>
CUET (UG)
>
Computer Science
List of top Computer Science Questions asked in CUET (UG)
Which data structure follows the Last-In-First-Out (LIFO) principle?
CUET (UG) - 2025
CUET (UG)
Computer Science
Data Structures
What is the primary function of an operating system?
CUET (UG) - 2025
CUET (UG)
Computer Science
Operating Systems
What is the time complexity of a binary search algorithm on a sorted array?
CUET (UG) - 2025
CUET (UG)
Computer Science
Data Structures
Which of the following is a high-level programming language?
CUET (UG) - 2025
CUET (UG)
Computer Science
Programming Languages
What is the significance of the ‘NP-complete’ class in computational complexity?
CUET (UG) - 2025
CUET (UG)
Computer Science
Computational Complexity
Which of the following is NOT a principle of Object-Oriented Programming?
CUET (UG) - 2025
CUET (UG)
Computer Science
OOPs concept
What is a ‘race condition’ in concurrent programming?
CUET (UG) - 2025
CUET (UG)
Computer Science
Programming Languages
What is the purpose of a firewall in network security?
CUET (UG) - 2025
CUET (UG)
Computer Science
Computer Networks
In the context of graph algorithms, what is the significance of Dijkstra’s algorithm?
CUET (UG) - 2025
CUET (UG)
Computer Science
Data Structures
In a binary tree, what is the maximum number of nodes at level k?
CUET (UG) - 2025
CUET (UG)
Computer Science
Data Structures
Which sorting algorithm has the best average-case time complexity?
CUET (UG) - 2025
CUET (UG)
Computer Science
Data Structures
What is the purpose of the ‘virtual memory’ in an operating system?
CUET (UG) - 2025
CUET (UG)
Computer Science
Operating Systems
Which of the following is a characteristic of a relational database?
CUET (UG) - 2025
CUET (UG)
Computer Science
Database Management Systems
What is the significance of the ‘halting problem’ in computability theory?
CUET (UG) - 2025
CUET (UG)
Computer Science
Computational Complexity
Which protocol is used for secure communication over the internet?
CUET (UG) - 2025
CUET (UG)
Computer Science
Computer Networks
Which of the following is NOT a type of database model?
CUET (UG) - 2025
CUET (UG)
Computer Science
Database Management Systems
In object-oriented programming, what is encapsulation?
CUET (UG) - 2025
CUET (UG)
Computer Science
OOPs concept
What does SQL stand for in the context of databases?
CUET (UG) - 2025
CUET (UG)
Computer Science
Database Management Systems
What will be the position of front and rear after execution of the following statements, the Queue already had the given elements in FIFO order:
\(F→50 → 90 → 7 → 21 → 73 → 77→R\)
dequeue()
dequeue()
dequeue()
dequeue()
dequeue()
enqueue(100)
dequeue()
CUET (UG) - 2024
CUET (UG)
Computer Science
Introduction to Queue (FIFO)
Amit wants to be familiar with SQL. One of his friends Anand suggests him to execute the following SQL commands:
(A) Create Table Student
(B) Use Database DB
(C) Select * from Student
(D) Insert into Student
In which order Amit needs to run the above commands?
CUET (UG) - 2024
CUET (UG)
Computer Science
SQL
In a ________ topology, if there are n devices in a network, each device has n-1 ports for cables.
CUET (UG) - 2024
CUET (UG)
Computer Science
Computer Networks
140.168.220.200 is a 32-bit binary number represented as four decimal values, each 8 bits, in the range 0 to 255 separated by decimal points. What is this number called?
CUET (UG) - 2024
CUET (UG)
Computer Science
Computer Networks
Match List-I with List-II:
List-I (Device)
List-II (Use)
(A) RJ45 Connector
(I) relay frames between two originally separate segments that follow same protocols.
(B) Bridge
(II) amplifies a signal that is transmitted across the network so that the signal is received same as it is sent.
(C) Gateway
(III) establishes an intelligent connection between a local area network and external networks with completely different structures.
(D) Repeater
(IV) plug-in device primarily used for connecting LANs particularly Ethernet.
CUET (UG) - 2024
CUET (UG)
Computer Science
Computer Networks
Which of the following statement(s) is/are TRUE in respect of Media Access Control (MAC) Address?
Options:
(A) It can be changed if a node is removed from one network and connected to another network.
(B) Each MAC address is a 12-digit hexadecimal number.
(C) It is a unique value associated with a network adapter called NIC.
(D) It is provided by the Internet Service Provider to locate computers connected to the internet.
Choose the correct answer from the options given below:
CUET (UG) - 2024
CUET (UG)
Computer Science
Computer Networks
Which SQL expression calculates the square root of 16?
CUET (UG) - 2024
CUET (UG)
Computer Science
SQL
Prev
1
2
3
...
12
Next