print(df4.sum(numeric_only=True))
- (B) print(df4.sum(numeric_only=False))
- (C) print(df4.sum())
- (D) print(df4.count(numeric_only=True))
Question 63:
The process of changing the structure of a DataFrame using function pivot() is known as .............
- (A) Transpose
- (B) Reindexing
- (C) Resetting
- (D) Reshaping
Question 64:
After establishing the connection to fetch the data from the table of a database in SQL into a DataFrame, which of the following function will be used?
- (A) pandas.read_sql_query()
- (B) pandas.read_sql_table()
- (C) pandas.read_sql_query_table()
- (D) pandas.read_sql()
- (A) (A), (B) and (D) only
- (B) (A), (B) and (C) only
- (C) (A), (B), (C) and (D)
- (D) (B), (C) and (D) only
Question 65:
______ in matplotlib also known as correlation plot, because they show how two variables are related.
- (A) Bar graph
- (B) Pie chart
- (C) Box plot
- (D) Scatter plot
Question 66:
Given the following statement:
import matplotlib.pyplot as plt
'plt' in the above statement is .............. name.
- (A) key
- (B) alias
- (C) variable
- (D) function
Question 67:
How can you save a matplotlib plot as a file?
- (A) plt.export()
- (B) plt.save()
- (C) plt.savefig()
- (D) plt.store()
Question 68:
Arrange the following in order in the context of exception handling:
- (A) Program Termination
- (B) Exception is raised
- (C) Error occurs in a program
- (D) Catching an exception Choose the correct answer from the options given below:
- (A) (C), (B), (D), (A)
- (B) (A), (C), (B), (D)
- (C) (B), (A), (C), (D)
- (D) (C), (B), (A), (D)
Question 69:
The plot function of pandas matplotlib uses 'kind' argument which can accept a string indicating the type of graph to be plotted. Which of the following are valid plots?
- (A) Area
- (B) Box
- (C) Scatter
- (D) Line
Question 70:
Given the following code for histogram:
df.plot(kind='hist', edgecolor="Green", linewidth=2, linestyle='-', fill=False, hatch='o')
What is the role of fill=False?
- (A) Each hist will be filled with green color.
- (B) Each hist will be empty.
- (C) Each hist will be filled with ':'.
- (D) The edge color of each hist will be black.
Question 71:
Matplotlib library can be installed using pip command. Identify the correct syntax from the following options.
- (A) pip install matplotlib.pyplot
- (B) pip install matplotlib.pyplot
- (C) pip install matplotlib.pyplot as plt
- (D) pip install matplotlib
Question 72:
Dynamic web pages can be created using various languages, like __________.
- (A) JavaScript
- (B) PHP
- (C) Python
- (D) Ruby
Question 73:
Match List-I with List-II:
| List-I |
List-II |
| (A) STAR TOPOLOGY |
(I) Each communicating device is connected to a central node. |
| (B) LAN |
(II) Networking device. |
| (C) HUB |
(III) Protocol. |
| (D) VoIP |
(IV) Type of network. |
- Choose the correct answer from the options given below:
- (A) (A) - (I), (B) - (II), (C) - (III), (D) - (IV)
- (B) (A) - (I), (B) - (III), (C) - (II), (D) - (IV)
- (C) (A) - (I), (B) - (C), (C) - (II), (D) - (IV)
- (D) (A) - (III), (B) - (IV), (C) - (I), (D) - (II)
Question 74:
Arrange the following in sequence of execution:
- (A) HTTP Request
- (B) Calls an application in response to the HTTP request
- (C) Program executes and produces HTML output
- (D) HTTP Response
Question 75:
Match List-I with List-II:
| List – I |
List – II |
| (A) Static web page |
(I) A web page whose content keeps changing. |
| (B) Home page |
(II) A web page whose content is fixed. |
| (C) Dynamic web page |
(III) Delivers the contents to web browser. |
| (D) Web server |
(IV) First page of website. |
- Choose the correct answer from the options given below:
- (A) (A) - (II), (B) - (IV), (C) - (I), (D) - (III)
- (B) (A) - (II), (B) - (III), (C) - (I), (D) - (IV)
- (C) (A) - (I), (B) - (III), (C) - (II), (D) - (IV)
- (D) (A) - (III), (B) - (IV), (C) - (I), (D) - (II)
Question 76:
Which of the following is a networking device?
- (A) Gateway
- (B) Repeater
- (C) MAN
- (D) Modem
- (A) (A) and (D) only
- (B) (A), (B) and (D) only
- (C) (A), (B), (C) and (D)
- (D) (B), (C) and (D) only
Question 77:
______ is the largest WAN that connects billions of computers, smartphones, and millions of LANs from different countries.
- (A) PAN
- (B) WWW
- (C) Ethernet
- (D) Internet
Question 78:
The intellectual property right that is granted for inventions is ______.
- (A) Copyright
- (B) Patent
- (C) Trademark
- (D) Licensing
Question 79:
Violation of intellectual property right may happen due to:
- (A) Copyright Infringement
- (B) Patent
- (C) Trademark Infringement
- (D) Plagiarism
- (A) (A) and (C) only
- (B) (A), (B) and (C) only
- (C) (A), (B), (C) and (D)
- (D) (A), (C) and (D) only
Question 80:
Match List-I with List-II:
| List – I |
List – II |
| (A) Cyber Appellate Tribunal |
(I) Punishes people causing pollution. |
| (B) Environmental Protection Act 1986 |
(II) Provides guidelines for proper handling and disposal of e-waste. |
| (C) Indian Information Technology Act 2000 |
(III) Resolves disputes arising from cyber crime. |
| (D) Central Pollution Control Board |
(IV) Provides guidelines on storage, processing and transmission of sensitive data. |
- (A) (A) - (III), (B) - (I), (C) - (IV), (D) - (II)
- (B) (A) - (I), (B) - (III), (C) - (II), (D) - (IV)
- (C) (A) - (IV), (B) - (III), (C) - (I), (D) - (II)
- (D) (A) - (III), (B) - (IV), (C) - (II), (D) - (I)
Question 81:
_____ is a branch of science that deals with designing and arranging of workplaces.
- (A) Netiquette
- (B) Ergonomics
- (C) Leeching
- (D) Refurbishing
Question 82:
Sequence the steps to append data to an existing file and then read the entire file:
- (A) Open the file in a+ mode.
- (B) Use the read() method to output the contents.
- (C) Use the write() or writelines() method to append data.
- (D) Seek to the beginning of the file.
- (A) (A), (C), (D), (B)
- (B) (A), (B), (C), (D)
- (C) (B), (A), (C), (D)
- (D) (C), (B), (D), (A)
Question 83:
Sequence the given process for checking whether a string is a palindrome or not, using a deque:
- (A) Load the string into the deque.
- (B) Continuously remove characters from both ends.
- (C) Compare the characters.
- (D) Determine if the string is a palindrome based on the comparisons.
- (A) (A), (B), (C), (D)
- (B) (A), (B), (D), (C)
- (C) (B), (A), (C), (D)
- (D) (C), (B), (D), (A)
Question 84:
Cable based broadband internet services are example of ..............
- (A) LAN
- (B) MAN
- (C) WAN
- (D) PAN
Question 85:
________ is the trail of data we leave behind when we visit any website (or use any online application or portal) to fill-in data or perform any transaction.
- (A) Digital footprint
- (B) Cyber crimes
- (C) Cyber bullying
- (D) Identity theft
Comments