>
CUET (UG)
>
Computer Science
List of top Computer Science Questions asked in CUET (UG)
Given a scenario: Suppose there is a web-server hosting a website to declare results. This server can handle a maximum of 100 concurrent requests to view results. So, as to serve thousands of user requests, a __________ would be the most appropriate data structure to use.
CUET (UG) - 2025
CUET (UG)
Computer Science
Data Structures
Identify the correct place where we have to use repeaters.
CUET (UG) - 2025
CUET (UG)
Computer Science
Computer Networks
Identify the
incorrect
statement in the context of measures of variability:
CUET (UG) - 2025
CUET (UG)
Computer Science
Statistics
Match
List-I
with
List-II
.
List-I
List-II
(A) ROUTER
(II) Network Device
(B) ETHERNET CARD
(IV) Network Interface Card
(C) RING
(I) Network Topology
(D) PAN
(III) Network Type
CUET (UG) - 2025
CUET (UG)
Computer Science
Computer Networks
Identify the wired transmission media for the following: “They are less expensive and commonly used in telephone lines and LANs. These cables are of two types: Unshielded and shielded.”
CUET (UG) - 2025
CUET (UG)
Computer Science
Data Transmission
Given data: Weight of 20 students in kgs = [35, 35, 40, 40, 40, 50, 50, 50, 50, 50, 60, 65, 65, 70, 70, 72, 75, 75, 78, 78] Find the mode.
CUET (UG) - 2025
CUET (UG)
Computer Science
Statistics
Arrange the following in order related to bubble sort for a list of elements: Initial list: \[4, -9, 12, 30, 2, 6\] (A) \[4, -9, 12, 30, 2, 6\]
(B) \[-9, 4, 12, 30, 2, 6\]
(C) \[-9, 4, 12, 2, 30, 6\]
(D) \[-9, 4, 12, 2, 6, 30\]
CUET (UG) - 2025
CUET (UG)
Computer Science
Sorting Algorithms
In binary search, after every pass of the algorithm, the search area:
CUET (UG) - 2025
CUET (UG)
Computer Science
Sorting Algorithms
Match
List-I
with
List-II
.
List-I
List-II
(A) Primary key
(III) Attribute used to uniquely identify a tuple.
(B) Degree
(I) Total number of attributes in a table.
(C) Foreign key
(II) Attribute used to relate two tables.
(D) Constraint
(IV) A restriction on the type of data that can be inserted in a column.
CUET (UG) - 2025
CUET (UG)
Computer Science
DBMS
In SQL table, the set of values which a column can take in each row is called __________.
CUET (UG) - 2025
CUET (UG)
Computer Science
DBMS
What is the time complexity of a binary search algorithm on a sorted array?
CUET (UG) - 2025
CUET (UG)
Computer Science
Data Structures
Which data structure follows the Last-In-First-Out (LIFO) principle?
CUET (UG) - 2025
CUET (UG)
Computer Science
Data Structures
What is the primary function of an operating system?
CUET (UG) - 2025
CUET (UG)
Computer Science
Operating Systems
Which of the following is a high-level programming language?
CUET (UG) - 2025
CUET (UG)
Computer Science
Programming Languages
What is the significance of the ‘NP-complete’ class in computational complexity?
CUET (UG) - 2025
CUET (UG)
Computer Science
Computational Complexity
What is the purpose of a firewall in network security?
CUET (UG) - 2025
CUET (UG)
Computer Science
Computer Networks
In the context of graph algorithms, what is the significance of Dijkstra’s algorithm?
CUET (UG) - 2025
CUET (UG)
Computer Science
Data Structures
Which of the following is NOT a principle of Object-Oriented Programming?
CUET (UG) - 2025
CUET (UG)
Computer Science
OOPs concept
What is a ‘race condition’ in concurrent programming?
CUET (UG) - 2025
CUET (UG)
Computer Science
Programming Languages
Which sorting algorithm has the best average-case time complexity?
CUET (UG) - 2025
CUET (UG)
Computer Science
Data Structures
What is the purpose of the ‘virtual memory’ in an operating system?
CUET (UG) - 2025
CUET (UG)
Computer Science
Operating Systems
Which of the following is a characteristic of a relational database?
CUET (UG) - 2025
CUET (UG)
Computer Science
Database Management Systems
In a binary tree, what is the maximum number of nodes at level k?
CUET (UG) - 2025
CUET (UG)
Computer Science
Data Structures
What does SQL stand for in the context of databases?
CUET (UG) - 2025
CUET (UG)
Computer Science
Database Management Systems
Which protocol is used for secure communication over the internet?
CUET (UG) - 2025
CUET (UG)
Computer Science
Computer Networks
Prev
1
2
3
4
5
6
...
15
Next