CUET Exam  >  CUET Tests  >  CUET Mock Test Series  >  Computer Science: CUET Mock Test - 10 - CUET MCQ

Computer Science: CUET Mock Test - 10 - CUET MCQ


Test Description

30 Questions MCQ Test CUET Mock Test Series - Computer Science: CUET Mock Test - 10

Computer Science: CUET Mock Test - 10 for CUET 2025 is part of CUET Mock Test Series preparation. The Computer Science: CUET Mock Test - 10 questions and answers have been prepared according to the CUET exam syllabus.The Computer Science: CUET Mock Test - 10 MCQs are made for CUET 2025 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Computer Science: CUET Mock Test - 10 below.
Solutions of Computer Science: CUET Mock Test - 10 questions in English are available as part of our CUET Mock Test Series for CUET & Computer Science: CUET Mock Test - 10 solutions in Hindi for CUET Mock Test Series course. Download more important topics, notes, lectures and mock test series for CUET Exam by signing up for free. Attempt Computer Science: CUET Mock Test - 10 | 50 questions in 45 minutes | Mock test for CUET preparation | Free important questions MCQ to study CUET Mock Test Series for CUET Exam | Download free PDF with solutions
Computer Science: CUET Mock Test - 10 - Question 1

Which of the following is not a keyword in python language?

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 1

'val' is not a keyword in python language. All the other options are correct keywords used in python language.

Computer Science: CUET Mock Test - 10 - Question 2

Choose the correct output of the following SQL query: Select MID("SAVE ENVIRONMENT",6,7);

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 2

The correct answer is ENVIRON

Key Points

  • MID("SAVE ENVIRONMENT",6,7) extracts a substring from the string "SAVE ENVIRONMENT".
  • The first argument ("SAVE ENVIRONMENT") specifies the string to extract from.
  • The second argument (6) defines the starting position for the extraction. In this case, it starts at the 6th character (counting from 1, so "E").
  • The string "SAVE ENVIRONMENT" broken down:

    S A V E E N V I R O N M E N T
    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

  • The third argument (7) defines the length of the substring to extract. Here, it extracts 7 characters.
  • Since the starting position is 6 and the length is 7, the function extracts characters from the 6th position to the 7th position (inclusive). In this case, it extracts "ENVIRON".

Therefore, option 3) is the correct answer.

Computer Science: CUET Mock Test - 10 - Question 3

A mobile connected to a laptop through USB is an example of

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 3

The correct answer is PAN

Out of the given options, a mobile connected to a laptop through USB represents a PAN (Personal Area Network).

Key Points

  • LAN (Local Area Network): A network connecting devices within a limited geographical area, typically a home, office, or school. It usually involves wired connections (Ethernet) but can also be wireless (Wi-Fi).
  • WAN (Wide Area Network): A network spanning a large geographical distance, such as the internet. It connects various LANs and other networks across continents.
  • MAN (Metropolitan Area Network): A network covering a metropolitan area, typically larger than a LAN but smaller than a WAN. It often connects multiple LANs within a city or region.
  • PAN (Personal Area Network): A network connecting devices within a short physical range, typically around 10 meters. This is the ideal fit for a mobile phone and laptop connected via USB. The USB cable provides a direct connection for data transfer and potential functionalities like file management or screen mirroring (depending on software and device capabilities).

In essence, a PAN focuses on short-range communication between personal devices.

Computer Science: CUET Mock Test - 10 - Question 4
Which command is used to delete table from a database ?
Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 4

The correct answer is Drop Table ;

Key Points

  • Drop Table is a permanent action. It removes the table and all its data, indexes, triggers, and constraints. There is no undo, so exercise caution.
  • Consider using DELETE FROM if you only want to remove the data from a table while preserving its structure.
  • If you want to quickly remove all data from a table without dropping it, you can use TRUNCATE TABLE .
Computer Science: CUET Mock Test - 10 - Question 5

Match List I with List II

Choose the correct answer from the options given below:

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 5

The correct answer is A - II, B - IV, C - I, D - III

Key Points

  • A. Browser (II. Google Chrome): A browser is a software application that allows users to access and navigate the internet. Google Chrome is an example of a popular web browser.
  • B. Multiport modem (IV. Hub): A multiport modem is a device that allows multiple devices to connect to a single internet connection. A hub is a networking device that connects multiple devices on a network, acting like a central point for data transmission.
  • C. Protocol (I. SMTP): A protocol is a set of rules that govern communication between devices. SMTP (Simple Mail Transfer Protocol) is a specific protocol used for sending emails.
  • D. BCC (III. Blind carbon copy): BCC is a field in an email that allows you to send a copy of the email to recipients without revealing their addresses to other recipients listed in the "To" or "Cc" fields.
Computer Science: CUET Mock Test - 10 - Question 6
Given the following SQL string functions: middle(), mid(), substr(), substring() Find the odd - one out.
Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 6

The correct answer is middle()

Key Points

  • SQL provides functions to extract substrings from a given string, among which the commonly supported and used functions are substr() and substring().
  • Both fulfill similar roles in different SQL dialects, where they are used to return a specific portion of a string.
  • The function mid() is essentially the same as substr() and substring(), and it's known to be used in MySQL as a synonym for substring().
  • However, middle() is not a standard or commonly used SQL string function in the context of extracting substrings.
  • There is no widely-recognized SQL function by the name middle() for handling string operations in the major SQL database management systems such as MySQL, PostgreSQL, SQL Server, Oracle, etc. Hence, it stands out as the odd one in this list.
Computer Science: CUET Mock Test - 10 - Question 7
The Database Language to create the structure of a Database is
Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 7

The correct answer is DDL

Key Points

  • DDL (Data Definition Language): This is a subset of SQL used to define and manage all the objects in an SQL database. DDL contains commands such as CREATE, ALTER, DROP, and TRUNCATE which are used to create, alter, or delete structural elements in the database such as tables, indexes, constraints and views. This language doesn't interact with the data itself, but it sets up the structure in which the data resides.
  • DCL (Data Control Language): This subset of SQL includes commands like GRANT and REVOKE, which are used for managing rights and permissions to database system objects. This is critical for controlling user access to the database, ensuring that only authorized users can perform certain functions.
  • DML (Data Manipulation Language): This is another subset of SQL that is used to retrieve, insert, delete, and update data in a database. It includes commands such as SELECT, INSERT, UPDATE, and DELETE.
  • DOL: There isn't a typical Database Language known as DOL.
Computer Science: CUET Mock Test - 10 - Question 8
In __________ index instead of storing all the columns for a record together, each column is stored separately with all other rows in an index.
Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 8

The correct answer is option 2.

Concept:

The column store an index instead of storing all the columns for a record together, each column is stored separately with all other rows in an index.

Column store:

A column store database is a form of database that uses a column-oriented paradigm to store data.

  • A notion known as a keyspace is used to store databases in columns. In the relational paradigm, a keyspace is analogous to a schema.
  • All of the column families (similar to tables in the relational model), which include rows, which have columns, are contained in the keyspace.

Hence the correct answer is Column store.

Computer Science: CUET Mock Test - 10 - Question 9
What type is returned by the read() method of the file object?
Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 9

The correct answer is String

Key Points

  • The read() method in Python is used to read the entire contents of a file into a single string.
  • This method doesn't split the file content into lines or any other parts.
  • Instead, it simply returns the content as it is, but as a single string, which makes it ideal for reading the whole file at once when you need to process the file content as a single data block.
Computer Science: CUET Mock Test - 10 - Question 10
Which of The following is not a database Object?
Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 10

The correct answer is Relationships

Key Points

  • "relationships" in a relational database are not standalone objects but rather a concept that describes the way two tables are related to each other.
  • This is described via primary and foreign keys within the tables. A relationship can be one-to-one, one-to-many, or many-to-many.
  • Relationships, while not considered database objects, can be compared to functions in mathematics due to their interconnected nature.

Additional Information

In a relational database, there are several types of objects that are used to store, retrieve, and manipulate data, such as tables, indexes, views, and queries:

  • Tables: These are used to store data in a structured way, with defined data types for each column.
  • Queries: These are commands or instructions given to the database to perform certain actions like fetching, updating, or deleting data.
  • Indexes: These are used to speed up the retrieval of the data in a database.
  • Views: These are virtual tables based on the result-set of a SQL statement and often used for security purposes to restrict the user’s access to the database.
  • A report is a useful database object that is particularly beneficial when you wish to exhibit the information in your database for various purposes such as: showcase or distribute a data summary, preserve a snapshot of the data, or offer details about individual entries.
Computer Science: CUET Mock Test - 10 - Question 11
Which of the following is not a network?
Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 11

The correct answer is XAN

Key PointsXAN: It is not recognized as any standard or commonly-used type of network in the field of computer science or information technology.

Basic Types of networks are:

  • WAN (Wide Area Network): A WAN spans a large geographic area, often a country or continent. It contains a collection of machines intended for running user (i.e., application) programs. These machines, called hosts, are connected by a network. The Internet is the ultimate, world-wide WAN.
  • LAN (Local Area Network): A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN. Connected devices share the resources of a single computer in a LAN setting, and connected computers each share resources – such as a printer or a file server - within the same site.
  • MAN (Metropolitan Area Network): A MAN is a network that connects two or more local area networks or campus area networks together but does not extend beyond the boundaries of the immediate town, city, or metropolitan area. Multiple routers, switches, and hubs are connected to create a MAN.
Computer Science: CUET Mock Test - 10 - Question 12

Earlier version of SQL name is:

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 12

SEQUEL later became SQL (still pronounced "sequel"). In 1979, Relational Software, Inc. (now Oracle) introduced the first commercially available implementation of SQL. Today, SQL is accepted as the standard RDBMS language.

Computer Science: CUET Mock Test - 10 - Question 13

Which of the following is the correct way to call a function?

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 13

The correct way to call a function is my_func().

Computer Science: CUET Mock Test - 10 - Question 14

What is the syntax to work with the database?

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 14

USE DatabaseName;
The database name should always be unique within the RDBMS.

Computer Science: CUET Mock Test - 10 - Question 15

Which of the following components is/are part(s) of a function header in python?

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 15

Function Name and Parameter List are parts of a function header in python.

Computer Science: CUET Mock Test - 10 - Question 16

What is the global system of interconnected computer networks called?

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 16

Internet is a global system because it interconnects the networks worldwide.

Computer Science: CUET Mock Test - 10 - Question 17

Syntax of the seek function in python is myfile.seek(offset, reference_point) where myfile is the file object. What is the default value of reference_point?

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 17

Python file method seek() sets the file's current position at the offset. The whence argument is optional and defaults to 0, which means absolute file positioning; other values are 1, which means seek relative to the current position, and 2, which means seek relative to the file's end. There is no return value.

Computer Science: CUET Mock Test - 10 - Question 18

Read the statements given below and choose the correct answer:

Statement A: It is very difficult to organize unstructured data.
Statement B: CSV helps into organize a huge amount of data in a proper and systematic way.

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 18

Unstructured data offers more flexibility and scalability. The absence of the pre-defined purpose of unstructured data makes it super flexible as the information can be stored in various file formats. Yet, this data is subjective and more difficult to work with. CSV helps into organize a huge amount of data in a proper and systematic way.

Computer Science: CUET Mock Test - 10 - Question 19

Two statements are given below:

Statement I: The order of items in the output of the map() method in Python is same as the order in the input iterable.
Statement II: The order of items in the output of the map() method in Python is sorted in ascending order.

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 19

The map() method in Python preserves the order of items in the input iterable, and applies the given function to each item in that order. Therefore, the order of items in the output of the map() method is the same as the order in the input iterable. The order of items in the output of the map() method in Python is not sorted in ascending order.

Computer Science: CUET Mock Test - 10 - Question 20

Stack is a ___________ data structure.

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 20

Stacks are dynamic data structures that follow the Last In First Out (LIFO) principle. The last item to be inserted into a stack is the first one to be deleted from it.

Computer Science: CUET Mock Test - 10 - Question 21

Directions: Match the contents under List I with those under List II.

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 21
  • Border Gateway Protocol (BGP) is a protocol used for exchanging routing information between different autonomous systems on the Internet. Multiprotocol Label Switching (MPLS) is a protocol used for forwarding network packets based on labels. It is used to improve the speed and efficiency of network traffic.
  • Internet Protocol Security (IPsec) is a protocol used for securing Internet Protocol (IP) communications. It provides confidentiality, integrity, and authentication services for IP packets.
  • Dynamic Host Configuration Protocol (DHCP) is a protocol used for assigning IP addresses to devices on a network. It allows devices to automatically obtain IP addresses and other network configuration information.
Computer Science: CUET Mock Test - 10 - Question 22

In a relational schema, each tuple is divided into fields called

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 22

Each tuple is divided into fields called domains in relational schema.

Computer Science: CUET Mock Test - 10 - Question 23

Antivirus software is an example of _____.

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 23

Antivirus software is a type of security software designed to protect users from multiple types of malware, not just viruses.

Computer Science: CUET Mock Test - 10 - Question 24

A ________ computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of-users.

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 24

A mainframe computer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users. Mainframe computers (colloquially referred to as "big iron") are computers used primarily by large organizations for critical applications, bulk data processing, such as census, industry and consumer statistics, enterprise resource planning, and transaction processing.

Computer Science: CUET Mock Test - 10 - Question 25

Assume that the position of the file pointer is at the beginning of 3rd line in a text file. Which of the following option can be used to read all the remaining lines?

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 25

The myfile.readlines() function is used to read the entire files.
To get all the information in a file, readlines() is used. It returns the entire information in the file. The radlines() function gives all data in the file as a collection of strings. When using the readlines() function, all the data in the file is read and it will not be stopped until the entire file ends.

Computer Science: CUET Mock Test - 10 - Question 26

Match List I and List II.

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 26
  • Seek() is a built-in Python method that is used to change the position of the file pointer. It takes two arguments: the offset and the origin. The offset specifies the number of bytes to move, and the origin specifies the reference position from where the offset is to be measured.
  • Tell() is a built-in Python method that is used to get the current position of the file pointer. It returns the current position of the file pointer in bytes.
  • Truncate() is a built-in Python method that is used to resize a file to a specified size. If the specified size is smaller than the original size of the file, the file will be truncated to the specified size. If the specified size is larger than the original size of the file, the file will be extended to the specified size, and the extended portion will be filled with null bytes.
  • Binary mode is a file mode used to open a file in binary format. When a file is opened in binary mode, the data is read or written as a sequence of bytes, and no translation is performed on the data. Binary mode is denoted by "b" in the file mode.
Computer Science: CUET Mock Test - 10 - Question 27

Which of the following items are present in the function header?

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 27

Function header consists of function name & parameter list.

Computer Science: CUET Mock Test - 10 - Question 28

Given Tuple: tup1= (10, 20, 30, 40, 50, 60, 70, 80, 90)
What will be the output of print (tup1 [3:7:2])?

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 28

The output will be (40,60).
In tuples, indexing starts with 0. Therefore on third index, the element will be 40.
Similarly, the element on the seventh index will be 80, but it will not be included as the end value is not included in slicing.
2 represents the iteration gap or steps. Therefore, only 2nd place numbers from start will be printed between the range 40 and 70, i.e. 40 and 60.

Computer Science: CUET Mock Test - 10 - Question 29

Identify the output of the following Python statements.

x = [[10.0, 11.0, 12.0],[13.0, 14.0, 15.0]]
y = x[1][2] print(y)

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 29
  • Given is a list inside list (called nested lists), so when we assign values to y we are linking an element to it.
  • So, x[1] will select second nested list because in python, the counting starts from 0,1,2... and so on.
  • So, if you want to show 1st value, you have to write 0.
  • Now, after selecting second nested list, we also have to write [2] after x[2], so this will select the third element of the nested list which is 15.0 and, hence, the answer is 15.0
Computer Science: CUET Mock Test - 10 - Question 30

Which of the following statements is true?

Detailed Solution for Computer Science: CUET Mock Test - 10 - Question 30

Pickle in Python is primarily used in serializing and deserializing a Python object structure. In other words, it's the process of converting a Python object into a byte stream to store it in a file/database, maintain program state across sessions, or transport data over the network.

View more questions
8 docs|148 tests
Information about Computer Science: CUET Mock Test - 10 Page
In this test you can find the Exam questions for Computer Science: CUET Mock Test - 10 solved & explained in the simplest way possible. Besides giving Questions and answers for Computer Science: CUET Mock Test - 10, EduRev gives you an ample number of Online tests for practice
Download as PDF