CUET Humanities Exam  >  CUET Humanities Tests  >  Computer Science Practice Tests: CUET Preparation  >  Computer Science: CUET Mock Test - 5 - CUET Humanities MCQ

Computer Science: CUET Mock Test - 5 - CUET Humanities MCQ


Test Description

30 Questions MCQ Test Computer Science Practice Tests: CUET Preparation - Computer Science: CUET Mock Test - 5

Computer Science: CUET Mock Test - 5 for CUET Humanities 2024 is part of Computer Science Practice Tests: CUET Preparation preparation. The Computer Science: CUET Mock Test - 5 questions and answers have been prepared according to the CUET Humanities exam syllabus.The Computer Science: CUET Mock Test - 5 MCQs are made for CUET Humanities 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Computer Science: CUET Mock Test - 5 below.
Solutions of Computer Science: CUET Mock Test - 5 questions in English are available as part of our Computer Science Practice Tests: CUET Preparation for CUET Humanities & Computer Science: CUET Mock Test - 5 solutions in Hindi for Computer Science Practice Tests: CUET Preparation course. Download more important topics, notes, lectures and mock test series for CUET Humanities Exam by signing up for free. Attempt Computer Science: CUET Mock Test - 5 | 40 questions in 45 minutes | Mock test for CUET Humanities preparation | Free important questions MCQ to study Computer Science Practice Tests: CUET Preparation for CUET Humanities Exam | Download free PDF with solutions
Computer Science: CUET Mock Test - 5 - Question 1

Which of the following words cannot be a variable in python language?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 1

A Python variable is a reserved memory location to store values. In other words, a variable in a python program gives data to the computer for processing. Variables cannot, however, be named the same as keywords (as in case with "try" which is a python variable). Variables cannot contain any special character except "_". They cannot start with numbers and can only contain alphabets, numbers, and underscore (_)

Computer Science: CUET Mock Test - 5 - Question 2

Two statements are given below:
Statement I: A ring topology is a type of network topology in which all devices are connected to a single cable.
Statement II: A bus topology is a type of network topology in which all devices are connected to a central hub or switch.

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 2

A bus topology is a type of network topology in which all devices are connected to a single cable called a bus, not in ring topology. A star topology is a type of network topology in which all devices are connected to a central hub or switch not in a bus topology. Both are not correct.

1 Crore+ students have signed up on EduRev. Have you? Download the App
Computer Science: CUET Mock Test - 5 - Question 3

How many types of DML are there?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 3

Data manipulation languages are divided into two types, procedural programming and declarative programming.

Computer Science: CUET Mock Test - 5 - Question 4

Identify 'Y', where 'Y' is a computer network comprised by the interconnection of two or more LANs within a limited area.

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 4

In MAN, different LANs are connected through a local telephone exchange. Some of the widely used protocols for MAN are RS-232, X.25, Frame Relay, Asynchronous Transfer Mode (ATM), ISDN (Integrated Services Digital Network), OC·3 lines (1.55 Mbps), ADSL (Asymmetrical Digital Subscriber Line). These protocols are quite different from those used for LANs.

Computer Science: CUET Mock Test - 5 - Question 5

What is the purpose of the rewind() function?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 5

The rewind() function sets the file position to the beginning of the file for the stream pointed to by stream. It also clears the error and end-of-file indicators for stream.

Computer Science: CUET Mock Test - 5 - Question 6

Directions: Match the contents under List I with those under List II.

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 6

Client-server architecture is an architecture in which devices are connected to a central server, which provides services to clients. Clients request services from the server, which then provides a response.
Peer-to-peer architecture is an architecture in which devices communicate directly with each other without a central server. Each device can act as both a client and a server.
Service-oriented architecture (SOA) is an architecture in which services are exposed as independent components that can be accessed over a network. Services can be combined to create more complex applications.
Cloud architecture is an architecture in which resources are provisioned dynamically and accessed over a network. It allows users to access resources such as storage and computing power on-demand.

Computer Science: CUET Mock Test - 5 - Question 7

What will the following statement do?
FILE *fp1;
Char Tch;
fp1=fopen("TCY.c","r");
while((Tch=getc(fp1)) != EOF)
printf("%c",Tch);

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 7

In this program, getc() function within the while loop will read the characters from TCY.c one by one and display on the screen through the variable Tch.

Computer Science: CUET Mock Test - 5 - Question 8

This method returns an integer that specifies the current position of the file object.

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 8

The tell() method can be used to get the position of File Handle. It returns the current position of the file object. This method takes no parameters and returns an integer value.

Computer Science: CUET Mock Test - 5 - Question 9

The append() method appends an element

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 9

The append() method adds an item to the end of the list.

Computer Science: CUET Mock Test - 5 - Question 10

What is the output of the following program:
print((1, 2) + (3, 4))

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 10

The following program, print((1,2) + (3,4)) gives:
For the given program, we have two tuples, and we are printing the concatenation of these tuples.
i.e print((1, 2) + (3, 4))
A collection of Python objects separated by comma is called a Tuple.
In this, we are using the concatenation operator +, to join the two tuples.
So, (1,2,3,4) is the answer.

Computer Science: CUET Mock Test - 5 - Question 11

Which of the following is an application of stack?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 11

Following is the various Applications of Stack in Data Structure:

  • Evaluation of Arithmetic Expressions
  • Backtracking
  • Delimiter Checking
  • Reverse a Data
  • Processing Function Calls
Computer Science: CUET Mock Test - 5 - Question 12

_____ requires user to specify what data is needed without specifying how to get it.

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 12

Non-Procedural DML or High level DML requires a user to specify what data are needed without specifying how to get those data.

Computer Science: CUET Mock Test - 5 - Question 13

___ command helps to add new data to the database.

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 13

Insert is a widely-used command in the Structured Query Language (SQL) data manipulation language (DML) used by SQL Server and Oracle relational databases. The insert command is used for inserting one or more rows into a database table with specified table column values.

Computer Science: CUET Mock Test - 5 - Question 14

Which of the following best describes a white hat hacker?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 14

White hat hackers are security professionals who follow ethical and legal behavior. Their objective is to help improve security.

Computer Science: CUET Mock Test - 5 - Question 15

Communication bandwidth that has the highest capacity and is used by microwave, cable and fibre optic lines is known as

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 15

Communication bandwidth that has the highest capacity and is used by microwave, cable and fibre optic lines is known as broadband.

Computer Science: CUET Mock Test - 5 - Question 16

What is the correct syntax of open() function?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 16

Open() function correct syntax with the parameter details is as shown below:
file object = open(file_name [, access_mode][, buffering])
Here are the parameters details:
file_name: The file_name argument is a string value that contains the name of the file that you want to access.
access_mode: The access_mode determines the mode in which the file has to be opened.
buffering: If the buffering value is set to 0, no buffering will take place. If the buffering value is 1, line buffering will be performed while accessing a file.

Computer Science: CUET Mock Test - 5 - Question 17

Directions: Match the contents under List I with those under List II.

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 17

These are the basic operations of Stack Data Structure:

  • Push operation adds a new element to the top of the stack.
  • Pop operation removes the top element from the stack and returns it.
  • Peek operation returns the top element of the stack without removing it.
  • Size operation returns the number of elements currently in the stack.
Computer Science: CUET Mock Test - 5 - Question 18

Which of the following functions is used to read data in a binary file?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 18

In pickle module, the load() function is used to read data from a binary file or file object.

Computer Science: CUET Mock Test - 5 - Question 19

Which of the following networks is suited for transferring songs from one mobile to another mobile?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 19

A personal area network (PAN) is a computer network used for data transmission among devices such as computers, telephones, tablets and personal digital assistants. PAN can be wireless as well as wired. The best example of wireless PAN is bluetooth, which is generally used to transfer songs from one mobile phone to another.

Computer Science: CUET Mock Test - 5 - Question 20

Which of the following is one of the two built-in functions to read a line of text from standard input, which are on the keyboard by default?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 20

Python provides two built-in functions to read a line of text from standard input, which by default come from the keyboard. These functions are: raw_input and input.

Computer Science: CUET Mock Test - 5 - Question 21

Which of the following precedence orders is correct in Python?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 21

Just remember: PEMDAS, that is, Parenthesis, Exponentiation, Multiplication, Division, Addition, Subtraction. Note that the precedence order of Division and Multiplication is the same.

Computer Science: CUET Mock Test - 5 - Question 22

Which of the following is not an SQL commands category?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 22

Types of SQL Commands:

  • DDL (Data Definition Language)
  • DML (Data Manipulation Language)
  • DQL (Data Query Language)
  • DCL (Data Control Language)
  • Data administration commands
  • Transaction control commands
Computer Science: CUET Mock Test - 5 - Question 23

What will be the output of the following python code?
x=['ab', 'cd']
for i in x:
x.append(i.upper())
print(x)

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 23

The loop does not terminate as new elements are being added to the list in each iteration.

Computer Science: CUET Mock Test - 5 - Question 24

Two statements are given below, one is Assertion (A) and the other is Reason (R). Read the statements carefully and choose the correct answer.
Assertion (A): Queue is a data structure that follows the First-In-First-Out (FIFO) principle.
Reason (R): The last item added to the queue is the first item to be removed from the queue.

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 24

A queue is a data structure that follows the First-In-First-Out (FIFO) principle. It means the first item added to the queue is the first item to be removed from the queue.

Computer Science: CUET Mock Test - 5 - Question 25

Which set of functions can be used to read or write a file randomly?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 25

To access only a particular part of a file, functions such as fseek(), rewind(), and ftell() can be used.

Computer Science: CUET Mock Test - 5 - Question 26

Ram opened a file in a certain mode. After opening the file, he forgot the mode. The interesting facts about that mode are " If the file doesn't exist, then a new file will be created" and "After opening file in that mode, the file handle will be at the end of the file". Help him identify the correct mode.

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 26

The append mode defines the way in which new data is added to the already existing data. The property can be used with both, import and export operations. During import, new table is created in the target database.

Computer Science: CUET Mock Test - 5 - Question 27

When we open an internet site, we see 'www'. What does 'www' stand for?

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 27

The World Wide Web—commonly referred to as www, W3, or the web—is an interconnected system of public web pages accessible through the internet.

Computer Science: CUET Mock Test - 5 - Question 28

Secure transfer of data over an unsecured network such as internet can be done using

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 28

Cryptography is the study and practice of techniques for secure communication in the presence of third parties called adversaries. It deals with developing and analyzing protocols which prevents malicious third parties from retrieving information being shared between two entities thereby following the various aspects of information security.

Computer Science: CUET Mock Test - 5 - Question 29

The reverse() method reverses:

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 29

The reverse() method reverses the order of the elements in an array. The reverse() method overwrites the original array.

Computer Science: CUET Mock Test - 5 - Question 30

Consider the usual algorithm for determining whether a sequence of parentheses is balanced. The maximum number of parentheses that appear on the stack AT ANY ONE TIME when the algorithm analyzes: (()(())(()))is:

Detailed Solution for Computer Science: CUET Mock Test - 5 - Question 30

A right parenthesis makes pop operation to delete the elements in stack till we get left parenthesis as top most element. 3 elements are there in stack before right parentheses comes. Therefore, maximum number of elements in stack at run time is 3.

View more questions
28 tests
Information about Computer Science: CUET Mock Test - 5 Page
In this test you can find the Exam questions for Computer Science: CUET Mock Test - 5 solved & explained in the simplest way possible. Besides giving Questions and answers for Computer Science: CUET Mock Test - 5, EduRev gives you an ample number of Online tests for practice

Top Courses for CUET Humanities

Download as PDF

Top Courses for CUET Humanities