>
CUET (UG)
List of top Questions asked in CUET (UG)
Match List I with List II
LIST I
LIST II
A. DataFrame.std()
IV. Standard Deviation
B. DataFrame.describe()
III. Descriptive statistical values
C. DataFrame.var()
I. Variance
D. DataFrame.mode()
II. Value that appears most
CUET (UG) - 2023
CUET (UG)
Computer Science
Data Handling using Pandas
The process of secret capture and analysis of network traffic by malicious users is called:
CUET (UG) - 2023
CUET (UG)
Computer Science
Network Security
Match List I with List II
LIST I
LIST II
A. Mesh topology
III. Each node is connected to two other devices, one each on either side
B. Ring topology
IV. Each communicating device is connected with every other device
C. Bus topology
I. Single backbone wire shared among the nodes
D. Star topology
II. Each communicating device is connected to a central networking device
CUET (UG) - 2023
CUET (UG)
Computer Science
Networking Topologies
The way a dataset is arranged into rows and columns is referred to as the shape of data. Following function is used to reshape and create a new DataFrame from the original one:
CUET (UG) - 2023
CUET (UG)
Computer Science
Pandas
Anyone who uses digital technology along with internet is known as:
(1) Responsible citizen
(2) Netizen
(3) Good citizen
(4) Digital citizen
Choose the correct answer from the options given below:
CUET (UG) - 2023
CUET (UG)
Computer Science
Digital Literacy
Digital footprints are trail of data reflecting the activities per formed by us online. The two types of digital footprints are:
(1) Tech
(2) Smart
(3) Passive
(4) Active
Choose the correct answer from the options given below:
CUET (UG) - 2023
CUET (UG)
Computer Science
Digital Footprints
........ and .......... are popular free and open source software tools.
CUET (UG) - 2023
CUET (UG)
Computer Science
Free and Open-Source Software (FOSS)
Unsolicited commercial email is known as:
CUET (UG) - 2023
CUET (UG)
Computer Science
Cybersecurity
Match List I with List II
LIST I
LIST II
A. Doxing operations
IV. Cyber bullying
B. FOSS
III. It grants a user substantial rights and freedom
C. WORM
II. It is a program which copies itself across a network
D. TROJAN HORSE
I. It is a program which is intended to carry out malicious operations
CUET (UG) - 2023
CUET (UG)
Computer Science
Cybersecurity
Creative creations of mind such as patents, trademark, and copyright are called:
CUET (UG) - 2023
CUET (UG)
Computer Science
Intellectual Property Rights and Indian Patent Act 1970
The scatter() function
CUET (UG) - 2023
CUET (UG)
Computer Science
Data Visualization
Which of the following plots makes it easy to compare two or more distributions on the same set of axes?
CUET (UG) - 2023
CUET (UG)
Computer Science
Data Visualization
Which of the following statements is used to create a histogram of 'step' type with 20 bins?
CUET (UG) - 2023
CUET (UG)
Computer Science
Histogram Plotting
Cancer patient analysis in the Mumbai region is to be plotted. The command used to give title to X-axis as "No. of patients" in the graph is:
CUET (UG) - 2023
CUET (UG)
Computer Science
Axis Labeling
Which of the following is not a web browser?
CUET (UG) - 2023
CUET (UG)
Computer Science
Web browsers
Match List I with List II
LIST I
LIST II
A. Slammer
IV. Virus
B. Microwave
II. Uni directional
C. Radio wave
I. Omni directional
D. White hats
III. Ethical hacker
CUET (UG) - 2023
CUET (UG)
Computer Science
Cybersecurity
Match List I with List II
LIST I
LIST II
A. RDBMS
III. Store data in related table
B. Primary Key
I. Unique identification of tuples
C. Tuple is collection of
II. Attribute Value
D. Database Schema and Constraints
IV. Database catalog
CUET (UG) - 2023
CUET (UG)
Computer Science
Database Concepts
Match List I with List II
LIST I
LIST II
A. SELECT LOWER('COMPUTER');
IV. 'computer'
B. SELECT LEFT('COMPUTER', 3);
I. 'COM'
C. SELECT RIGHT('COMPUTER', 4);
II. 'UTER'
D. SELECT MID('COMPUTER', 2, 3);
III. 'OMP'
CUET (UG) - 2023
CUET (UG)
Computer Science
SQL Functions
Which one in the following options is not a constraint ?
CUET (UG) - 2023
CUET (UG)
Computer Science
Database Constraints
Which SQL function will return the following output:
mysql> Select __?__ (53, 10);
output __3
CUET (UG) - 2023
CUET (UG)
Computer Science
SQL Functions
Which of the following is not a Descriptive Statistical method that can be applied to a DataFrame?
CUET (UG) - 2023
CUET (UG)
Computer Science
Data Handling
Which of the following is not an aggregate function that can be applied to a DataFrame?
CUET (UG) - 2023
CUET (UG)
Computer Science
Aggregate Functions
Which of the following denotes a missing value in a DataFrame?
CUET (UG) - 2023
CUET (UG)
Computer Science
Handling Missing Data
This exception occurs whenever a local or global variable name is not defined.
CUET (UG) - 2023
CUET (UG)
Computer Science
Python Errors
Match List I with List II
LIST I
LIST II
C. Deletion operation
IV. Dequeue
A. Insertion in a queue at
I. FRONT
B. Deletion in a queue at
III. REAR
D. Insertion operation
II. Enqueue
CUET (UG) - 2023
CUET (UG)
Computer Science
Queues
Prev
1
...
192
193
194
195
196
...
419
Next