>
Computer Science
List of top Computer Science Questions
Match List I with List II
LIST I
LIST II
A. DataFrame.std()
IV. Standard Deviation
B. DataFrame.describe()
III. Descriptive statistical values
C. DataFrame.var()
I. Variance
D. DataFrame.mode()
II. Value that appears most
CUET (UG) - 2023
CUET (UG)
Computer Science
Data Handling using Pandas
Single row or scalar functions are applied on a single value and return a single value.
Which of the following is NOT a Date Function?
CUET (UG) - 2023
CUET (UG)
Computer Science
SQL Functions
Anyone who uses digital technology along with internet is known as:
(1) Responsible citizen
(2) Netizen
(3) Good citizen
(4) Digital citizen
Choose the correct answer from the options given below:
CUET (UG) - 2023
CUET (UG)
Computer Science
Digital Literacy
Match List I with List II
LIST I
LIST II
A. Doxing operations
IV. Cyber bullying
B. FOSS
III. It grants a user substantial rights and freedom
C. WORM
II. It is a program which copies itself across a network
D. TROJAN HORSE
I. It is a program which is intended to carry out malicious operations
CUET (UG) - 2023
CUET (UG)
Computer Science
Cybersecurity
Digital footprints are trail of data reflecting the activities per formed by us online. The two types of digital footprints are:
(1) Tech
(2) Smart
(3) Passive
(4) Active
Choose the correct answer from the options given below:
CUET (UG) - 2023
CUET (UG)
Computer Science
Digital Footprints
Creative creations of mind such as patents, trademark, and copyright are called:
CUET (UG) - 2023
CUET (UG)
Computer Science
Intellectual Property Rights and Indian Patent Act 1970
........ and .......... are popular free and open source software tools.
CUET (UG) - 2023
CUET (UG)
Computer Science
Free and Open-Source Software (FOSS)
Unsolicited commercial email is known as:
CUET (UG) - 2023
CUET (UG)
Computer Science
Cybersecurity
Match List I with List II
LIST I
LIST II
A. Slammer
IV. Virus
B. Microwave
II. Uni directional
C. Radio wave
I. Omni directional
D. White hats
III. Ethical hacker
CUET (UG) - 2023
CUET (UG)
Computer Science
Cybersecurity
Which of the following statements is used to create a histogram of 'step' type with 20 bins?
CUET (UG) - 2023
CUET (UG)
Computer Science
Histogram Plotting
Which of the following is not a web browser?
CUET (UG) - 2023
CUET (UG)
Computer Science
Web browsers
Cancer patient analysis in the Mumbai region is to be plotted. The command used to give title to X-axis as "No. of patients" in the graph is:
CUET (UG) - 2023
CUET (UG)
Computer Science
Axis Labeling
The scatter() function
CUET (UG) - 2023
CUET (UG)
Computer Science
Data Visualization
Which of the following plots makes it easy to compare two or more distributions on the same set of axes?
CUET (UG) - 2023
CUET (UG)
Computer Science
Data Visualization
Which of the following is not an aggregate function that can be applied to a DataFrame?
CUET (UG) - 2023
CUET (UG)
Computer Science
Aggregate Functions
Which of the following denotes a missing value in a DataFrame?
CUET (UG) - 2023
CUET (UG)
Computer Science
Handling Missing Data
Which of the following is not a Descriptive Statistical method that can be applied to a DataFrame?
CUET (UG) - 2023
CUET (UG)
Computer Science
Data Handling
Which one in the following options is not a constraint ?
CUET (UG) - 2023
CUET (UG)
Computer Science
Database Constraints
Which SQL function will return the following output:
mysql> Select __?__ (53, 10);
output __3
CUET (UG) - 2023
CUET (UG)
Computer Science
SQL Functions
Match List I with List II
LIST I
LIST II
A. SELECT LOWER('COMPUTER');
IV. 'computer'
B. SELECT LEFT('COMPUTER', 3);
I. 'COM'
C. SELECT RIGHT('COMPUTER', 4);
II. 'UTER'
D. SELECT MID('COMPUTER', 2, 3);
III. 'OMP'
CUET (UG) - 2023
CUET (UG)
Computer Science
SQL Functions
Match List I with List II
LIST I
LIST II
A. RDBMS
III. Store data in related table
B. Primary Key
I. Unique identification of tuples
C. Tuple is collection of
II. Attribute Value
D. Database Schema and Constraints
IV. Database catalog
CUET (UG) - 2023
CUET (UG)
Computer Science
Database Concepts
............. sorts a given list of elements by repeatedly comparing the adjacent elements and swapping them if they are unordered.
CUET (UG) - 2023
CUET (UG)
Computer Science
Sorting Algorithms
Match List I with List II
LIST I
LIST II
C. Deletion operation
IV. Dequeue
A. Insertion in a queue at
I. FRONT
B. Deletion in a queue at
III. REAR
D. Insertion operation
II. Enqueue
CUET (UG) - 2023
CUET (UG)
Computer Science
Queues
In search by hashing, we have size of the hash table and the size of list, then:
CUET (UG) - 2023
CUET (UG)
Computer Science
Hashing
This exception occurs whenever a local or global variable name is not defined.
CUET (UG) - 2023
CUET (UG)
Computer Science
Python Errors
Prev
1
...
6
7
8
9
10
...
15
Next