CUET Exam  >  CUET Tests  >  CUET Mock Test Series  >  Computer Science: CUET Mock Test - 3 - CUET MCQ

Computer Science: CUET Mock Test - 3 - CUET MCQ


Test Description

40 Questions MCQ Test CUET Mock Test Series - Computer Science: CUET Mock Test - 3

Computer Science: CUET Mock Test - 3 for CUET 2024 is part of CUET Mock Test Series preparation. The Computer Science: CUET Mock Test - 3 questions and answers have been prepared according to the CUET exam syllabus.The Computer Science: CUET Mock Test - 3 MCQs are made for CUET 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Computer Science: CUET Mock Test - 3 below.
Solutions of Computer Science: CUET Mock Test - 3 questions in English are available as part of our CUET Mock Test Series for CUET & Computer Science: CUET Mock Test - 3 solutions in Hindi for CUET Mock Test Series course. Download more important topics, notes, lectures and mock test series for CUET Exam by signing up for free. Attempt Computer Science: CUET Mock Test - 3 | 40 questions in 45 minutes | Mock test for CUET preparation | Free important questions MCQ to study CUET Mock Test Series for CUET Exam | Download free PDF with solutions
Computer Science: CUET Mock Test - 3 - Question 1

Given below are two statements, one labelled as Assertion (A) and the other labelled as Reason (R):

Assertion (A): Database Management System (DBMS) provides a variety of software tools for organising data.
Reason (R): Normalisation is the process for removing data redundancy.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 1
  • Assertion is correct because Database Management System (DBMS) provides a variety of software tools for organising, processing and querying data in a flexible manner. MS Access, Oracle, SQL Server, and IBM-DB2 are examples of DBMS software.
  • Reason is correct because normalisation is the process for removing data redundancy. It breaks up the information into separate but related tables.
  • Therefore, assertion and reason both are correct, but reason is not the correct explanation of assertion.
Computer Science: CUET Mock Test - 3 - Question 2

When will the bad_alloc exception be thrown by a program?

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 2

When we are allocating the memory using new operator and allocation fail, then bad_alloc exception is thrown by the program.

1 Crore+ students have signed up on EduRev. Have you? Download the App
Computer Science: CUET Mock Test - 3 - Question 3

A file management system can typically access records from:

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 3

A file management system can typically access records from only one file at a time.

Computer Science: CUET Mock Test - 3 - Question 4

Two statements are given below, one is Assertion A and the other is Reason R.

Assertion A: Data is any form of information that can be processed by a computer.
Reason R: Data can be in the form of text, numbers, images, audio, and video.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 4

Both the Assertion and Reason are true, and the Reason is the correct explanation of the Assertion. Data is any form of information that can be processed by a computer, including text, numbers, images, audio, and video.

Computer Science: CUET Mock Test - 3 - Question 5

___ is an example for RDBMS.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 5

Top 10 most popular RDBMSs are:
Oracle
MySQL
SQL Server
PostgreSQL
IBM DB2
Microsoft Access
SQLite
MariaDB
Informix
Azure SQL
So, all the above is correct.

Computer Science: CUET Mock Test - 3 - Question 6

Which constraint does not allow NULL values?

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 6

The PRIMARY KEY constraint uniquely identifies each record in a table. Primary keys must contain UNIQUE values, and cannot contain NULL values.

Computer Science: CUET Mock Test - 3 - Question 7

Directions: Match the contents under List I with those under List II.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 7

'Try' is used to define the code block where an exception might occur. 'Raise' is used to trigger a specific exception intentionally. 'Finally' defines the code block that will execute regardless of whether an exception occurs. 'Except' is used to handle the raised exception.

Computer Science: CUET Mock Test - 3 - Question 8

By using computer networks, we can

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 8

We can do all the above using computer networks.

Computer Science: CUET Mock Test - 3 - Question 9

Two statements are given below:
Statement I: The 'x' file access mode allows you to create a new file but will raise an error if the file already exists.
Statement II: The 'a' file access mode allows you to write to the file but not overwrite any existing content.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 9

The 'x' file access mode is used to open a file for exclusive creation. This mode allows you to create a new file but will raise an error if the file already exists. This mode is useful when you want to create a new file and ensure that it does not already exist. The 'a' file access mode is used to open a file for appending data to the end of the file. This mode allows you to write to the file but not overwrite any existing content. If the file does not exist, it will be created.

Computer Science: CUET Mock Test - 3 - Question 10

Testing stack for overflow is performed by comparing the values of the top with value ______.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 10

When stack is completely full (i.e. TOP= MaxSize -1) and we try to insert more elements onto stack then this condition is called overflow condition and no further element could be inserted now until any element is deleted.

Computer Science: CUET Mock Test - 3 - Question 11

What is the similarity between the operations on stacks and those on queues, although they are entirely different?

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 11

Both the stack and queue are the linear data structure, which means that the elements are stored sequentially and accessed in a single run.

Computer Science: CUET Mock Test - 3 - Question 12

Which of the following is not a limitation of the binary search algorithm?

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 12

The major limitation of binary search is that there is a need for the sorted array to perform the binary search operation. If the array is not sorted the output is either not correct or maybe after a long number of steps and according to the data structure, the output should come in a minimum number of steps.
Not a limitation of Binary search :Binary search algorithm is not efficient when the data elements are more than 1000.

Computer Science: CUET Mock Test - 3 - Question 13

Two statements are given below, one is Assertion A and the other is Reason R.
Assertion A: Data visualization is the process of creating visual representations of data to communicate information effectively.
Reason R: Data visualization helps to uncover patterns, trends, and insights in data that might not be apparent in raw data.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 13

Both the Assertion and Reason are true, and the Reason is the correct explanation of the Assertion. Data visualization is the process of creating visual representations of data to communicate information effectively. It helps to uncover patterns, trends, and insights in data that might not be apparent in raw data, making it easier for decision-makers to understand and act on the data.

Computer Science: CUET Mock Test - 3 - Question 14

The set of 'Processed data' is called?

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 14

Data processing refers to the process of performing specific operations on a set of data or a database.
Process data is called information.

Computer Science: CUET Mock Test - 3 - Question 15

Two statements are given below, one is Assertion A and the other is Reason R.

Assertion A: A LAN (Local Area Network) is a computer network that connects devices within a small geographic area such as a city.
Reason R: LANs typically use wired or wireless connections to enable devices to communicate with each other and share resources such as printers and files.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 15

The Assertion is not correct and Reason are correct. A LAN (Local Area Network) is a computer network that connects devices within a small geographic area such as a building or a campus not city. LANs typically use wired or wireless connections to enable devices to communicate with each other and share resources such as printers and files.

Computer Science: CUET Mock Test - 3 - Question 16

Ankita is writing a program to perform some operations in Queue. She has created three Insert_in_Queue(Student), Delete_from_Queue(Student) and Print_Queue(Student) methods/functions in Python to add a new student name, delete a student name and print the list of student from a queue, considering them to act as insert, delete and print operations of the Queue data structure. She is not getting the desired result. Help her to get the desired result from the given Python code.
def Insert_in_Queue(queue):
a=input("enter student name: ")
queue.____________ # Statement-1
def Delete_from_Queue (queue):
if (____________): # Statement-2
print("Queue empty")
else:
print("Deleted element is: ",queue[0])
del queue[___] #Statement-3
def Print_Queue(queue):
if not ________: #Statement-4

print(queue[__:___ ]) # Statement-5

Q. What should Ankita write to complete the Statement-1 to store the student name?

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 16

The append() method in Python adds a single item to the existing list.

Computer Science: CUET Mock Test - 3 - Question 17

Ankita is writing a program to perform some operations in Queue. She has created three Insert_in_Queue(Student), Delete_from_Queue(Student) and Print_Queue(Student) methods/functions in Python to add a new student name, delete a student name and print the list of student from a queue, considering them to act as insert, delete and print operations of the Queue data structure. She is not getting the desired result. Help her to get the desired result from the given Python code.
def Insert_in_Queue(queue):
a=input("enter student name: ")
queue.____________ # Statement-1
def Delete_from_Queue (queue):
if (____________): # Statement-2
print("Queue empty")
else:
print("Deleted element is: ",queue[0])
del queue[___] #Statement-3
def Print_Queue(queue):
if not ________: #Statement-4

print(queue[__:___ ]) # Statement-5

Q. Fill in the blank in Statement-3 with index number.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 17

The del keyword is used to delete objects. In Python, everything is an object. So, the del keyword can also be used to delete variables, lists, or parts of a list, etc.

Computer Science: CUET Mock Test - 3 - Question 18

Ankita is writing a program to perform some operations in Queue. She has created three Insert_in_Queue(Student), Delete_from_Queue(Student) and Print_Queue(Student) methods/functions in Python to add a new student name, delete a student name and print the list of student from a queue, considering them to act as insert, delete and print operations of the Queue data structure. She is not getting the desired result. Help her to get the desired result from the given Python code.
def Insert_in_Queue(queue):
a=input("enter student name: ")
queue.____________ # Statement-1
def Delete_from_Queue (queue):
if (____________): # Statement-2
print("Queue empty")
else:
print("Deleted element is: ",queue[0])
del queue[___] #Statement-3
def Print_Queue(queue):
if not ________: #Statement-4

print(queue[__:___ ]) # Statement-5

Q. Specify the range to print all queue elements in Statement-5.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 18

The len() function returns the number of items (length) in an object.

Computer Science: CUET Mock Test - 3 - Question 19

Ankita is writing a program to perform some operations in Queue. She has created three Insert_in_Queue(Student), Delete_from_Queue(Student) and Print_Queue(Student) methods/functions in Python to add a new student name, delete a student name and print the list of student from a queue, considering them to act as insert, delete and print operations of the Queue data structure. She is not getting the desired result. Help her to get the desired result from the given Python code.
def Insert_in_Queue(queue):
a=input("enter student name: ")
queue.____________ # Statement-1
def Delete_from_Queue (queue):
if (____________): # Statement-2
print("Queue empty")
else:
print("Deleted element is: ",queue[0])
del queue[___] #Statement-3
def Print_Queue(queue):
if not ________: #Statement-4

print(queue[__:___ ]) # Statement-5

Q. Fill in the blank in Statement-2 to check whether the queue is empty or not.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 19

The isEmpty() method checks whether a string is empty or not. This method returns true if the string is empty (length() is 0), and false if not.

Computer Science: CUET Mock Test - 3 - Question 20

Ankita is writing a program to perform some operations in Queue. She has created three Insert_in_Queue(Student), Delete_from_Queue(Student) and Print_Queue(Student) methods/functions in Python to add a new student name, delete a student name and print the list of student from a queue, considering them to act as insert, delete and print operations of the Queue data structure. She is not getting the desired result. Help her to get the desired result from the given Python code.
def Insert_in_Queue(queue):
a=input("enter student name: ")
queue.____________ # Statement-1
def Delete_from_Queue (queue):
if (____________): # Statement-2
print("Queue empty")
else:
print("Deleted element is: ",queue[0])
del queue[___] #Statement-3
def Print_Queue(queue):
if not ________: #Statement-4

print(queue[__:___ ]) # Statement-5

Q. Select the correct option to complete Statement-4.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 20

The isEmpty() method checks whether a string is empty or not.

Computer Science: CUET Mock Test - 3 - Question 21

File Transfer Protocol (FTP) use port number ____ and _____ to transfer communication and data signals respectively.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 21

The correct option is 21 and 20
CONCEPT:
File Transfer Protocol (FTP) is a standard application layer communication protocol used for the transfer of files or data from a server to a client on a computer network.
FTP is built on a client-server architecture that runs on top of TCP just like HTTP and uses separate control and data connections between the client and the server.
FTP uses two port numbers 20 and 21. Port 21 is used for the establishment of a connection between the 2 computers and port 20 is used to transfer data.
Port 20- Data 
Port 21- Communication

Computer Science: CUET Mock Test - 3 - Question 22

Which virus attack serves unwanted and aggressive advertising (e.g., pop-up ads) to the end-user?

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 22

Concept:
Adware:
Adware is software that displays unwanted and aggressive advertising to end-users (for example, pop-up adverts). Malvertising is the use of legal advertisements to distribute malware to end-user PCs.
Adware earns cash for its creator by showing internet adverts in the software's user interface or on a screen that appears in the user's face during the installation process.
Hence the correct answer is adware.

Computer Science: CUET Mock Test - 3 - Question 23

Which of the following allows communication by allowing various computer networks around the world to interconnect?

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 23
  • The internet is a globally connected network system that transmits data via various types of media; Sometimes it is referred to as a ‘network of networks’
  • The internet is a network of global exchanges including private, public, business, academic and government networks connected by guided, wireless and fibre-optic technologies
  • A server is a computer program or a device that provides functionality for other programs or devices, called "clients"
  • A client is a computer that connects to and uses the resources of a remote computer, or server
  • A component is a software object, intended to interact with other components
  • Layered architecture is a type of client-server architecture in which functions are physically separated
Computer Science: CUET Mock Test - 3 - Question 24

Computer networks constituting the internet are connected by telephones, underwater cables and _____________

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 24

Computer networks constituting the internet are connected by telephones, underwater cables, and Satellites.

  • A computer network, also known asa data network, is a telecommunications network which allows computers to exchange its data.
  • The Internet has emerged as a useful means of global communication, services and information sharing.
  • A huge network of millions of computer networks constitutes the Internet. These networks are connected by telephones, underwater cables, and satellites.
Computer Science: CUET Mock Test - 3 - Question 25

Which of the following function generate a copy of the data that can be recovered if the primary data fails?

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 25

Concept:
Data backup:

Data backup is the process of transferring data from one area to another in the event of a tragedy, accident, or malicious act. Modern businesses rely on data and losing it may result in significant losses and disrupt operations. This is why all firms, large and small, should back up their data.

  • The purpose of the backup is to create a copy of data that can be recovered in the event of a primary data failure.
  • The practice of storing additional copies of your data in physical or virtual locations separate from your data files in storage is referred to as data backup.

Hence the correct answer is Data backup.

Computer Science: CUET Mock Test - 3 - Question 26

What is e-waste?

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 26

Electronic waste (e-waste):

  • It refers to the disposal of broken or obsolete electronic components and materials or waste.
  • Technology is developing so fast that electronic equipment soon becomes obsolete, creating e-waste
  • E-waste materials may be valuable and recyclable, such as random-access memory and reusable laptops
  • However, hazardous materials, such as cathode ray tube monitors, require special handling in the disposal
  • Common discarded electronic products include computers, televisions, stereos, copiers and fax machines
Computer Science: CUET Mock Test - 3 - Question 27

Which of the following does not belong to built in exception class of python

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 27

The correct option is UnderflowError
CONCEPT:
Indentation Errors:
Occur when the spaces or tabs are not placed properly while writing the python code.
Due to indentation, the code looks more efficient and beautifully structured which increases the readability of the code.
IndexError: When we try to access an item using a value that is out of the index range of the list and does not exist then an “index out of range” error occurs.
For example, we have a list of 4 elements, the index is in the range of 0 to 3.
list = [11, 12, 22, 10]     {0, 1, 2, 3}  // are the respective index of the given list 
If we try to access index 4 of the list it will result in an IndexError: list index out of range as we are trying to access an index that is out of the index range of the list.
OverFlowError: This error occurs when an arithmetic operation exceeds the limits of the variable type.
There is no exception error like UnderFlowError in the python built-in exception class.

Computer Science: CUET Mock Test - 3 - Question 28

 __________  is not a database.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 28

The correct answer is WinRAR.

  • The database is an organized collection of data that enables data to be stored and manipulated.
  • A database ensures data security, integrity, and reduces data duplication and error.
  • Some of the popular databases include MySQL, Sybase, Oracle, MongoDB, PostgreSQL, SQL Server.
  • WinRAR is a Windows data compression tool that creates and displays archives in RAR or ZIP file formats.
Computer Science: CUET Mock Test - 3 - Question 29

What will be the output of the following code 
import pandas as pd
import numpy as np

dict1 = {'Rajasthan': 'Jaipur', 'Manipur': 'Imphal', 'Meghalaya': 'Shillong'}

ser = pd.Series(dict1)
print(ser[0])

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 29

The correct option is Jaipur
CONCEPT:
In series, Indexes are of two types:

  • Positional index: Positional index takes an integer value that corresponds to its position in the series starting from 0
  • Labelled index: Labelled index takes any user-defined label as an index.
     

The following example shows the usage of the labelled index for accessing a value from a Series 'ser' as defined in the above question. 
>>> ser['Manipur']
Output: Imphal
We can also access an element of the series using the positional index as shown in the below example
>>> ser[2]
Output: Imphal
Similarly, ser[0] will return the value at index 0 which is Jaipur associated with key/index Rajasthan.  

Computer Science: CUET Mock Test - 3 - Question 30

Map the following statements with true(T)/false(F) respectively.
S1: SQL query 'SELECT count(distinct *) From EMP' will generate error.
S2: ‘Having’ clause is used to filter groups.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 30

DISTINCT can be used with aggregates: COUNT, AVG, MAX, etc.
DISTINCT operates on a single column. DISTINCT for multiple columns is not supported.
Having clause is used to filter group. 
The HAVING clause was added to SQL because the WHERE keyword could not be used with aggregate functions.
The HAVING clause is used to restrict the results returned by the GROUP BY clause.

Computer Science: CUET Mock Test - 3 - Question 31

Which of the following method can be used to print first 5 elements of pandas series

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 31

The correct option is Both options 1 and 2

CONCEPT:
Method head(n) in pandas series will return the first n members of the series.
If the value for n is not passed in the head method, then by default is takes n as 5 and the first five members are displayed.
Whereas the count() method in pandas series returns the number of values in the Series
Thus both head() and head(5) can be used to print first 5 elements of the series.

Computer Science: CUET Mock Test - 3 - Question 32

________ transport layer protocol is used to support electronic mail.

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 32

SNMP:
Simple network management protocol is an application level protocol in which a few manager stations control a set of agents. It can be used in a heterogeneous internet made of different LAN and WAN connected by routers. Manager is the host that runs the SNMP client and agent is the SNMP server.

IP:
Internet protocol is a protocol that routes the packets so that they can travel across networks and arrive at the correct destination.

SMTP:
It stands for simple mail transfer protocol. It allows software to transmit mail over the internet. It only used to send messages to the server. POP and IMAP are used to receive the messages.

TCP:

  • TCP is the transfer layer protocol. Electronic mail function is supported by the transfer layer protocol TCP.
  • TCP uses the services of IP to deliver individual segments to the receiver. TCP is connection oriented and reliable transport protocol.
Computer Science: CUET Mock Test - 3 - Question 33

What is the mean and mode of the following data set  9, 5, 2, 3, 9, 6, 6, 8, 4?

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 33

The correct option is 5.7 and 6, 9
CONCEPT:

In simple terms mean or average of a data set is found by taking the sum of all numbers in the given data set and then dividing it by the number of values in the data
The mode of a data set is the number that appears the most number of times. To find the mode of the given data set we need to count the number of times each number occurs in the data set and the number which occurs the max number of times is the mode.
Note that there can be more than one mode in a given data set but if all numbers occur the same number of times there is no mode.

EXPLANATION:
In the following data set  9, 5, 2, 3, 9, 6, 6, 8, 4
Mean = (9 + 5 + 2 + 3 + 9 + 6 + 6 + 8 + 4) / 9 = 52/9 = 5.77
In the given data set 6 and 9 appear 2 times which is the maximum as compared to other numbers.
Thus modes = 6 and 9

Computer Science: CUET Mock Test - 3 - Question 34

In the dequeue operation, we need to first check whether the queue is empty, then

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 34

Concept:

  • If dequeue is performing, first we will check whether queue is containing some element or not if queue is containing some element then simply we will delete that element.
  • If queue is not having any element and we are performing dequeue on queue then it will produce underflow error and the program will get terminated.

So option D is the correct answer.

Computer Science: CUET Mock Test - 3 - Question 35

What is the full form of HTTP 

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 35

The correct option is HyperText Transfer Protocol 
CONCEPT:
HTTP stands for Hypertext Transfer Protocol which is an application-level protocol that provides standard between a web browser and web server to establish communication and is the foundation for data communication for the World Wide Web (i.e. internet) since 1990.
It is a set of rules for transferring data such as text, images, and other multimedia files from one computer to another.
Whenever a web user opens their web browser, the user indirectly uses HTTP.

Computer Science: CUET Mock Test - 3 - Question 36

What will be the output of the following Python code if the input provided is "b":

a=input()
try:
  print( int(a) )
except NameError:
  print("a is not defined")
except ValueError:
  print("The value of a is not a number")

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 36

The correct option is The value of a is not a number

CONCEPT:
In python, the input() function by default takes the input value as a string. 
so print(int(a)) statement in try block will try to typecast string "b" to int which will raise a ValueError.
In the above question
Option 1: The value of a is not a number    
// ValueError is raised when the value provided is not of the expected type as explained above.
Option 2: a is not defined                   
//  NameError is raised when the identifier is accessed before being defined in the local or global scope. But here "a" is already defined.
Option 3 "66"                                               
//  66 is the ASCII code of char "B".
Option 4 "98"                                                   
//  98 is the ASCII code of char "b".

Computer Science: CUET Mock Test - 3 - Question 37

Five people P, Q, R, S and T are standing in a queue. R is standing between P and T. P is just behind Q and Q is second in the queue. Who is second last in the queue?

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 37

R is standing between P and T ⇒ PRT or TRP
P is just behind Q ⇒ QPRT (TRPQ not possible)
Q is the second in queue ⇒ SQPRT (as only S is left)
Thus second last in the queue is R.

Computer Science: CUET Mock Test - 3 - Question 38

DDoS Stands for

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 38

The correct option is Distributed Denial of Service

CONCEPT:
DDoS stands for Distributed denial of service
which is a cyberattack that disrupts online services and resources of a targeted server, service, or network by overwhelming them with a flood of Internet traffic.
This makes the targeted online service unusable for the duration of the DDoS attack and may result in a huge loss for the targeted organization.
DDoS attacks achieve effectiveness by utilizing exploited machines that include computers and other networked resources of a criminally-controlled network spread around the globe.

Computer Science: CUET Mock Test - 3 - Question 39

Which of the following is not a type of DDoS attack

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 39

The correct option is All of the above

CONCEPT:
Distributed denial of service (DDoS) is a broad class of cyberattack that disrupts online services and resources of a targeted server, service or network by overwhelming them with a flood of Internet traffic. This makes the targeted online service unusable for the duration of the DDoS attack and may result in huge loss for the targeted organization.
DDoS attacks achieve effectiveness by utilizing exploited machines that include computers and other networked resources of a criminally-controlled network spread around the globe.

DDoS attacks can be classified as:

  • Volumetric attacks: These attacks employ methods to generate massive volumes of traffic to completely saturate bandwidth, creating a traffic jam that makes it impossible for legitimate traffic to flow into or out of the targeted site.
  • Protocol attacks: Protocol attacks are designed to completely consume the processing capacity of network infrastructure resources like servers, firewalls, and load balancers by targeting Layer 3 and Layer 4 protocol communications of the target system with malicious connection requests.
  • Application attacks: These attacks exploit weaknesses in the application layer—Layer 7—by opening connections and initiating process and transaction requests that consume finite resources like disk space and available memory of the target system.
Computer Science: CUET Mock Test - 3 - Question 40

Which of the following is the main difference between Primary Key and Unique Key

Detailed Solution for Computer Science: CUET Mock Test - 3 - Question 40

The correct option is Primary Key does not accept NULL Values whereas Unique Key does
CONCEPT:
A column or attribute of a table is said to be a primary key of the table if it can uniquely identify each tuple in the table.
In a table, there can only be one primary key and it can not contain any duplicate and NULL values.
The primary key is selected from a set of candidate keys of a relation.
Whereas
Unique key constraints also identify a tuple uniquely in a table. Unlike primary key, a table can have more than one unique key.
A Unique key can accept NULL values but cannot contain any duplicate.
Example: Consider the below Student table,

In the above table Roll No.  is the primary key of the relation and it cannot contain NULL values.
But Email is the Unique Key that does not contain duplicates but can have NULL values.

8 docs|148 tests
Information about Computer Science: CUET Mock Test - 3 Page
In this test you can find the Exam questions for Computer Science: CUET Mock Test - 3 solved & explained in the simplest way possible. Besides giving Questions and answers for Computer Science: CUET Mock Test - 3, EduRev gives you an ample number of Online tests for practice

Up next

Download as PDF

Up next