CUET Exam  >  CUET Tests  >  CUET Mock Test Series  >  Computer Science: CUET Mock Test - 8 - CUET MCQ

Computer Science: CUET Mock Test - 8 - CUET MCQ


Test Description

30 Questions MCQ Test CUET Mock Test Series - Computer Science: CUET Mock Test - 8

Computer Science: CUET Mock Test - 8 for CUET 2025 is part of CUET Mock Test Series preparation. The Computer Science: CUET Mock Test - 8 questions and answers have been prepared according to the CUET exam syllabus.The Computer Science: CUET Mock Test - 8 MCQs are made for CUET 2025 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Computer Science: CUET Mock Test - 8 below.
Solutions of Computer Science: CUET Mock Test - 8 questions in English are available as part of our CUET Mock Test Series for CUET & Computer Science: CUET Mock Test - 8 solutions in Hindi for CUET Mock Test Series course. Download more important topics, notes, lectures and mock test series for CUET Exam by signing up for free. Attempt Computer Science: CUET Mock Test - 8 | 50 questions in 45 minutes | Mock test for CUET preparation | Free important questions MCQ to study CUET Mock Test Series for CUET Exam | Download free PDF with solutions
Computer Science: CUET Mock Test - 8 - Question 1

Match the following:

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 1

The correct matching pairs are

Computer Science: CUET Mock Test - 8 - Question 2

Considering the given statement in Python Print("Hello world")

What type of error will be generated?

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 2

The correct answer is Name Error

Key Points

  • The given statement Print("Hello world") will generate a Name Error.
  • In Python, the function print() should be written in lowercase, not uppercase.
  • So the correct statement would be print("Hello world"). Python is case-sensitive, so using Print instead of print would result in a Name Error.
  • Therefore, option 4) Name Error is the correct answer.
Computer Science: CUET Mock Test - 8 - Question 3

The British scientist who invented world wide web in 1990 is ________.

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 3

The correct answer is Tim Berners Lee

Key Points

  • Tim Berners-Lee:
    • Tim Berners-Lee is a British computer scientist who invented the World Wide Web in 1989 while working at CERN (European Organization for Nuclear Research) in Switzerland.
    • He proposed the concept of a global hypertext system to facilitate information-sharing among researchers.
    • His invention led to the development of the first web browser and web server, revolutionizing the way information is accessed and shared worldwide.

Additional Information

  • Alan Turing:
    • Alan Turing was a British mathematician, logician, and cryptanalyst who is widely considered the father of theoretical computer science and artificial intelligence. He made significant contributions to the Allied efforts during World War II by breaking the German Enigma code. Although Turing laid foundational work for computing.
  • Claude Shannon:
    • Claude Shannon was an American mathematician, electrical engineer, and cryptographer known as the "father of information theory." His groundbreaking work laid the foundation for digital circuit design theory and provided the mathematical framework for digital communication. While Shannon's work was pivotal for modern computing and communication systems.
  • Herman Hollerith:
    • Herman Hollerith was an American inventor and entrepreneur who developed the punched card tabulating machine, which was used for the 1890 United States Census. His invention laid the foundation for modern automated data processing systems and played a crucial role in the development of early computing technology.
Computer Science: CUET Mock Test - 8 - Question 4

Read the following statements and arrange in correct order.

A. Exception is raised

B. Executes exception

C. Program searches for exception handler

D. Create exception object

E. An error encountered

Choose the correct answer from the options given below:

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 4

The correct answer is EDAC→B

Key PointsThe correct order for handling an exception in a program is as follows:

  • E. An error is encountered: First, an error occurs in the program.
  • D. Create exception object: As a result of the error, an exception object is created.
  • A. Exception is raised: The exception is then raised.
  • C. Program searches for an exception handler: The program searches for a suitable block of code designed to handle the exception.
  • B. Executes exception: Once the appropriate handler is found, the exception is executed or handled.

Therefore, the correct answer is: E→D→A→C→B

Computer Science: CUET Mock Test - 8 - Question 5
In SQL, like condition allows you to use wild card characters to perform matching. Which of the following is a valid wild card character?
Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 5

The correct answer is %

Key PointsThe commonly used wildcard characters in SQL LIKE:

  • %: Matches zero, one, or more characters.
  • _: Matches a single character (any letter, number, or symbol).

Examples:

  • SELECT * FROM customers WHERE name LIKE '%en%'; - This query will find all customer names that contain the letters "en" anywhere in the name (e.g., "John", "Steven", "Weekend").
  • SELECT * FROM products WHERE code LIKE 'PR%'; - This query will find all product codes that start with "PR" followed by any characters (e.g., "PR123", "PR-ABC").
  • SELECT * FROM users WHERE username LIKE 'user_'; - This query will find all usernames that start with "user_" followed by a single character (e.g., "user_a", "user_1").

Important Points

  • Wildcard characters are powerful for pattern matching in SQL queries.
  • Use them strategically to retrieve data that meets specific criteria.
  • Be mindful of potential performance implications when using wildcards at the beginning of patterns, as it may require a full table scan.
Computer Science: CUET Mock Test - 8 - Question 6

Match List I with List II.

Choose the correct answer from the options given below:

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 6

The correct answer is A - II, B - IV, C - III, D - I

Key Points

  • A - II (Data redundancy) - Duplication of data at different places (files)
  • B - IV (Data inconsistency) - Mismatch of data, maintained at different places
  • C - III (Data Isolation) - Separation of resource or data modification made by different transactions
  • D - I (Data dependency) - Updating the structure of a data file requires modification in all the application programs accessing the file

So, the correct answer is: A - II, B - IV, C - III, D - I

Computer Science: CUET Mock Test - 8 - Question 7
Who is known as father of Artificial Intelligence?
Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 7

The correct answer is John McCarthy

Key PointsJohn McCarthy:

  • The title "Father of Artificial Intelligence" is often given to Dr. John McCarthy.
  • McCarthy was born in Boston, Massachusetts, USA in 1927 and passed away in 2011.
  • He coined the term "Artificial Intelligence" in 1956 while proposing a conference at Dartmouth College.
  • His groundbreaking work laid the foundations for AI as a distinct field within computer science.
  • McCarthy was one of the co-creators of the Lisp programming language, instrumental in AI development.
  • He also initiated the concept of "time-sharing" systems, enhancing computer efficiency.
  • His concept of the "Advice Taker" in 1958 can be seen as the forerunner to modern knowledge-based systems.
  • McCarthy championed the development of Logic programming, a crucial theory for AI.
  • His vision included machines that could carry on meaningful conversations with humans, a key tenet of modern AI.
  • He was awarded the Turing Award in 1971, the highest honor in computer science, for his contributions to AI.
Computer Science: CUET Mock Test - 8 - Question 8
If SQL command DELETE FROM EMPLOYEE; is executed on relation EMPLOYEE having 'n' tuple in it, ______ will be deleted from relation EMPLOYEE.
Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 8

The correct option is (3)

All 'n' tuples

Concept:-

A delete statement is used to delete/remove one or more records from a table. If we will not provide a where clause with a delete statement then the whole table data will be deleted.

Syntax:

DELETE FROM table_name;

WHERE condition;

For example, here SQL command DELETE FROM EMPLOYEE; is executed on relation EMPLOYEE having n-tuple in it, all 'n' tuples will be deleted from EMPLOYEE.

Key Points

  • The Delete command in SQL is a part of the Data Manipulation Language, a sub-language of SQL that allows modification of data in databases.
  • This command is used to delete existing records from a table. Using this, we can either delete specific records based on a condition or all the records from a table.
  • DELETE FROM EMPLOYEE; This query will delete all the records from the employee table.
Computer Science: CUET Mock Test - 8 - Question 9
How many TCP connections does FTP use?
Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 9

The correct answer is Two

Key PointsFTP (File Transfer Protocol) uses two TCP connections to maintain a clear separation of data commands and file data.

  • Control Connection: This is used to send and receive commands between the client and the server. It's initiated by the client and remains open for the duration of the session.
  • Data Connection: This connection is used specifically for data transfer. It is opened and closed as needed during the session. When an FTP client requests a file, a new data connection gets set up.

The reason for keeping these two connection types separate is to allow for clean, uninterrupted control commands while simultaneously allowing for the transmission of file data.

Computer Science: CUET Mock Test - 8 - Question 10

In context with Relational Algebra, which of the following are Unary operators?

1. Select

2. Project

3. Union

4. Product

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 10

The correct answer is option 4.

Concept:

Relational Algebra:

Relational Algebra is a query language that accepts a Relation as input and returns a Relation as output. Relational algebra is primarily concerned with providing a theoretical foundation for relational databases and SQL.

The following are the several types of relational algebra operations:

  • Select operation
  • Project operation
  • Rename operation
  • Union operation
  • Intersection operation
  • Difference operation
  • Cartesian product operation
  • Join operation
  • Division operation

Select, project, rename comes under unary operation (operate on one table).

Select operation:

It displays the records that satisfy a condition and is denoted by sigma (σ).

Projection operation:

It displays the specific column of a table. It is denoted by pie (Π). Hence the correct answer is 1 and 2 only.

Computer Science: CUET Mock Test - 8 - Question 11
What is the address given to a computer connected to a network called ?
Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 11

The correct answer is IP Address

Key Points

  • IP Address:
    • This is the identifier assigned to devices on a network. The IP stands for "Internet Protocol," which is the set of rules governing internet activity.
    • An IP address may be either dynamic (changing each time the device connects to the network) or static (permanent).
    • There are two versions of IP addresses in use: IPv4, a series of four numbers separated by periods (e.g., 192.168.1.1), and IPv6, more complex but allowing for many more devices.

Additional Information

  • System Address:
    • This term isn't commonly used in the context of networking. It could refer to a variety of different addresses involved in the functioning of a system, such as memory addresses used by a computer's hardware and software.
  • Process ID:
    • Also known as PID, this is a unique identifier assigned by a computer's operating system to each process (program) running on the machine.
  • SYSID:
    • This abbreviation often stands for "System Identifier." In a network, it isn't a term commonly used to describe a device's address.
Computer Science: CUET Mock Test - 8 - Question 12

Two statements are given below:

Statement I: Stack follow Last In First Out (LIFO)
Statement II: Delete is possible from Bottom as well as Top.

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 12

Statement I is correct because it follows the LIFO(Last in First Out). It means you can delete that element which comes first. Statement II is incorrect because elements can be deleted only from the top in Stack data structure.

Computer Science: CUET Mock Test - 8 - Question 13

Which of the following is not a keyword in SQL?

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 13

ADD is not a keyword in SQL.

Computer Science: CUET Mock Test - 8 - Question 14

Which of the following operations in relation algebra requires two relations having the same number of attributes?

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 14

The union operator requires that both relations are union-compatible. This means that they are required to have the same set of attributes.

Computer Science: CUET Mock Test - 8 - Question 15

Where is metadata stored in MySQL?

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 15

Metadata is the data about the data. Anything that describes the database—as opposed to being the contents of the database—is metadata. Metadata stored in the MySQL in the MySQL database mysql

Computer Science: CUET Mock Test - 8 - Question 16

Which of the following functions is not performed by DDL?

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 16

A DDL performs the following functions :

  1. It identifies the type of data division such as data item, segment, record and database file.
  2. It gives a unique name to each data item type, record type, file type and data base.
  3. It specifies the proper data type.
  4. It defines the size of the data item.
  5. It may define the range of values that a data item may use.
  6. It may specify privacy locks for preventing unauthorized data entry.
Computer Science: CUET Mock Test - 8 - Question 17

Two statements are given below:

Statement I: Prefix notation for the (a+b)*(c-d) is +*ab-cd.
Statement II: Postfix notation for the (a+b)*(c-d) is ab+cd-*.

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 17

Correct Prefix notation for the (a+b)*(c-d) is *+ab-cd(a+b)*(c+d) = (+ab)*(-cd) = *+ab-cd (Statement I is Incorrect). Postfix notation for the (a+b)*(c-d) is *+ab-cd(a+b)*(c-d) = (ab+)*(cd-) = ab+cd -* (Statement II is Correct).

Computer Science: CUET Mock Test - 8 - Question 18

The 'is empty ( )' function can be also be written by using

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 18

The 'is empty ( )' function can be also be written by using '? :'.

Computer Science: CUET Mock Test - 8 - Question 19

Where are stack and stack pointers located?

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 19

A stack pointer is a small register that stores the address of the last program request in a stack. A stack is a specialized buffer which stores data from the top down. Both stack and stack pointers reside in the memory.

Computer Science: CUET Mock Test - 8 - Question 20

A cookie stores ______.

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 20

A cookie stores information about the user's web activity.
They are small files often including unique identifiers that web servers send to browsers. They can be sent back to the server each time your browser requests a new page. It helps browsers remember your preferences and habits online.

Computer Science: CUET Mock Test - 8 - Question 21

Hashing procedures are used in __________.

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 21

With random hashing, the probe sequence is generated by the output of a pseudorandom number generator seeded by the key (possibly together with another seed component that is the same for every key, but is different for different tables)

Computer Science: CUET Mock Test - 8 - Question 22

Directions: Match the contents under List I with those under List II.

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 22

These are the built-in exceptions in Python:

  • 'ValueError' is raised when an invalid argument is passed to a function.
  • 'TypeError' is raised when an operation or function is applied to an object of inappropriate type.
  • 'IndexError' is raised when an index is out of range.
  • 'KeyError' is raised when a dictionary key is not found.
Computer Science: CUET Mock Test - 8 - Question 23

Which of the following term includes the mean of the processed data during business operations?

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 23

Information includes the processed data by planning, controlling and analysing.

Computer Science: CUET Mock Test - 8 - Question 24

Which rule of a communication protocol prevents a fast sender from flooding a slow receiver with data, by regulating the flow of data on communication lines?

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 24

This communication protocol prevents a fast sender from flooding a slow receiver with data, by regulating the flow of data on communication lines.

Computer Science: CUET Mock Test - 8 - Question 25

The relational model uses some unfamiliar terminology. A tuple is equivalent to _________.

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 25

You can treat a tuple as a kind of record, where the index of an element in a tuple is its name within the equivalent record, so (10, 25) is {0 : 10, 1 : 25}. I believe 'Standard ML' and related languages use records as the basic unit of type conjunction (algebraic data types provide type dis-junction) and treat tuples as a kind of record in this way.

Computer Science: CUET Mock Test - 8 - Question 26

A database management system (DBMS) is a ________.

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 26

Database Management Systems (DBMS) are software systems used to store, retrieve, and run queries on data. A DBMS serves as an interface between an end-user and a database, allowing users to create, read, update, and delete data in the database.

Computer Science: CUET Mock Test - 8 - Question 27

SQL commands which come under 'Data Definition Language' are ___________.

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 27

Data Definition Language(DDL) is a subset of SQL and a part of DBMS(Database Management System). DDL consist of Commands to commands like CREATE, ALTER, TRUNCATE and DROP. These commands are used to create or modify the tables in SQL.

Computer Science: CUET Mock Test - 8 - Question 28

Based on transmission technology, computer networks can be classified into _____ type(s) of networks.

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 28

Transmission media is basically divided into two categories:

  • Broadcast Networks
  • Point-to-Point Networks
Computer Science: CUET Mock Test - 8 - Question 29

In context of computer software, what does spyware mean?

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 29

Spyware, in context of computer software, is software that aims to gather information about a person without his/her knowledge, and that may send such information to another entity.
Spyware is mostly used for stealing information, storing internet users' movements on the web, and serving up pop-up ads to the internet users. Whenever a spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.

Computer Science: CUET Mock Test - 8 - Question 30

_______ defines the rules and regulations that are to be followed during data communication.

Detailed Solution for Computer Science: CUET Mock Test - 8 - Question 30

Protocol is a set of rules and regulations. It defines the rules and regulations for communication over the network.

View more questions
8 docs|148 tests
Information about Computer Science: CUET Mock Test - 8 Page
In this test you can find the Exam questions for Computer Science: CUET Mock Test - 8 solved & explained in the simplest way possible. Besides giving Questions and answers for Computer Science: CUET Mock Test - 8, EduRev gives you an ample number of Online tests for practice
Download as PDF