CUET Exam  >  CUET Tests  >  CUET Mock Test Series  >  Computer Science: CUET Mock Test - 1 - CUET MCQ

Computer Science: CUET Mock Test - 1 - CUET MCQ


Test Description

40 Questions MCQ Test CUET Mock Test Series - Computer Science: CUET Mock Test - 1

Computer Science: CUET Mock Test - 1 for CUET 2024 is part of CUET Mock Test Series preparation. The Computer Science: CUET Mock Test - 1 questions and answers have been prepared according to the CUET exam syllabus.The Computer Science: CUET Mock Test - 1 MCQs are made for CUET 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Computer Science: CUET Mock Test - 1 below.
Solutions of Computer Science: CUET Mock Test - 1 questions in English are available as part of our CUET Mock Test Series for CUET & Computer Science: CUET Mock Test - 1 solutions in Hindi for CUET Mock Test Series course. Download more important topics, notes, lectures and mock test series for CUET Exam by signing up for free. Attempt Computer Science: CUET Mock Test - 1 | 40 questions in 45 minutes | Mock test for CUET preparation | Free important questions MCQ to study CUET Mock Test Series for CUET Exam | Download free PDF with solutions
1 Crore+ students have signed up on EduRev. Have you? Download the App
Computer Science: CUET Mock Test - 1 - Question 1

Python is a/an ______based language.

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 1

Python is an interpreted, object-oriented, high-level programming language with dynamic semantics.

Computer Science: CUET Mock Test - 1 - Question 2

What do we use to define a block of code in Python language?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 2

Python uses indentations to define blocks of code. Indentations are simply spaces or tabs used as an indicator that is part of the indent code child, as used in curly braces C, C++, and Java.

Computer Science: CUET Mock Test - 1 - Question 3

Referential integrity constraint in a relational database is specified with the help of a _________.

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 3

A foreign key is a field (or collection of fields) in one table, that refers to the primary key in another table. The table with the foreign key is called the child table, and the table with the primary key is called the referenced or parent table.

Computer Science: CUET Mock Test - 1 - Question 4

Which among the following SQL commands does not fall under the category of data manipulation language?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 4

CREATE command is a data definition language command but not a data manipulation command. Data manipulation command is used to manipulate the data of those tables that are created by Data definition languages.

Computer Science: CUET Mock Test - 1 - Question 5

Which of the following networking components is called a three-layer switch?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 5

This networking component is called a three-layer switch. It can operate at the physical, data link and network layers. A layer 3 switch combines the functionality of a switch and a router. It acts as a switch to connect devices that are on the same subnet or virtual LAN at lightning speeds and has IP routing intelligence built into it to double up as a router.

Computer Science: CUET Mock Test - 1 - Question 6

Which of the following operators cannot be used with string data type?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 6

Operator ''/'' can not be used with string data type.

Computer Science: CUET Mock Test - 1 - Question 7

To read the next line of the file from a file object infile, we use ____________.

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 7

The readlines() method returns a list containing each line in the file as a list item. The hint parameter is used to limit the number of lines returned. If the total number of bytes returned exceeds the specified number, no more lines are returned.

Computer Science: CUET Mock Test - 1 - Question 8

Which of the following is correctly evaluated for this function?
pow(x,y,z)

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 8

The built-in function pow() can accept two or three arguments. When it takes in two arguments, they are evaluated as x**y. When it takes in three arguments, they are evaluated as (x**y)%z.

Computer Science: CUET Mock Test - 1 - Question 9

Which of the following is false regarding the loops in Python?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 9

'While loop' is used when multiple statements are to be executed repeatedly until the given condition becomes false.
Python 'While loop' is used to execute a block of statements repeatedly until a given condition is satisfied. And when the condition becomes false, the line immediately after the loop in the program is executed. 'While loop' falls under the category of indefinite iteration.

Computer Science: CUET Mock Test - 1 - Question 10

Which of the following statements is true?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 10

Pickle in Python is primarily used in serializing and deserializing of a Python object structure. In other words, it's the process of converting a Python object into a byte stream to store it in a file/database, maintain program state across sessions, or transport data over the network.

Computer Science: CUET Mock Test - 1 - Question 11

Insertions take place at the rear end of the queue and deletions take place at the 'front' end of the queues. On which principal does this work?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 11

In linear queue, an insertion takes place from one end while the deletion occurs from another end. The end at which the insertion takes place is known as the rear end, and the end at which the deletion takes place is known as the front end.

Computer Science: CUET Mock Test - 1 - Question 12

What is the significance of the tell() method?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 12

The tell() method returns the current position of file object. This method takes no parameters and returns an integer value. Initially file pointer points to the beginning of the file (if not opened in append mode). So, the initial value of tell() is zero.

Computer Science: CUET Mock Test - 1 - Question 13

Computers manipulate data in many ways, this manipulation is called _____.

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 13

Processing is any computer program that is not a control program, such as an application program, or a non-controlling part of the operating system, such as a sort-merge program or language translator.

Computer Science: CUET Mock Test - 1 - Question 14

What are the two advantages of database management system?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 14

Data base security and integrity are two advantages of the data base management system. Central control also ensures that adapted checks are incorporated.

Computer Science: CUET Mock Test - 1 - Question 15

Which method is used to protect online images from hackers?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 15

A firewall is an essential piece of security software that monitors all incoming and outgoing traffic going through your network, checking for hackers, malware, unauthorized outgoing information, or anything that might put you or your PC at risk. Firewalls are often the first line of defense when protecting your data.

Computer Science: CUET Mock Test - 1 - Question 16

_________ switching is well suited for voice communication while _________switching is better suited for data and other non-voice communication.

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 16

In-circuit switching when the source does not have enough data to transmit, the resources are unnecessarily kept idle. To avoid such situation, Message switching is used.
Circuit Switching is a switching technique method that establishes a dedicated path between the sender and the receiver to send the data. The example of a Circuit-switch network is a telephone network.

Computer Science: CUET Mock Test - 1 - Question 17

Consider a declaration, L = (1, 'Python', '3.14').
Which of the following represents the data type of L?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 17

A tuple is almost like a List and contains python objects and objects inside are separated by comma (,) and enclosed within parentheses.
Example:
list1 = (6.25, 'brinjal', 'onion', 'beans')
list1 is a tuple.

Computer Science: CUET Mock Test - 1 - Question 18

Which of the following file modes is not valid?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 18

File mode r+, w+, or a+ may be to perform both read and write operations using a single file object.

Computer Science: CUET Mock Test - 1 - Question 19

Radha Shah is a programmer, who has recently been given a task to write a python code to perform the following CSV file operations with the help of two user defined functions/modules:

a. CSVOpen() : to create a CSV file called BOOKS.CSV in append mode containing information of books – Title, Author, and Price.
b. CSVRead() : to display the records from the CSV file called BOOKS.CSV where the field title starts with 'R'.

She has succeeded in writing partial code and has missed out certain statements, so she has left certain queries in comment lines.
import csv
def CSVOpen():
with open('books.csv','______',newline='') as csvf:
#Statement-1
cw=______ #Statement-2
______ #Statement-3
cw.writerow(['Rapunzel','Jack',300])
cw.writerow(['Barbie','Doll',900])
cw.writerow(['Johnny','Jane',280])
def CSVRead():

Q. Choose the appropriate mode in which the file is to be opened in append mode (Statement 1).

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 19

Mode 'a' opens a file for appending. The file pointer is placed at the end of the file, if the file exists. If the file does not exist, it creates a new file for writing.

Computer Science: CUET Mock Test - 1 - Question 20

Radha Shah is a programmer, who has recently been given a task to write a python code to perform the following CSV file operations with the help of two user defined functions/modules:

a. CSVOpen() : to create a CSV file called BOOKS.CSV in append mode containing information of books – Title, Author, and Price.
b. CSVRead() : to display the records from the CSV file called BOOKS.CSV where the field title starts with 'R'.

She has succeeded in writing partial code and has missed out certain statements, so she has left certain queries in comment lines.
import csv
def CSVOpen():
with open('books.csv','______',newline='') as csvf:
#Statement-1
cw=______ #Statement-2
______ #Statement-3
cw.writerow(['Rapunzel','Jack',300])
cw.writerow(['Barbie','Doll',900])
cw.writerow(['Johnny','Jane',280])
def CSVRead():

Q. Choose the correct option for Statement 3 to write the names of the column headings in the CSV file, BOOKS.CSV.

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 20

Correct code for statement 3 is cw.writerow (['Title', 'Author', 'Price']) where, Title, Author and Price are the columns. writerow () method is used to write single row at a time.

Computer Science: CUET Mock Test - 1 - Question 21

Radha Shah is a programmer, who has recently been given a task to write a python code to perform the following CSV file operations with the help of two user defined functions/modules:

a. CSVOpen() : to create a CSV file called BOOKS.CSV in append mode containing information of books – Title, Author, and Price.
b. CSVRead() : to display the records from the CSV file called BOOKS.CSV where the field title starts with 'R'.

She has succeeded in writing partial code and has missed out certain statements, so she has left certain queries in comment lines.
import csv
def CSVOpen():
with open('books.csv','______',newline='') as csvf:
#Statement-1
cw=______ #Statement-2
______ #Statement-3
cw.writerow(['Rapunzel','Jack',300])
cw.writerow(['Barbie','Doll',900])
cw.writerow(['Johnny','Jane',280])
def CSVRead():

Q. Fill in the appropriate statement to check the field Title starting with 'R' for Statement 3 in the above program.

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 21

Title is the first column of CSV file, so its index would be r [0] [0]. Condition to check the field Title starting with 'R' will be r[0][0] = 'R'.

Computer Science: CUET Mock Test - 1 - Question 22

Radha Shah is a programmer, who has recently been given a task to write a python code to perform the following CSV file operations with the help of two user defined functions/modules:

a. CSVOpen() : to create a CSV file called BOOKS.CSV in append mode containing information of books – Title, Author, and Price.
b. CSVRead() : to display the records from the CSV file called BOOKS.CSV where the field title starts with 'R'.

She has succeeded in writing partial code and has missed out certain statements, so she has left certain queries in comment lines.
import csv
def CSVOpen():
with open('books.csv','______',newline='') as csvf:
#Statement-1
cw=______ #Statement-2
______ #Statement-3
cw.writerow(['Rapunzel','Jack',300])
cw.writerow(['Barbie','Doll',900])
cw.writerow(['Johnny','Jane',280])
def CSVRead():

Q. Which statement will be used to create a CSV writer object in Statement 2?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 22

csv. writer is used to insert data to the CSV file. This class returns a writer object which is responsible for converting the user's data into a delimited string.
Syntax CSV.writer (CSVfile)
In statement 2, missing code is CSV. writer (csvf) where, csvf is CSV file.

Computer Science: CUET Mock Test - 1 - Question 23

Radha Shah is a programmer, who has recently been given a task to write a python code to perform the following CSV file operations with the help of two user defined functions/modules:

a. CSVOpen() : to create a CSV file called BOOKS.CSV in append mode containing information of books – Title, Author, and Price.
b. CSVRead() : to display the records from the CSV file called BOOKS.CSV where the field title starts with 'R'.

She has succeeded in writing partial code and has missed out certain statements, so she has left certain queries in comment lines.
import csv
def CSVOpen():
with open('books.csv','______',newline='') as csvf:
#Statement-1
cw=______ #Statement-2
______ #Statement-3
cw.writerow(['Rapunzel','Jack',300])
cw.writerow(['Barbie','Doll',900])
cw.writerow(['Johnny','Jane',280])
def CSVRead():

Q. Which statement will be used to create a CSV writer object in Statement 2?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 23

csv. writer is used to insert data to the CSV file. This class returns a writer object which is responsible for converting the user's data into a delimited string.
Syntax CSV.writer (CSVfile)
In statement 2, missing code is CSV. writer (csvf) where, csvf is CSV file.

Computer Science: CUET Mock Test - 1 - Question 24

Which of the following terms are used to protects Intellectual Property?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 24

Intellectual property rights:

  • Intellectual property rights (IPR) refer to the legal rights given to the inventor or creator to protect his invention or creation for a certain period of time. Intellectual Property is legally protected through patents, trademarks, copyrights, trade secrets, etc.​ 

Copyright:

  • Copyright grants legal rights to creators for their original works like writing, photograph, audio recordings, video, sculptures, architectural works, computer software, and other creative works like literary and artistic work. 

Patent:

  • A patent is usually granted for inventions. Unlike copyright, the inventor needs to apply (file) for patenting the invention.

Trademark:

  • A trademark includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand or commercial enterprise, from other brands or commercial enterprises.

Hence the correct answer is All the above.

Computer Science: CUET Mock Test - 1 - Question 25

When executing the given Python code, which of the following exceptions will occur?
a = 10
b = 0
c = a/b
print(c)

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 25

Concept:
The given code is,
a = 10
b = 0
c = a/b
print(c)
A number must be divided by another number that is not zero. If we write a simple program that divides an integer by zero, the Python interpreter will throw a ZeroDivisionError. This error will occur if the division denominator is set to zero.
Hence it throws the ZeroDivisionError.
Hence the correct answer is ZeroDivisionError.

Computer Science: CUET Mock Test - 1 - Question 26

Which of the following is not a built-in exceptions in Python?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 26

Concept:
Built-in exceptions are the exceptions that are available in Python libraries. These exceptions are suitable to explain certain error situations. Some of the commonly occurring built-in exceptions are SyntaxError, ValueError, IOError, KeyboardInterrupt, ImportError, EOFError, ZeroDivisionError, IndexError, NameError, IndentationError, TypeError,and OverFlowerror.

ZeroDivisionError:
It is raised when the denominator in a division operation is zero.

OverFlowError:
It is raised when the result of a calculation exceeds the maximum limit for the numeric data type.

KeyboardInterrupt:
It is raised when the user accidentally hits the Delete or Esc key while executing a program due to which the normal flow of the program is interrupted.

SyntaxError:
It is raised when there is an error in the syntax of the Python code.

ValueError:
It is raised when a built-in method or operation receives an argument that has the right data type but mismatched or inappropriate values.

IOError:
It is raised when the file specified in a program statement cannot be opened.

ImportError:
It is raised when the requested module definition is not found.

EOFError:
It is raised when the end of the file condition is reached without reading any data by input().

Hence the correct answer is None of the above.

Computer Science: CUET Mock Test - 1 - Question 27

Consider the following array and what is the status of the array after the fourth pass when we use the insertion sort?

Array Elements: 20, 16, 12, 8, 4, 1

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 27

Concept:
Insertion sort:
Insertion sort is a basic sorting algorithm that operates in the same manner that you arrange cards in your hands. The array is divided into two halves, one sorted and one not. Values from the unsorted section are selected and placed in the sorted section at the appropriate location.
The given array is,
Input: 20, 16, 12, 8, 4, 1
Output:1, 4, 8, 12, 16, 20

Pass 1:
Consider the key is 16 and move the elements of array index 1 to 0
swaps are required because 20 is greater than 16.
Swap the elements 20 and 16
16, 20, 12, 8, 4, 1
No swaps are required because till array 1 index is sorted in order.
16, 20, 12, 8, 4, 1
Total swaps are = 1

Pass 2:
Consider the key is 12 and move the elements of array index 2 to 0
swaps are required because 20 is greater than 12.
Swap the elements 20 and 12
16, 12, 20, 8, 4, 1
swaps are required because 16 is greater than 12.
Swap the elements 16 and 12
12, 16, 20, 8, 4, 1
No swaps are required because till the array 2 index is sorted in order.
12, 16, 20, 8, 4, 1
Total swaps are=3

Pass 3:
Consider the key is 8 and move the elements of array index 3 to 0
swaps are required because 20 is greater than 8.
Swap the elements 20 and 8
12, 16, 8, 20, 4, 1
swaps are required because 16 is greater than 8.
Swap the elements 16 and 8
12, 8, 16, 20, 4, 1
swaps are required because 12 is greater than 8.
Swap the elements 12 and 8
8, 12, 16, 20, 4, 1
No swaps are required because till array 3 index is sorted in order.
8, 12, 16, 20, 4, 1
Total swaps are=6

Pass 4:
Consider the key is 4 and move the elements of array index 4 to 0
swaps are required because 20 is greater than 4.
Swap the elements 20 and 4
8, 12, 16, 4, 20, 1
swaps are required because 16 is greater than 4.
Swap the elements 16 and 4
8, 12, 4, 16, 20, 1
swaps are required because 12 is greater than 4.
Swap the elements 12 and 4
8, 4, 12, 16, 20, 1
swaps are required because 8 is greater than 4.
Swap the elements 8 and 4
4, 8, 12, 16, 20, 1
No swaps are required because till array 4 index is sorted in order.
4, 8, 12, 16, 20, 1
Total swaps are=10

Pass 5:
Consider the key is 1 and move the elements of array index 5 to 0
swaps are required because 20 is greater than 1.
Swap the elements 20 and 1
4, 8, 12, 16, 1, 20
swaps are required because 16 is greater than 1.
Swap the elements 16 and 1
4, 8, 12, 1, 16, 20
swaps are required because 12 is greater than 1.
Swap the elements 12 and 1
4, 8, 1, 12, 16, 20
swaps are required because 8 is greater than 1.
Swap the elements 8 and 1
4, 1, 8, 12, 16, 20
swaps are required because 4 is greater than 1.
Swap the elements 4 and 1
1, 4, 8, 12, 16, 20
No swaps are required because till array 5 index is sorted in order.
1, 4, 8, 12, 16, 20
Total swaps are=15
The sorted array is
1, 4, 8, 12, 16, 20
Hence the correct answer is 4, 8, 12, 16, 20, 1.

Computer Science: CUET Mock Test - 1 - Question 28

Let us consider a list of numbers (34, 16, 2, 93, 80, 77, 51) and has table size is 10. What is the order of elements(from index 0 to size-1) in the hash table? 

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 28

Concept:
Hashing:

Hashing is the process of employing an algorithm to turn any length of input into a fixed-size string or integer. The principle behind hashing is to utilize a hash function to transform a given key to a smaller integer, which is then used as an index in a hash table.
A simple hash function that works with numeric values is known as the remainder method. It takes an element from a list and divides it by the size of the hash table. The remainder so generated is called the hash value.
h(element) = element % size(hash table)
The given data,
list of numbers (34, 16, 2, 93, 80, 77, 51) and has a table size is 10.

The hash table is,

The remaining index stores the null values.
Hence the correct answer is 80, 51, 2, 93, 34, null, 16, 77, null, null.

Computer Science: CUET Mock Test - 1 - Question 29

The elements 9, 5, 7, and 2 are in the queue and are eliminated one by one. The order of elements received is __________?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 29

Concept:
Queue:

  • The queue is an abstract data structure, somewhat similar to Stacks.
  • Insertion in a queue happens at the rear end and deletion happens at the front end.
  • Unlike stacks, a queue is open at both ends. One end is always used to insert data (en queue) and the other is used to remove data (de queue). Queue follows the First-In-First-Out methodology, i.e., the data item stored first will be accessed first.
  • Queue follows the principle of First In First Out (FIFO) and Last In Last Out (LILO)

Queue follows the principle of First In First Out so the element which comes first popped first. The poped elements order is 9, 5, 7, and 2.

Hence the correct answer is 9, 5, 7, and 2.

Computer Science: CUET Mock Test - 1 - Question 30

Consider the following real-life example. 
If a person uses someone’s song as background music in his/her music video then could be an act a person is an example of:

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 30

The correct answer is option 1.

Concept:
​Copyright Infringement:

The unauthorized use of someone else's copyrighted work is called copyright infringement. As a result, it is the unauthorized use of another person's copyrighted work, infringing on the copyright holder's rights to reproduce, distribute, exhibit, or perform the protected work.

Consider the following real-life example. 
If a person uses someone’s song as background music in his/her music video then could be an act a person is an example of copyright infringement. 

  • Copyright infringement occurs when a third party infringes on the copyright holder's rights, such as the exclusive use of a work for a specified period of time.
  • Music and movies are two of the most well-known kinds of entertainment that are subjected to substantial copyright violations. Infringement lawsuits may result in contingent liabilities, or funds set aside in the event of a lawsuit.

Hence the correct answer is Copyright Infringement.

Computer Science: CUET Mock Test - 1 - Question 31

____________ is when you promote someone else's work or ideas as your own, with or without their permission, by combining it into your work without giving them full acknowledgement.

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 31

Concept:
​Plagiarism:

Plagiarism is when you promote someone else's work or ideas as your own, with or without their permission, by combining them into your work without giving them full acknowledgment.
If we copy some content from the Internet but do not mention the source or the original creator, then it is considered an act of plagiarism.
Hence the correct answer is Plagiarism.

Computer Science: CUET Mock Test - 1 - Question 32

In python, ___________ method is used to write multiple strings to a file?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 32

Concept:
writelines() method :

This method is used to write multiple strings to a file. We need to pass an iterable object like lists, tuples, etc. containing strings to the writelines() method. Unlike write(), the writelines() method does not return the number of characters written in the file.

write() method:
write() method takes a string as an argument and writes it to the text file. It returns the number of characters being written on single execution of the write() method. Also, we need to add a newline character (\n) at the end of every sentence to mark the end of the line.

read() method:
This method is used to read a specified number of bytes of data from a data file. 

readline([n]) method:
This method reads one complete line from a file where each line terminates with a newline (\n) character. It can also be used to read a specified number (n) of bytes of data from a file but maximum up to the newline character (\n). 
Hence the correct answer is writelines().

Computer Science: CUET Mock Test - 1 - Question 33

Which of the following is not Protocol?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 33

Concept:
Protocol:

The protocol is a set of standard rules that the communicating parties the sender, the receiver, and all other intermediate devices need to follow.
There number of protocols on the internet intended for some specific purpose. Some of them are,

  • HTTP stands for HyperText Transfer Protocol. It is the primary protocol used to access the World Wide Web.
  • File Transfer Protocol (FTP) is the protocol used for transferring files from one machine to another. Like HTTP, FTP also works on a client-server model.
  • PPP stands for Point to Point Protocol is a communication protocol that establishes a dedicated and direct connection between two communicating devices. 
  • Simple Mail Transfer Protocol is a protocol used for email services. It uses information written on the message header and is not concerned with the content of the email message. 
  • TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is a set of standardized rules that uses a client-server model of communication in which a user or machine (a client) requests a service from a server in the network.

Bluetooth is wireless technology. It is used for short-range wireless technology that can be used to connect mobile phones, mouse, headphones, keyboards, computers, etc. 
Hence the correct answer is Bluetooth Protocol.

Computer Science: CUET Mock Test - 1 - Question 34

What is the output for the given python code?

import pandas as pd
import numpy as np
d = {'Name':pd.Series(['Tom','James','Ricky','Vin']),
   'Age':pd.Series([25,26,25,23]),
   'Rating':pd.Series([4.23,3.24,3.98, 4])}
df = pd.DataFrame(d)
x=df.Age.mean()
print(x)

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 34

Concept:
Mean:

DataFrame.mean() will display the mean (average) of the values of each column of a DataFrame. It is only applicable for numeric values. 
The given python code is,
import pandas as pd
import numpy as np
d = {'Name':pd.Series(['Tom','James','Ricky','Vin']),
   'Age':pd.Series([25,26,25,23]),
   'Rating':pd.Series([4.23,3.24,3.98, 4])}
df = pd.DataFrame(d)
x=df.Age.mean()
print(x)
The given data frame df has,

x=df.Age.mean()
Here mean() function finds the average age of a data frame df.
Hence the function mean()= 25+26+25+23/4
Mean()= 99/4
Mean()=24.75
Hence the correct answer is 24.75.

Computer Science: CUET Mock Test - 1 - Question 35

Which of the following is true about the WHERE clause in SQL?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 35

Concept:
WHERE Clause:

The WHERE clause is used to retrieve data that meet some specified conditions. 
In the "Customers" table, chooses all customers from the nation "India":
SELECT * FROM Customers WHERE Country='India';
Hence the correct answer is WHERE clause is used to retrieve data that meet some specified conditions.

Computer Science: CUET Mock Test - 1 - Question 36

Consider the following array A, and the searching element is X. How many comparisons are required to search an element X in array A.
A[ ]= {25, 45, 87, 21, 18, 49, 13, 115, 83, 65}
X = 83

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 36

Concept:
Linear search is a sequential searching strategy in which we start at one end of the list and examine each member until we find the target element. It is the most basic search algorithm.
The given data is,
A[ ]= {25, 45, 87, 21, 18, 49, 13, 115, 83, 65}
X = 83

Compare element 25 with 83.
Hence the search is not successful and continues the program.
Compare element 45 with 83.
Hence the search is not successful and continues the program.
Compare element 87 with 83.
Hence the search is not successful and continues the program.
Compare element 21 with 83.
Hence the search is not successful and continues the program.
Compare element 18 with 83.
Hence the search is not successful and continues the program.
Compare element 49 with 83.
Hence the search is not successful and continues the program.
Compare element 13 with 83.
Hence the search is not successful and continues the program.
Compare element 115 with 83.
Hence the search is not successful and continues the program.
Compare element 83 with 83.
Hence the search is successful and exits the program.
Total comparsions are=9.
Hence the correct answer is 9.

Computer Science: CUET Mock Test - 1 - Question 37

In Python Matplotlib, which of the following graph represents graph showing frequency distributions?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 37

Concept:
Matplotlib Histograms:

A histogram is a graphical representation of frequency distributions. It is a graph that displays the number of observations inside each interval.

  • Histograms are column charts in which each column represents a value range and the height of a column correlates to the number of values in that range.
  • To create a histogram, divide the data into "bins" and count the number of data points in each bin. Each column's height in the histogram is thus proportional to the number of data points in each bin.
  • The df.plot(kind=’hist’) function automatically selects the size of the bins based on the spread of values in the data. 

If we ask for the height of 250 persons, we may get something like this:

Hence the correct answer is Histogram.

Computer Science: CUET Mock Test - 1 - Question 38

Which key is used to represent the relationship between two relations ?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 38

Concept:
Foreign Key:

A foreign key is used to represent the relationship between two relations. 

  • A foreign key is an attribute whose value is derived from the primary key of another relation.
  • This means that any attribute of a relation (referencing), which is used to refer contents from another (referenced) relation, becomes foreign key if it refers to the primary key of referenced relation.
  • The referencing relation is called Foreign Relation.

Hence the correct answer is Foreign Key.

Computer Science: CUET Mock Test - 1 - Question 39

Series is a one-dimensional array containing a sequence of values of any data type which by default have numeric data labels starting from _______.

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 39

Concept:
Two commonly used data structures in Pandas are,

  • Series
  • DataFrame

Series:

  • A Series is a one-dimensional array containing a sequence of values of any data type (int, float, list, string, etc).
  • A Pandas Series is like a column in a table. 
  • By default, series have numeric data labels starting from zero.
  • Series can have default as well as predefined index labels whereas a numpy 1-d array has only default indexes.
  • Series can contain values of any data whereas arrays can contain elements of the same data type.

​Hence the correct answer is Zero.

Computer Science: CUET Mock Test - 1 - Question 40

Which of the following are not applications of the Internet?

Detailed Solution for Computer Science: CUET Mock Test - 1 - Question 40

Concept:
Internet:

The Internet is the global network of computing devices including desktops, laptops, servers, tablets, mobile phones, other handheld devices as well as peripheral devices such as printers, scanners, etc.
The Internet has grown into a vast network with an impact that is no longer restricted to the technical realms of computer communications. As seen by the growing usage of online technologies for education, creativity, entertainment, sociability, and e-commerce, it is being utilized by everyone in society.

Applications of the Internet Following are some of the broad areas or services provided through Internet: 

  • World Wide Web (WWW) or the web, in short, is an ocean of information, stored in the form of trillions of interlinked web pages and web resources. 
  • Email is the short form of electronic mail. It is one of the ways of sending and receiving a message(s) using the Internet. 
  • Chatting or Instant Messaging (IM) over the Internet means communicating with people at different geographic locations in real-time through text message
  • VoIP (Voice over Internet Protocol) allows us to have voice calls (telephone service) via the Internet, i.e., voice transmission over a computer network rather than a traditional telephone network.

Hence the correct answer is None of the above.

8 docs|148 tests
Information about Computer Science: CUET Mock Test - 1 Page
In this test you can find the Exam questions for Computer Science: CUET Mock Test - 1 solved & explained in the simplest way possible. Besides giving Questions and answers for Computer Science: CUET Mock Test - 1, EduRev gives you an ample number of Online tests for practice

Up next

Download as PDF

Up next

Download the FREE EduRev App
Track your progress, build streaks, highlight & save important lessons and more!