CUET Humanities Exam  >  CUET Humanities Tests  >  Computer Science: CUET Mock Test - 2 - CUET Humanities MCQ

Computer Science: CUET Mock Test - 2 - CUET Humanities MCQ


Test Description

30 Questions MCQ Test - Computer Science: CUET Mock Test - 2

Computer Science: CUET Mock Test - 2 for CUET Humanities 2024 is part of CUET Humanities preparation. The Computer Science: CUET Mock Test - 2 questions and answers have been prepared according to the CUET Humanities exam syllabus.The Computer Science: CUET Mock Test - 2 MCQs are made for CUET Humanities 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Computer Science: CUET Mock Test - 2 below.
Solutions of Computer Science: CUET Mock Test - 2 questions in English are available as part of our course for CUET Humanities & Computer Science: CUET Mock Test - 2 solutions in Hindi for CUET Humanities course. Download more important topics, notes, lectures and mock test series for CUET Humanities Exam by signing up for free. Attempt Computer Science: CUET Mock Test - 2 | 40 questions in 45 minutes | Mock test for CUET Humanities preparation | Free important questions MCQ to study for CUET Humanities Exam | Download free PDF with solutions
Computer Science: CUET Mock Test - 2 - Question 1

Python is a/an ______based language.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 1

Python is an interpreted, object-oriented, high-level programming language with dynamic semantics.

Computer Science: CUET Mock Test - 2 - Question 2

What do we use to define a block of code in Python language?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 2

Python uses indentations to define blocks of code. Indentations are simply spaces or tabs used as an indicator that is part of the indent code child, as used in curly braces C, C++, and Java.

1 Crore+ students have signed up on EduRev. Have you? Download the App
Computer Science: CUET Mock Test - 2 - Question 3

Two statements are given below, one is Assertion (A) and the other is Reason (R). Read the statements carefully and choose the correct answer.
Assertion (A): Network security is essential to protect computer networks from unauthorised access, use, disclosure, disruption, modification or destruction.
Reason (R): Network security includes measures such as firewalls, encryption, and access control to prevent or detect unauthorised access to network resources.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 3

Network security is essential to protect computer networks from unauthorised access, use, disclosure, disruption, modification, or destruction. It includes measures such as firewalls, encryption, and access control to prevent or detect unauthorised access to network resources, ensuring the confidentiality, integrity, and availability of data and network resources. Hence, option 1 is the correct answer.

Computer Science: CUET Mock Test - 2 - Question 4

Referential integrity constraint in a relational database is specified with the help of a _________.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 4

A foreign key is a field (or collection of fields) in one table, that refers to the primary key in another table. The table with the foreign key is called the child table, and the table with the primary key is called the referenced or parent table.

Computer Science: CUET Mock Test - 2 - Question 5

Which among the following SQL commands does not fall under the category of data manipulation language?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 5

CREATE command is a data definition language command but not a data manipulation command. Data manipulation command is used to manipulate the data of those tables that are created by Data definition languages.

Computer Science: CUET Mock Test - 2 - Question 6

Which of the following networking components is called a three-layer switch?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 6

This networking component is called a three-layer switch. It can operate at the physical, data link and network layers. A layer 3 switch combines the functionality of a switch and a router. It acts as a switch to connect devices that are on the same subnet or virtual LAN at lightning speeds and has IP routing intelligence built into it to double up as a router.

Computer Science: CUET Mock Test - 2 - Question 7

Which of the following operators cannot be used with string data type?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 7

Operator ''/'' can not be used with string data type.

Computer Science: CUET Mock Test - 2 - Question 8

To read the next line of the file from a file object infile, we use _____.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 8

The readlines() method returns a list containing each line in the file as a list item. The hint parameter is used to limit the number of lines returned. If the total number of bytes returned exceeds the specified number, no more lines are returned.

Computer Science: CUET Mock Test - 2 - Question 9

Two statements are given below:
Statement I: Cloud Computing is essential for Internet of Things.
Statement II: Purpose of Internet of Things is to make everyday objects smarter and more connected.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 9

Cloud computing, artificial intelligence, and machine learning are all essential technologies for IoT. Cloud computing provides the necessary infrastructure to store and process the vast amounts of data generated by IoT devices. Artificial intelligence and machine learning enable IoT devices to learn from the data they collect and make more intelligent decisions. The purpose of IoT is to make everyday objects smarter and more connected, enabling them to communicate with each other and with humans to perform tasks more efficiently and effectively.

Computer Science: CUET Mock Test - 2 - Question 10

Directions: Match the contents under List I with those under List II.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 10
  • 'append()' adds an element to the end of the list.
  • 'clear()' removes all elements from the list.
  • 'extend()' extends the list by appending elements from an iterable.
  • 'reverse()' reverses the order of the elements in the list.
Computer Science: CUET Mock Test - 2 - Question 11

Which of the following statements is true?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 11

Pickle in Python is primarily used in serializing and deserializing of a Python object structure. In other words, it's the process of converting a Python object into a byte stream to store it in a file/database, maintain program state across sessions, or transport data over the network.

Computer Science: CUET Mock Test - 2 - Question 12

Insertions take place at the rear end of the queue and deletions take place at the 'front' end of the queues. On which principal does this work?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 12

In linear queue, an insertion takes place from one end while the deletion occurs from another end. The end at which the insertion takes place is known as the rear end, and the end at which the deletion takes place is known as the front end.

Computer Science: CUET Mock Test - 2 - Question 13

Two statements are given below, one is Assertion (A) and the other is Reason (R). Read the statements carefully and choose the correct answer.
Assertion (A): Infix notation is the most commonly used notation in mathematics.
Reason (R): Infix notation is easy to read and understand, and it is also the default notation used in most programming languages.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 13

Infix notation is the most commonly used notation in mathematics, but it is not necessarily because it is easy to read and understand. Infix notation is commonly used because it is the most intuitive notation for humans to use. On the other hand, while it is true that most programming languages use infix notation as their default notation, this is not the reason why infix notation is the most commonly used notation in mathematics.

Computer Science: CUET Mock Test - 2 - Question 14

Computers manipulate data in many ways, this manipulation is called _____.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 14

Processing is any computer program that is not a control program, such as an application program, or a non-controlling part of the operating system, such as a sort-merge program or language translator.

Computer Science: CUET Mock Test - 2 - Question 15

What are the two advantages of database management system?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 15

Data base security and integrity are two advantages of the data base management system. Central control also ensures that adapted checks are incorporated.

Computer Science: CUET Mock Test - 2 - Question 16

Which method is used to protect online images from hackers?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 16

A firewall is an essential piece of security software that monitors all incoming and outgoing traffic going through your network, checking for hackers, malware, unauthorized outgoing information, or anything that might put you or your PC at risk. Firewalls are often the first line of defense when protecting your data.

Computer Science: CUET Mock Test - 2 - Question 17

______ switching is well suited for voice communication while _________switching is better suited for data and other non-voice communication.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 17

In-circuit switching when the source does not have enough data to transmit, the resources are unnecessarily kept idle. To avoid such situation, Message switching is used.
Circuit Switching is a switching technique method that establishes a dedicated path between the sender and the receiver to send the data. The example of a Circuit-switch network is a telephone network.

Computer Science: CUET Mock Test - 2 - Question 18

Consider a declaration, L = (1, 'Python', '3.14').
Which of the following represents the data type of L?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 18

A tuple is almost like a List and contains python objects and objects inside are separated by comma (,) and enclosed within parentheses.
Example:
list1 = (6.25, 'brinjal', 'onion', 'beans')
list1 is a tuple.

Computer Science: CUET Mock Test - 2 - Question 19

Which of the following file modes is not valid?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 19

File mode r+, w+, or a+ may be to perform both read and write operations using a single file object.

Computer Science: CUET Mock Test - 2 - Question 20

Two statements are given below, one is Assertion (A) and the other is Reason (R). Read the statements carefully and choose the correct answer.
Assertion (A): SQL is a programming language.
Reason (R): SQL supports procedural programming constructs such as loops and conditional statements.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 20

Although SQL does support procedural programming constructs such as loops and conditional statements, yet it is not considered a programming language in traditional sense. SQL is a declarative language, meaning that the user specifies what he wants the database to do, and the database management system takes care of the how. Therefore, SQL has some programming-like features, but it is not generally considered a programming language.
Hence, option 2 is the correct answer.

Computer Science: CUET Mock Test - 2 - Question 21

Two statements are given below:
Statement I: An exception is an error that occurs during the execution of a Python program.
Statement II: Exceptions can be handled in Python using the try-catch statement.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 21

An exception is an error that occurs during the execution of a Python program. When an exception occurs, the program stops executing, and an error message is printed to the console. Exceptions can be handled in Python using the try-except statement.

Computer Science: CUET Mock Test - 2 - Question 22

A relational database, which is in 3NF, may have undesirable data redundancy because there may exist

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 22

A relation is in third normal form, if there is no transitive dependency for non-prime attributes as well as it is in Second Normal Form.
A relation is in 3NF if at least one of the following conditions holds in every non-trivial function dependency X –> Y:

  • X is a super key.
  • Y is a prime attribute (each element of Y is a part of some candidate key).

In other words, a relation that is in First and Second Normal Form and in which no non-primary-key attribute is transitively dependent on the primary key, then it is in Third Normal Form (3NF).

Computer Science: CUET Mock Test - 2 - Question 23

____ constraints apply only to individual column.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 23

Table constraints allow you to specify more than one column in a PRIMARY KEY, UNIQUE, CHECK, or FOREIGN KEY constraint definition. Column-level constraints (except for check constraints) refer to only one column.

Computer Science: CUET Mock Test - 2 - Question 24

Directions: Match the contents under List I with those under List II.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 24
  • queue.append(item) adds an item to the rear of the queue.
  • queue.pop(0) removes and returns the item from the front of the queue.
  • queue[0] returns the item at the front of the queue without removing it.
  • len(queue) returns the number of items currently in the queue.
Computer Science: CUET Mock Test - 2 - Question 25

We know that RJ-45 is an eight-wire connector that connects a computer to LAN, especially Ethernets. Here, what is the expansion of RJ?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 25

The eight-pin RJ45 connector is a standardised interface which often connects a computer to a local area network (LAN). This type of connector was originally developed for telephone communications but is now used in a range of applications. The abbreviation, RJ45, stands for Registered Jack-45.

Computer Science: CUET Mock Test - 2 - Question 26

Two statements are given below:
Statement I: Enqueue: adds an element to the rear of the queue.
Statement II: Peek: retrieves the element at the front of the queue without removing it.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 26

A queue data structure supports the Enqueue, Dequeue, and Peek operations. The Enqueue operation adds an element to the rear of the queue, the Dequeue operation removes an element from the front of the queue, and the Peek operation retrieves the element at the front of the queue without removing it.

Computer Science: CUET Mock Test - 2 - Question 27

Directions: Match the contents under List I with those under List II.

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 27

Below are the Python Data Structure:
List is an ordered collection of elements, mutable.
Tuple is an unordered collection of unique elements, immutable.
Set is an unordered collection of elements, mutable.
Dictionary is a collection of key-value pairs, mutable.

Computer Science: CUET Mock Test - 2 - Question 28

A basic approach to share large amount of data among different organizations is through:

Computer Science: CUET Mock Test - 2 - Question 29

Study the following program:
x = 1
while true:
if x % 5 = = 0:
break print(x) x + = 1
What will be the output of this code?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 29

Syntax error, there should not be a space between + and =.

Computer Science: CUET Mock Test - 2 - Question 30

Which of the following statements is incorrect in the context of binary files?

Detailed Solution for Computer Science: CUET Mock Test - 2 - Question 30

Every line ends with a new line character is incorrect in the context of Binary files.

View more questions
Information about Computer Science: CUET Mock Test - 2 Page
In this test you can find the Exam questions for Computer Science: CUET Mock Test - 2 solved & explained in the simplest way possible. Besides giving Questions and answers for Computer Science: CUET Mock Test - 2, EduRev gives you an ample number of Online tests for practice

Top Courses for CUET Humanities

Download as PDF

Top Courses for CUET Humanities