CUET UG Computer Science Previous Year Question Paper 2024: Previous Years Question Papers with Answers
Get CUET UG Previous Year Question Paper. Score more with CUET Computer Science Question Paper with Solutions 2024. Solve CUCET (UG) Question Paper to get higher marks for the CUET UG 2025 exam.
Published on April, 24th 2025 Time To Read: 16 mins
Start your CUET UG journey now!
CUET UG Computer Science Exam Overview
The CUET UG Computer Science exam is one of the domain-specific tests within
the CUET framework. It evaluates a candidate's understanding of computer
science concepts, programming, and applications. The exam typically consists
of multiple-choice questions (MCQs) covering topics such as computer
programming, data structures, algorithms, and probability.
CUET UG Computer Science 2024 Exam Analysis
- Exam Date: May 22, 2024
- Shift: 1
- Mode: Computer-Based Test (CBT)
- Total Questions: 50 MCQs (Attempt any 40)
- Marking Scheme: +5 for each correct answer, -1 for each
incorrect answer
- Exam Duration: 60 minutes
- Difficulty Level: Easy to Moderate
- Key Topics Covered: Computer Programming, Data Structures
and Algorithms, Probability and Random Processing.
Difficulty Level & Student Feedback
The overall difficulty level of the Computer Science paper was reported as
easy to moderate. Many candidates found the questions to be straightforward
and manageable within the given time frame. The paper was designed to assess
the conceptual understanding and application of computer science principles.
Topics like data structures, algorithms, and programming were
well-represented, aligning closely with the NCERT syllabus.
Good Attempts
Given the paper's difficulty level, candidates who attempted around 35–38
questions with accuracy were considered to have made good attempts. This range
reflects a balanced approach, ensuring quality responses while managing time
effectively.
Conclusion:
The CUET UG 2024 Computer Science exam maintained a balanced approach,
assessing candidates on various computer science topics. The easy to moderate
difficulty level, coupled with questions primarily derived from standard
curricula, provided a fair testing ground for aspirants aiming to secure
admission to undergraduate computer science programs.
CUET UG Computer Science Previous Year Question Paper 2024
1. Which of the following are used in Python
exception handling?
Options:
A) try
B) except
C) finally
D) seek
Choose the correct answer from the options given
below:
1) (A), (B), and (D) only
2) (A), (B), and (C) only
3) (A), (B), (C), and (D)
4) (B), (C), and (D) only
Ans- 2) (A), (B), and (C) only
2. Match List-I with List-II:
List-I
(A) f.seek(-10,1)
(B) f.seek(10,1)
(C)
f.seek(10)
(D) f.seek(-10,2)
List-II
(II) From
current position, move 10 bytes backward
(III) From current position, move
10 bytes forward
(I) From beginning of file, move 10 bytes forward
(IV)
From end of the file, move 10 bytes backward
Choose the correct answer from the options given
below:
1) (A) - (I), (B) - (II), (C) - (III), (D) - (IV)
2) (A) - (II), (B) - (III), (C) - (IV), (D) - (I)
3) (A) - (III), (B) - (II), (C) - (IV), (D) - (I)
4) (A) - (II), (B) - (III), (C) - (I), (D) - (IV)
Ans- 4) (A) - (II), (B) - (III), (C) - (I), (D) - (IV)
3. Arrange the following in correct order of
exception handling in Python:
Options:
A) Write the code that may raise an exception inside a try
block
B) Execute some code regardless of whether the exception
occurs or not using the finally block
C) Handle the specific exception using the except block
D) Raise the exception using the raise statement if
necessary
Choose the correct answer from the options given
below:
1) (A), (B), (C), (D)
2) (A), (C), (B), (D)
3) (B), (A), (D), (C)
4) (C), (B), (D), (A)
Ans- 2) (A), (C), (B), (D)
4. How many candidate keys are possible with the
table below?
1) One
2) Two
3) Three
4) Four
Ans- 3) Three
5. Which of the following is not a limitation of
file systems?
1) Data Redundancy
2) Data Inconsistency
3) Data Dependence
4) Storing Space
Ans- 4) Storing Space
6. Match List-I with List-II:
A) Controlled Data Sharing
B) Data Isolation
C) Data Dependence
D) Data Inconsistency
Choose the correct answer from the options given
below:
1) (A) - (II), (B) - (III), (C) - (I), (D) - (IV)
2) (A) - (II), (B) - (III), (C) - (IV), (D) - (I)
3) (A) - (IV), (B) - (II), (C) - (III), (D) - (I)
4) (A) - (III), (B) - (IV), (C) - (I), (D) - (II)
Ans- 1) (A) - (II), (B) - (III), (C) - (I), (D) - (IV)
7. Which of the following is called database
instance?
Options:
1) Overall design of the database
2) The snapshot of the database at any given time
3) Data about the data
4) Restriction on the type of data inserted
Choose the correct answer from the options given
below:
1) (1) Overall design
2) (2) Snapshot
3) (3) Data
4) (4) Restriction
Ans- 2) (2) Snapshot
8. What is the output of the following SQL
statement?
SQL: SELECT
MID(’CUET2024’,2,5)
1) UET2
2) UET20
3) ET202
4) CUET2
Ans- 2) UET20
9. SQL applies conditions on the groups through
which clause after groups have been formed?
1) where
2) having
3) new
4) all
Ans- 2) having
10. Consider the following two tables emp1 and
emp2:
emp1 (Id, Name) : (1, Amit), (2, Punita)
emp2 (Id, Name) : (1, Punita), (2, Anand)
What is the output of the following query? SELECT
name from emp1 minus SELECT name from emp2;
1) Punita
2) Amit
3) Anand
4) Amit, Punita
Ans- 2) Amit
11. Which of the following statement(s) is/are
TRUE regarding computer network?
(A) Interspace is a software that allows multiple users in
a client-server environment to communicate with each other by sending and
receiving data of various types.
(B) IP address is a unique permanent value associated with
a network adapter called a NIC.
(C) A computer network is an interconnection among two or
more computers or computing devices to share data and resources.
(D) The term ’Workstation’ refers to the most powerful
computer of the network that facilitates sharing of data, software, and
hardware resources on the network and has more memory, processing power, and
storage than a normal node.
Choose the correct answer from the options given
below:
1) (A) and (C) only
2) (A), (B) and (C) only
3) (C) and (D) only
4) (B) and (D) only
Ans- 1) (A) and (C) only
12. Communication over mobile phone is an example
of which type of communication mode?
1) Simplex
2) Half-Duplex
3) Full-Duplex
4) Double-Duplex
Ans- 3) Full-Duplex
13. Which of the following device provides the
necessary translation of data received from network into a format or
protocol recognized by devices within the internal network?
1) Bridge
2) Gateway
3) Router
4) Modem
Ans- 2) Gateway
14. A long cable that helps to connect several
devices in bus topology having terminators at both ends to prevent signal
bounce is known as .
1) Drop Line
2) Taps
3) Analog Cable
4) Backbone
Ans- 4) Backbone
15. Match List-I with List-II:
List I:
A) readline()
B) writelines()
C) seek()
D) flush()
List II:
I) Writes a sequence of strings to the file
(II) Reads a single line from the file
(III) Force any buffered output to be written to the file
(IV) Moves the file pointer to the specified position
Choose the correct answer from the options given
below:
1) (A) - (I), (B) - (II), (C) - (III), (D) - (IV)
2) (A) - (II), (B) - (I), (C) - (IV), (D) - (III)
3) (A) - (II), (B) - (I), (C) - (III), (D) - (IV)
4) (A) - (III), (B) - (IV), (C) - (I), (D) - (II)
Ans- 2) (A) - (II), (B) - (I), (C) - (IV), (D) - (III)
16. What is pickling?
1) It is used to deserialize objects, i.e., converting the
byte stream to object hierarchy.
2) It is used to serialize objects, i.e., to convert
Python object hierarchy to byte stream.
3) It is used to move the file pointer to a specific
location.
4) It is used in exception handling.
Ans- 2) It is used to serialize objects, i.e., to convert Python object hierarchy to byte stream.
17. Consider the following code and specify the
correct order of the statements to be written:
Code:
(A) f.write(”CUET EXAMINATION”)
(B) f=open(”CUET.TXT”, ”w”)
(C) print(”Data is Written Successfully”)
(D) f.close()
Choose the correct answer from the options given
below:
1) (A), (B), (C), (D)
2) (B), (A), (C), (D)
3) (B), (D), (C), (A)
4) (B), (D), (A), (C)
Ans- 2) (B), (A), (C), (D)
18. Which method from below will take a file
pointer to nth character with respect to r position?
Options:
1) fp.seek(r)
2) fp.seek(n)
3) fp.seek(n,r)
4) seek(n,r).fp
Ans- 3) fp.seek(n,r)
19. Evaluate the given postfix expression:
Expression: 3 5
* 6 + 2 3 * -
1) 39
2) 15
3) -9
4) -17
Ans- 2) 15
20. Stack works on the principle of
1) Mid Element First
2) First In First Out
3) Last In First Out
4) Last In Last Out
Ans- 3) Last In First Out
21. Match List-I with List-II:
List I (Term)
A) Prefix
B) Postfix
C) Queue
D) Stack
List II (Description)
(I) In this, the element entered first will be removed
last
(II) In this, the element entered first will be removed
first.
(III) In this, the operator is placed before the operands.
(IV) In this, the operator is placed after the operands
Choose the correct answer from the options given
below:
1) (A) - (III), (B) - (IV), (C) - (II), (D) - (I)
2) (A) - (IV), (B) - (III), (C) - (II), (D) - (I)
3) (A) - (I), (B) - (II), (C) - (IV), (D) - (III)
4) (A) - (II), (B) - (I), (C) - (III), (D) - (IV)
Ans- 1) (A) - (III), (B) - (IV), (C) - (II), (D) - (I)
22. What will be the sequence of elements removed
from the stack after performing the following operations?
Operations:
PUSH(10)
PUSH(20)
POP()
POP()
PUSH(30)
PUSH(40)
POP()
POP()
Options
1) 10
2) 20
3) 30
4) 40
Choose the correct sequence from the options given
below:
(1) (A), (B), (C), (D)
(2) (B), (A), (D), (C)
(3) (A), (B), (D), (C)
(4) (B), (A), (C), (D)
Ans- (2) (B), (A), (D), (C)
23. In Python, _____ module needs to be imported
for implementing Double Ended Queue.
1) counter
2) collections
3) random
4) numpy
Ans- 2) collections
24. What will be the position of front and rear
after execution of the following statements, the Queue already had the
given elements in FIFO order:
F→50 → 90 → 7 → 21 → 73 → 77→R
dequeue()
dequeue()
dequeue()
dequeue()
dequeue()
enqueue(100)
dequeue()
1) Front 50, Rear 77
2) Front 100, Rear 100
3) Front 77, Rear 100
4) Front 73, Rear 77
Ans- 2) Front 100, Rear 100
25. ____ data type is used to implement Queue data
structure in Python.
1) Sets
2) Dictionary
3) Tuple
4) List
Ans- 4) List
26. Choose the statements that are correct.
(A) For Binary Search, all the elements have to be sorted.
(B) For Linear Search, all the elements have to be sorted.
(C) Linear Search takes less time for searching in worst
case than binary search’s worst case.
(D) Linear Search always gives fast result whether
elements are sorted or not.
Choose the correct answer from the options given
below:
1) (A) only
2) (A) and (C) only
3) (B), and (C) only
4) (A), (B), and (D) only
Ans- 1) (A) only
27. Arrange the following in the ascending order
of their time complexity:
(A) Worst Case of Linear Search
(B) Best Case of Binary Search
(C) Worst Case of Binary Search
(D) Worst Case of Bubble Sort
Choose the correct sequence from the options given
below:
1) (A), (B), (C), (D)
2) (B), (D), (A), (C)
3) (B), (A), (C), (D)
4) (B), (C), (A), (D)
Ans- 4) (B), (C), (A), (D)
28. How many minimum number of comparison(s) can
be required to search an element from ’n’ elements, in case of Linear
Search?
1) 1
2) n - 1
3) n
4) n + 1
Ans- 1) 1
29. Which of the statement(s) is/are True for the
given question.
Data elements are: 7, 5, 17, 13, 9, 27, 31, 25,
35.
Hash Table Size: 7
Hash Function: H(I) = (Data element) mod (Hash
Table Size)
(A) Element 27 will create collision.
(B) Element 25 will create collision.
(C) Element 35 will create collision.
(D) Element 31 will create collision.
Choose the correct answer from the options given
below:
1) (A), (B), and (C) only
2) (A), (C), and (D) only
3) (B), (C), and (D) only
4) (A), and (D) only
Ans- 2) (A), (C), and (D) only
30. If a list contains ’n’ number of elements and
all the elements are by default sorted in ascending order, how many
comparisons will be required during 1st pass of bubble sort to arrange the
list in ascending order?
1) 0
2) 1
3) n - 1
4) n
Ans- 3) n - 1
31. What will be the result after pass 2 using
Bubble Sort, if we are sorting elements in ascending order?
Initial List: 7 19 18 9 23 51 12 54 73
1) 7 18 19 9 23 12 51 54 73
2) 7 9 18 19 12 23 51 54 73
3) 7 9 19 18 12 23 51 54 73
4) 7 9 18 19 23 51 12 54 73
Ans- 2) 7 9 18 19 12 23 51 54 73
32. ____ compares neighbouring elements only and
swaps them when necessary.
1) Selection Sort
2) Bubble Sort
3) Insertion Sort
4) Quick Sort
Ans- 2) Bubble Sort
33. _____ are the unorganized facts that can be
processed to generate meaningful information.
1) Information
2) Data
3) Blog
4) Contexts
Ans- 2) Data
34. ______ is the positive square root of the
average of squared differences of each value from the mean.
Options:
1) Mode
2) Variance
3) Median
4) Standard Deviation
Ans- 4) Standard Deviation
35. Consider the stock prices for shares of a
company A for a week. To find the difference of maximum and minimum value
of the share price which statistical technique can be used:
1) Range
2) Mode
3) Mean
4) Median
Ans- 1) Range
36. What is the primary difference between a
database and a file system?
1) Databases are slower than file systems for retrieving
data.
2) Databases offer structured data and relationships,
while file systems do not.
3) File systems can support complex queries, unlike
databases.
4) Both databases and file systems handle data in the same
way.
Ans- 2) Databases offer structured data and relationships, while file systems do not.
37. A domain in a relational database refers to:
1) The overall database structure
2) A specific set of valid values for an attribute
3) A table containing multiple records
4) A relationship between two tables
Ans- 2) A specific set of valid values for an attribute
38. A relation in a relational database is also
known as:
1) A data type
2) An attribute
3) A schema
4) A table
Ans- 4) A table
39. The primary key is chosen from ____
1) The most complex candidate key available.
2) All available candidate keys for a table.
3) The simplest candidate key available.
4) Any attribute within the table.
Ans- 2) All available candidate keys for a table.
40. An alternate key is ___
Options:
1) Another name for the primary key
2) A unique identifier besides the primary key
3) A relationship between two tables
4) A synonym for a tuple
Ans- 2) A unique identifier besides the primary key
41. Consider the following SQL functions:
(A) CURDATE()
(B) CURRENT DATE()
(C) CURRENT DATE
(D) TODAY()
Choose the correct answer from the options given
below:
1) (A), (B), and (D) only
2) (A), (B), and (C) only
3) (A), (B), (C) and (D)
4) (B), (C), and (D) only
Ans- 2) (A), (B), and (C) only
42. Which of the following is correct syntax for
inserting foreign key constraint in a relation?
1) ALTER TABLE table_name ADD FOREIGN KEY(attribute_name)
REFERENCES referenced_table(attribute_name)
2) ADD TABLE table_name ADD FOREIGN KEY(attribute_name)
REFERENCES referenced_table(attribute_name)
3) ALTER TABLE table_name REFERENCES
referenced_table(attribute_name) ADD FOREIGN KEY(attribute_name)
4) MODIFY TABLE table_name ADD FOREIGN KEY(attribute_name)
REFERENCES referenced_table(attribute_name)
Ans-1) ALTER TABLE table_name ADD FOREIGN KEY(attribute_name) REFERENCES referenced_table(attribute_name)
43. What is the result of the following arithmetic
operation in SQL?
SQL: SELECT 5 + NULL AS RESULT
1) 5
2) NULL
3) 0
4) 5NULL
Ans- 2) NULL
44. Which of the following expressions in SQL
would calculate the square root of 16?
1) POWER(16,2)
2) POWER(16,0.5)
3) POWER(16,1)
4) MOD(16)
Ans- 2) POWER(16,0.5)
45. Which of the following statement(s) is/are
TRUE in respect of Media Access Control (MAC) Address?
(A) It can be changed if a node is removed from one
network and connected to another network.
(B) Each MAC address is a 12-digit hexadecimal number.
(C) It is a unique value associated with a network adapter
called NIC.
(D) It is provided by the Internet Service Provider to
locate computers connected to the internet.
Choose the correct answer from the options given
below:
1) (B) and (C) only
2) (A), (B), and (C) only
3) (C) and (D) only
4) (A) and (B) only
Ans- 1) (B) and (C) only
46. Match List-I with List-II:
List I:
(A) RJ45 Connector
(B) Bridge
(C) Gateway
(D) Repeater
List II:
(I) relay frames between two originally separate seg ments
that follow same protocols.
(II) amplifies a signal that is transmitted across the net
work so that the signal is received same as it is sent
(III) establishes an intelligent connection between a
local area network and external networks with com pletely different
structures.
(IV) plug-in device primarily used for connecting LANs
particularly Ethernet.
Choose the correct answer from the options given
below:
1) (A) - (IV), (B) - (III), (C) - (II), (D) - (I)
2) (A) - (III), (B) - (II), (C) - (I), (D) - (IV)
3) (A) - (III), (B) - (I), (C) - (IV), (D) - (II)
4) (A) - (IV), (B) - (I), (C) - (III), (D) - (II)
Ans- 4) (A) - (IV), (B) - (I), (C) - (III), (D) - (II)
47. What is the purpose of Domain Name System
(DNS) Server in networking?
1) To encrypt data during transmission.
2) To convert domain names into IP addresses.
3) To regulate network traffic flow.
4) To establish a secure connection between devices.
Ans- 2) To convert domain names into IP addresses.
48. 140.168.220.200 is a 32-bit binary number
usually represented as 4 decimal values, each representing 8 bits, in the
range 0 to 255 separated by decimal points. What is this number called?
1) IP Address
2) Web Address
3) MAC Address
4) Port Address
Ans- 1) IP Address
49. In a _____topology, if there are n devices in
a network, each device has n-1 ports for cables.
1) Mesh
2) Bus
3) Star
4) Ring
Ans- 1) Mesh
50. Amit wants to be familiar with SQL. One of his
friends Anand suggests him to execute the following SQL commands:
(A) Create Table Student
(B) Use Database DB
(C) Select * from Student
(D) Insert into Student
In which order Amit needs to run the above
commands?
Options:
1) (A), (B), (C), (D)
2) (A), (B), (D), (C)
3) (B), (A), (D), (C)
4) (C), (B), (D), (A)
Ans- 3) (B), (A), (D), (C)
Try EaseToLearn for free
Sign up for free Online Test
Study Smarter, Not Harder - Crack CUET UG 2025
Discover expert tips, time-saving techniques, and smart strategies to boost your preparation.