Aspire's Library

A Place for Latest Exam wise Questions, Videos, Previous Year Papers,
Study Stuff for MCA Examinations

CUET UG Computer Science Information Practices Previous Year Questions (PYQs)

CUET UG Computer Science Information Practices Computer PYQ


CUET UG Computer Science Information Practices PYQ
Considering the given statement in Python: Print("Hello world") 
What type of error will be generated?





Go to Discussion

CUET UG Computer Science Information Practices CUET UG PYQ CUET UG Computer Science Information Practices COMPUTER SCIENCE INFORMATICS PRACTICES 2022 PYQ

Solution

In Python, function names are case-sensitive. The correct function is print(), not Print().
When you write Print("Hello world"), Python tries to find a variable or function named Print, which doesn’t exist — hence it raises a NameError.

Example Output:

NameError: name 'Print' is not defined

✔️ Key Point:
Always remember that Python is case-sensitive, so print() must be written in all lowercase.


CUET UG Computer Science Information Practices PYQ
The British scientist who invented the World Wide Web in 1990 is _____





Go to Discussion

CUET UG Computer Science Information Practices CUET UG PYQ CUET UG Computer Science Information Practices COMPUTER SCIENCE INFORMATICS PRACTICES 2022 PYQ

Solution

Sir Tim Berners-Lee, a British computer scientist, invented the World Wide Web (WWW) in 1990 while working at CERN (European Organization for Nuclear Research).
He developed the first web browser and web server, introducing concepts like HTML, HTTP, and URL, which form the foundation of today’s internet.

CUET UG Computer Science Information Practices PYQ

Read the following statements and arrange them in the correct order.

A. Exception is raised
B. Executes exception
C. Program searches for exception handler
D. Create exception object
E. An error encountered

Choose the correct answer from the options given below:






Go to Discussion

CUET UG Computer Science Information Practices CUET UG PYQ CUET UG Computer Science Information Practices COMPUTER SCIENCE INFORMATICS PRACTICES 2022 PYQ

Solution

When an exception occurs in a program, the sequence is as follows:

  1. E → An error is encountered

  2. D → An exception object is created

  3. A → The exception is raised (thrown)

  4. C → The program searches for an appropriate exception handler

  5. B → If found, the exception handler (catch block) is executed

Hence, the correct order is E → D → A → C → B.


CUET UG Computer Science Information Practices PYQ
In SQL, LIKE condition allows you to use wildcard characters to perform matching. Which of the following is a valid wildcard character?





Go to Discussion

CUET UG Computer Science Information Practices CUET UG PYQ CUET UG Computer Science Information Practices COMPUTER SCIENCE INFORMATICS PRACTICES 2022 PYQ

Solution

In SQL, the LIKE operator is used for pattern matching with wildcard characters:

  • % → Matches any sequence of characters (including zero characters).

  • _ → Matches exactly one character.

Example:

SELECT * FROM Students WHERE Name LIKE 'A%';

This will return all names starting with ‘A’ (like Amit, Anita, Arun, etc.).


CUET UG Computer Science Information Practices PYQ
Match List I with List II
List I List II
A. Data redundancy I. Updating the structure of a data file requires modifying all application programs accessing the file
B. Data inconsistency II. Duplication of data at different places (files)
C. Data isolation III. Separation of resource or data modification made by different transactions
D. Data dependency IV. Mismatch of data maintained at different places





Go to Discussion

CUET UG Computer Science Information Practices CUET UG PYQ CUET UG Computer Science Information Practices COMPUTER SCIENCE INFORMATICS PRACTICES 2022 PYQ

Solution

List I (Concept) Matched With (List II) Explanation
A. Data Redundancy II. Duplication of data at different places (files) Data redundancy occurs when the same data is stored in multiple files or locations, leading to unnecessary duplication and wasted storage space.
B. Data Inconsistency IV. Mismatch of data maintained at different places When data is redundant and one copy is updated but others are not, inconsistencies occur — resulting in mismatched or unreliable data.
C. Data Isolation III. Separation of resource or data modification made by different transactions In file systems, data is often scattered across different files, making it difficult to access or modify related information simultaneously. This problem is known as data isolation.
D. Data Dependency I. Updating the structure of a data file requires modification in all application programs accessing the file Data dependency means that the data structure and application programs are tightly coupled. Any change in file structure requires modification in all programs that use it.


CUET UG Computer Science Information Practices


Online Test Series,
Information About Examination,
Syllabus, Notification
and More.

Click Here to
View More

CUET UG Computer Science Information Practices


Online Test Series,
Information About Examination,
Syllabus, Notification
and More.

Click Here to
View More

Ask Your Question or Put Your Review.

loading...