CUET UG Computer Science Previous Year Question Paper 2024: Previous Years Question Papers with Answers

Get CUET UG Previous Year Question Paper. Score more with CUET Computer Science Question Paper with Solutions 2024. Solve CUCET (UG) Question Paper to get higher marks for the CUET UG 2025 exam.

Published on April, 24th 2025 Time To Read: 16 mins

Start your CUET UG journey now!

CUET UG Computer Science Exam Overview

The CUET UG Computer Science exam is one of the domain-specific tests within the CUET framework. It evaluates a candidate's understanding of computer science concepts, programming, and applications. The exam typically consists of multiple-choice questions (MCQs) covering topics such as computer programming, data structures, algorithms, and probability.​

CUET UG Computer Science 2024 Exam Analysis

  • Exam Date: May 22, 2024
  • Shift: 1
  • Mode: Computer-Based Test (CBT)
  • Total Questions: 50 MCQs (Attempt any 40)
  • Marking Scheme: +5 for each correct answer, -1 for each incorrect answer
  • Exam Duration: 60 minutes
  • Difficulty Level: Easy to Moderate
  • Key Topics Covered: Computer Programming, Data Structures and Algorithms, Probability and Random Processing.

Difficulty Level & Student Feedback

The overall difficulty level of the Computer Science paper was reported as easy to moderate. Many candidates found the questions to be straightforward and manageable within the given time frame. The paper was designed to assess the conceptual understanding and application of computer science principles. Topics like data structures, algorithms, and programming were well-represented, aligning closely with the NCERT syllabus. ​

Good Attempts

Given the paper's difficulty level, candidates who attempted around 35–38 questions with accuracy were considered to have made good attempts. This range reflects a balanced approach, ensuring quality responses while managing time effectively.

Conclusion:

The CUET UG 2024 Computer Science exam maintained a balanced approach, assessing candidates on various computer science topics. The easy to moderate difficulty level, coupled with questions primarily derived from standard curricula, provided a fair testing ground for aspirants aiming to secure admission to undergraduate computer science programs.

CUET UG Computer Science Previous Year Question Paper 2024

1. Which of the following are used in Python exception handling?

Options:

A) try

B) except

C) finally

D) seek

Choose the correct answer from the options given below:

1) (A), (B), and (D) only

2) (A), (B), and (C) only

3) (A), (B), (C), and (D)

4) (B), (C), and (D) only

Ans- 2) (A), (B), and (C) only

2. Match List-I with List-II:

List-I
(A) f.seek(-10,1)
(B) f.seek(10,1)
(C) f.seek(10)
(D) f.seek(-10,2)

List-II
(II) From current position, move 10 bytes backward
(III) From current position, move 10 bytes forward
(I) From beginning of file, move 10 bytes forward
(IV) From end of the file, move 10 bytes backward

Choose the correct answer from the options given below:

1) (A) - (I), (B) - (II), (C) - (III), (D) - (IV)

2) (A) - (II), (B) - (III), (C) - (IV), (D) - (I)

3) (A) - (III), (B) - (II), (C) - (IV), (D) - (I)

4) (A) - (II), (B) - (III), (C) - (I), (D) - (IV)

Ans- 4) (A) - (II), (B) - (III), (C) - (I), (D) - (IV)

3. Arrange the following in correct order of exception handling in Python:

Options:

A) Write the code that may raise an exception inside a try block

B) Execute some code regardless of whether the exception occurs or not using the finally block

C) Handle the specific exception using the except block

D) Raise the exception using the raise statement if necessary

Choose the correct answer from the options given below:

1) (A), (B), (C), (D)

2) (A), (C), (B), (D)

3) (B), (A), (D), (C)

4) (C), (B), (D), (A)

Ans- 2) (A), (C), (B), (D)

4. How many candidate keys are possible with the table below?

1) One

2) Two

3) Three

4) Four

Ans- 3) Three

5. Which of the following is not a limitation of file systems?

1) Data Redundancy

2) Data Inconsistency

3) Data Dependence

4) Storing Space

Ans- 4) Storing Space

6. Match List-I with List-II:

A) Controlled Data Sharing

B) Data Isolation

C) Data Dependence

D) Data Inconsistency

Choose the correct answer from the options given below:

1) (A) - (II), (B) - (III), (C) - (I), (D) - (IV)

2) (A) - (II), (B) - (III), (C) - (IV), (D) - (I)

3) (A) - (IV), (B) - (II), (C) - (III), (D) - (I)

4) (A) - (III), (B) - (IV), (C) - (I), (D) - (II)

Ans- 1) (A) - (II), (B) - (III), (C) - (I), (D) - (IV)

7. Which of the following is called database instance?

Options:

1) Overall design of the database

2) The snapshot of the database at any given time

3) Data about the data

4) Restriction on the type of data inserted

Choose the correct answer from the options given below:

1) (1) Overall design

2) (2) Snapshot

3) (3) Data

4) (4) Restriction

Ans- 2) (2) Snapshot

8. What is the output of the following SQL statement?

SQL: SELECT MID(’CUET2024’,2,5)

1) UET2

2) UET20

3) ET202

4) CUET2

Ans- 2) UET20

9. SQL applies conditions on the groups through which clause after groups have been formed?

1) where

2) having

3) new

4) all

Ans- 2) having

10. Consider the following two tables emp1 and emp2:

emp1 (Id, Name) : (1, Amit), (2, Punita)

emp2 (Id, Name) : (1, Punita), (2, Anand)

What is the output of the following query? SELECT name from emp1 minus SELECT name from emp2;

1) Punita

2) Amit

3) Anand

4) Amit, Punita

Ans- 2) Amit

11. Which of the following statement(s) is/are TRUE regarding computer network?

(A) Interspace is a software that allows multiple users in a client-server environment to communicate with each other by sending and receiving data of various types.

(B) IP address is a unique permanent value associated with a network adapter called a NIC.

(C) A computer network is an interconnection among two or more computers or computing devices to share data and resources.

(D) The term ’Workstation’ refers to the most powerful computer of the network that facilitates sharing of data, software, and hardware resources on the network and has more memory, processing power, and storage than a normal node.

Choose the correct answer from the options given below:

1) (A) and (C) only

2) (A), (B) and (C) only

3) (C) and (D) only

4) (B) and (D) only

Ans- 1) (A) and (C) only

12. Communication over mobile phone is an example of which type of communication mode?

1) Simplex

2) Half-Duplex

3) Full-Duplex

4) Double-Duplex

Ans- 3) Full-Duplex

13. Which of the following device provides the necessary translation of data received from network into a format or protocol recognized by devices within the internal network?

1) Bridge

2) Gateway

3) Router

4) Modem

Ans- 2) Gateway

14. A long cable that helps to connect several devices in bus topology having terminators at both ends to prevent signal bounce is known as .

1) Drop Line

2) Taps

3) Analog Cable

4) Backbone

Ans- 4) Backbone

15. Match List-I with List-II:

List I:

A) readline()

B) writelines()

C) seek()

D) flush()

List II:

I) Writes a sequence of strings to the file

(II) Reads a single line from the file

(III) Force any buffered output to be written to the file

(IV) Moves the file pointer to the specified position

Choose the correct answer from the options given below:

1) (A) - (I), (B) - (II), (C) - (III), (D) - (IV)

2) (A) - (II), (B) - (I), (C) - (IV), (D) - (III)

3) (A) - (II), (B) - (I), (C) - (III), (D) - (IV)

4) (A) - (III), (B) - (IV), (C) - (I), (D) - (II)

Ans- 2) (A) - (II), (B) - (I), (C) - (IV), (D) - (III)

16. What is pickling?

1) It is used to deserialize objects, i.e., converting the byte stream to object hierarchy.

2) It is used to serialize objects, i.e., to convert Python object hierarchy to byte stream.

3) It is used to move the file pointer to a specific location.

4) It is used in exception handling.

Ans- 2) It is used to serialize objects, i.e., to convert Python object hierarchy to byte stream.

17. Consider the following code and specify the correct order of the statements to be written:

Code:

(A) f.write(”CUET EXAMINATION”)

(B) f=open(”CUET.TXT”, ”w”)

(C) print(”Data is Written Successfully”)

(D) f.close()

Choose the correct answer from the options given below:

1) (A), (B), (C), (D)

2) (B), (A), (C), (D)

3) (B), (D), (C), (A)

4) (B), (D), (A), (C)

Ans- 2) (B), (A), (C), (D)

18. Which method from below will take a file pointer to nth character with respect to r position?

Options:

1) fp.seek(r)

2) fp.seek(n)

3) fp.seek(n,r)

4) seek(n,r).fp

Ans- 3) fp.seek(n,r)

19. Evaluate the given postfix expression:

Expression: 3 5 * 6 + 2 3 * -

1) 39

2) 15

3) -9

4) -17

Ans- 2) 15

20. Stack works on the principle of

1) Mid Element First

2) First In First Out

3) Last In First Out

4) Last In Last Out

Ans- 3) Last In First Out

21. Match List-I with List-II:

List I (Term)

A) Prefix

B) Postfix

C) Queue

D) Stack

List II (Description)

(I) In this, the element entered first will be removed last

(II) In this, the element entered first will be removed first.

(III) In this, the operator is placed before the operands.

(IV) In this, the operator is placed after the operands

Choose the correct answer from the options given below:

1) (A) - (III), (B) - (IV), (C) - (II), (D) - (I)

2) (A) - (IV), (B) - (III), (C) - (II), (D) - (I)

3) (A) - (I), (B) - (II), (C) - (IV), (D) - (III)

4) (A) - (II), (B) - (I), (C) - (III), (D) - (IV)

Ans- 1) (A) - (III), (B) - (IV), (C) - (II), (D) - (I)

22. What will be the sequence of elements removed from the stack after performing the following operations?

Operations:

PUSH(10)

PUSH(20)

POP()

POP()

PUSH(30)

PUSH(40)

POP()

POP()

Options

1) 10

2) 20

3) 30

4) 40

Choose the correct sequence from the options given below:

(1) (A), (B), (C), (D)

(2) (B), (A), (D), (C)

(3) (A), (B), (D), (C)

(4) (B), (A), (C), (D)

Ans- (2) (B), (A), (D), (C)

23. In Python, _____ module needs to be imported for implementing Double Ended Queue.

1) counter

2) collections

3) random

4) numpy

Ans- 2) collections

24. What will be the position of front and rear after execution of the following statements, the Queue already had the given elements in FIFO order:

F→50 → 90 → 7 → 21 → 73 → 77→R

dequeue()

dequeue()

dequeue()

dequeue()

dequeue()

enqueue(100)

dequeue()

1) Front 50, Rear 77

2) Front 100, Rear 100

3) Front 77, Rear 100

4) Front 73, Rear 77

Ans- 2) Front 100, Rear 100

25. ____ data type is used to implement Queue data structure in Python.

1) Sets

2) Dictionary

3) Tuple

4) List

Ans- 4) List

26. Choose the statements that are correct.

(A) For Binary Search, all the elements have to be sorted.

(B) For Linear Search, all the elements have to be sorted.

(C) Linear Search takes less time for searching in worst case than binary search’s worst case.

(D) Linear Search always gives fast result whether elements are sorted or not.

Choose the correct answer from the options given below:

1) (A) only

2) (A) and (C) only

3) (B), and (C) only

4) (A), (B), and (D) only

Ans- 1) (A) only

27. Arrange the following in the ascending order of their time complexity:

(A) Worst Case of Linear Search

(B) Best Case of Binary Search

(C) Worst Case of Binary Search

(D) Worst Case of Bubble Sort

Choose the correct sequence from the options given below:

1) (A), (B), (C), (D)

2) (B), (D), (A), (C)

3) (B), (A), (C), (D)

4) (B), (C), (A), (D)

Ans- 4) (B), (C), (A), (D)

28. How many minimum number of comparison(s) can be required to search an element from ’n’ elements, in case of Linear Search?

1) 1

2) n - 1

3) n

4) n + 1

Ans- 1) 1

29. Which of the statement(s) is/are True for the given question.

Data elements are: 7, 5, 17, 13, 9, 27, 31, 25, 35.

Hash Table Size: 7

Hash Function: H(I) = (Data element) mod (Hash Table Size)

(A) Element 27 will create collision.

(B) Element 25 will create collision.

(C) Element 35 will create collision.

(D) Element 31 will create collision.

Choose the correct answer from the options given below:

1) (A), (B), and (C) only

2) (A), (C), and (D) only

3) (B), (C), and (D) only

4) (A), and (D) only

Ans- 2) (A), (C), and (D) only

30. If a list contains ’n’ number of elements and all the elements are by default sorted in ascending order, how many comparisons will be required during 1st pass of bubble sort to arrange the list in ascending order?

1) 0

2) 1

3) n - 1

4) n

Ans- 3) n - 1

31. What will be the result after pass 2 using Bubble Sort, if we are sorting elements in ascending order?

Initial List: 7 19 18 9 23 51 12 54 73

1) 7 18 19 9 23 12 51 54 73

2) 7 9 18 19 12 23 51 54 73

3) 7 9 19 18 12 23 51 54 73

4) 7 9 18 19 23 51 12 54 73

Ans- 2) 7 9 18 19 12 23 51 54 73

32. ____ compares neighbouring elements only and swaps them when necessary.

1) Selection Sort

2) Bubble Sort

3) Insertion Sort

4) Quick Sort

Ans- 2) Bubble Sort

33. _____ are the unorganized facts that can be processed to generate meaningful information.

1) Information

2) Data

3) Blog

4) Contexts

Ans- 2) Data

34. ______ is the positive square root of the average of squared differences of each value from the mean.

Options:

1) Mode

2) Variance

3) Median

4) Standard Deviation

Ans- 4) Standard Deviation

35. Consider the stock prices for shares of a company A for a week. To find the difference of maximum and minimum value of the share price which statistical technique can be used:

1) Range

2) Mode

3) Mean

4) Median

Ans- 1) Range

36. What is the primary difference between a database and a file system?

1) Databases are slower than file systems for retrieving data.

2) Databases offer structured data and relationships, while file systems do not.

3) File systems can support complex queries, unlike databases.

4) Both databases and file systems handle data in the same way.

Ans- 2) Databases offer structured data and relationships, while file systems do not.

37. A domain in a relational database refers to:

1) The overall database structure

2) A specific set of valid values for an attribute

3) A table containing multiple records

4) A relationship between two tables

Ans- 2) A specific set of valid values for an attribute

38. A relation in a relational database is also known as:

1) A data type

2) An attribute

3) A schema

4) A table

Ans- 4) A table

39. The primary key is chosen from ____

1) The most complex candidate key available.

2) All available candidate keys for a table.

3) The simplest candidate key available.

4) Any attribute within the table.

Ans- 2) All available candidate keys for a table.

40. An alternate key is ___

Options:

1) Another name for the primary key

2) A unique identifier besides the primary key

3) A relationship between two tables

4) A synonym for a tuple

Ans- 2) A unique identifier besides the primary key

41. Consider the following SQL functions:

(A) CURDATE()

(B) CURRENT DATE()

(C) CURRENT DATE

(D) TODAY()

Choose the correct answer from the options given below:

1) (A), (B), and (D) only

2) (A), (B), and (C) only

3) (A), (B), (C) and (D)

4) (B), (C), and (D) only

Ans- 2) (A), (B), and (C) only

42. Which of the following is correct syntax for inserting foreign key constraint in a relation?

1) ALTER TABLE table_name ADD FOREIGN KEY(attribute_name) REFERENCES referenced_table(attribute_name)

2) ADD TABLE table_name ADD FOREIGN KEY(attribute_name) REFERENCES referenced_table(attribute_name)

3) ALTER TABLE table_name REFERENCES referenced_table(attribute_name) ADD FOREIGN KEY(attribute_name)

4) MODIFY TABLE table_name ADD FOREIGN KEY(attribute_name) REFERENCES referenced_table(attribute_name)

Ans-1) ALTER TABLE table_name ADD FOREIGN KEY(attribute_name) REFERENCES referenced_table(attribute_name)

43. What is the result of the following arithmetic operation in SQL?

SQL: SELECT 5 + NULL AS RESULT

1) 5

2) NULL

3) 0

4) 5NULL

Ans- 2) NULL

44. Which of the following expressions in SQL would calculate the square root of 16?

1) POWER(16,2)

2) POWER(16,0.5)

3) POWER(16,1)

4) MOD(16)

Ans- 2) POWER(16,0.5)

45. Which of the following statement(s) is/are TRUE in respect of Media Access Control (MAC) Address?

(A) It can be changed if a node is removed from one network and connected to another network.

(B) Each MAC address is a 12-digit hexadecimal number.

(C) It is a unique value associated with a network adapter called NIC.

(D) It is provided by the Internet Service Provider to locate computers connected to the internet.

Choose the correct answer from the options given below:

1) (B) and (C) only

2) (A), (B), and (C) only

3) (C) and (D) only

4) (A) and (B) only

Ans- 1) (B) and (C) only

46. Match List-I with List-II:

List I:

(A) RJ45 Connector

(B) Bridge

(C) Gateway

(D) Repeater

List II:

(I) relay frames between two originally separate seg ments that follow same protocols.

(II) amplifies a signal that is transmitted across the net work so that the signal is received same as it is sent

(III) establishes an intelligent connection between a local area network and external networks with com pletely different structures.

(IV) plug-in device primarily used for connecting LANs particularly Ethernet.

Choose the correct answer from the options given below:

1) (A) - (IV), (B) - (III), (C) - (II), (D) - (I)

2) (A) - (III), (B) - (II), (C) - (I), (D) - (IV)

3) (A) - (III), (B) - (I), (C) - (IV), (D) - (II)

4) (A) - (IV), (B) - (I), (C) - (III), (D) - (II)

Ans- 4) (A) - (IV), (B) - (I), (C) - (III), (D) - (II)

47. What is the purpose of Domain Name System (DNS) Server in networking?

1) To encrypt data during transmission.

2) To convert domain names into IP addresses.

3) To regulate network traffic flow.

4) To establish a secure connection between devices.

Ans- 2) To convert domain names into IP addresses.

48. 140.168.220.200 is a 32-bit binary number usually represented as 4 decimal values, each representing 8 bits, in the range 0 to 255 separated by decimal points. What is this number called?

1) IP Address

2) Web Address

3) MAC Address

4) Port Address

Ans- 1) IP Address

49. In a _____topology, if there are n devices in a network, each device has n-1 ports for cables.

1) Mesh

2) Bus

3) Star

4) Ring

Ans- 1) Mesh

50. Amit wants to be familiar with SQL. One of his friends Anand suggests him to execute the following SQL commands:

(A) Create Table Student

(B) Use Database DB

(C) Select * from Student

(D) Insert into Student

In which order Amit needs to run the above commands?

Options:

1) (A), (B), (C), (D)

2) (A), (B), (D), (C)

3) (B), (A), (D), (C)

4) (C), (B), (D), (A)

Ans- 3) (B), (A), (D), (C)

Study Smarter, Not Harder - Crack CUET UG 2025

Discover expert tips, time-saving techniques, and smart strategies to boost your preparation.

Free CUET UG Mock Test

Evaluate your preparation with real CUET UG-level questions.

Start Now

Free CUET UG Mock Test

Start Now