Student-Friendly Solutions Table
Each question is shown with its original wording from the source paper and an easier explanation designed for quick understanding.
| Q.No. | Question | Easy Solution |
|---|---|---|
| 1 | Q.1. Identify the relational algebra operation denoted by: Course X Student; where 'Course' and 'Student' are two relations and X is an operation. 1. Union 2. Set Difference 3. Cartesian Product 4. Intersection | wer: 3. Cartesian Product |
| 2 | Q.2. Given: TableA: Name Hobbies Anu Dance Anuj Music TableB: Name Hobbies Prannav Reading Anuj Reading Find TableA U TableB? (After the list of questions, the solution will Start.) 1. 2. 3. 4. | wer: Option 4 |
| 3 | Q.3. Given two relations: 'Employee' with structure as ID, name, Address, Phone, Deptno Department witn structure as Deptno, Dname __________ is used to represent the relationship between two relations Employee and Department. 1. Primary key 2. Alternate key 3. Foreign key 4. Candidate key | wer: 3. Foreign key |
| 4 | Q.4. A value is specified for the column, if no value is provided. 1. unique 2. null 3. default 4. primary | wer: 3. Default A default value is automatically assigned to a column when no value is |
| 5 | Q.5. Given table 'StudAtt' with structure as Rno, Attdate, Attendance. Identify the suitable command to addaprimary key to the table after table creation. Note: In the given case, we want to make both Rno and Attdate columns as primary key. 1. ALTER TABLE StudAtt ADD PRIMARY KEY(Rno, Attdate); 2. CREATE TABLE StudAtt ADD PRIMARY KEY(Rno); 3. ALTER TABLE StudAtt ADD PRIMARY KEY; 4. ALTER TABLE StudAtt ADD PRIMARY KEY(Rno) AND PRIMARY KEY(Attdate); | wer: 1. ALTER TABLE StudAtt ADD PRIMARY KEY(Rno, Attdate); |
| 6 | Q.6. The SELECT command when combined with DISTINCT clause is used to: 1. returns records without repetition 2. returns records with repetition 3. returns all records with conditions 4. returns all records without checking | wer: 1. returns records without repetition |
| 7 | Q.7. ____________ is used to search for a specific pattern inacolumn. 1. Between operator 2. In operator 3. Like operator 4. Null operator | wer: 3. LIKE operator |
| 8 | Q.8. Give the output of the query:- SELECT MONTH("2010-03-05"); 1. 3 2. 5 3. MARCH 4. MAY | wer: 1. 3 |
| 9 | Q.9. Match List-I with List-II List-1 List-I1 (Aggregate function) (Description) (A) count(marks) (I) Count all rows (B) count(*) (II) Finding average of non null values of marks (C) avg(marks) (III) Count all non null values of marks column (D) sum(marks) (IV) Finding sum of all marks Chooco the correct answer from the options given below 1. (A) - (III), (B) - (I), (C) - (II), (D) - (IV) 2. (A) - (I), (B) - (III), (C) – (II), (D) - (IV) 3. (A) - (I), (B) - (II), (C) – (IV), (D), - (III) 4. (A) - (III), (B) - (IV), (C) - (I), (D) - (II) | wer: 1. (A) - (III), (B) - (I), (C) - (II), (D) - (IV) count(marks) |
| 10 | Q.10. Given Relation: 'STUDENT' S.NO SNAME MARKS 1 Amit 20 2 Karuna 40 3 Kavita NULL 4 Anuj 30 Find the value of: SELECT AVG(MARKS) FROM STUDENT; 1. 30 2. 22.5 3. 90 4. 23 | wer: 1. 30 |
| 11 | Q.11. ____________ operation is used to get the common tuples from two relations. 1. Union 2. Intersect 3. Set Difference 4. Cartesian product | wer: 2. Intersect |
| 12 | Q.12. Identify the correct IP address from the options given: 1. FC:F8:AE:CE:7B:16 2. 192.168.256.178 3. 192.168.0.178 4.192.168.0.-1 | wer: 3. 192.168.0.178. |
| 13 | Q.13. Arrange the following python code segments in order with respect to exception handling. (A) except ZeroDivisionError: print("Zero denominator not allowed") (B) finally: print("Over and Out") (C) try: n=50 d=int(input("enter denominator") d/n=q print("division performed") (D) else: print("Result=",q) Choose the correct answer from the options given below: 1. (C), (A), (B), (D) 2. (C), (A), (D), (B) 3. (B), (A), (D), (C) 4. (C), (B), (D), (A) | wer: 2. (C), (A), (D), (B) Explanation: In Python: |
| 14 | Q.14. _____________ is the process of transforming data or an object in memory (RAM) to a stream of bytes called byte streams. 1. read() 2. write() 3. Pickling 4. De-serialization | wer: 3. Pickling. |
| 15 | Q.15. Identify the correct code to read data from the file notes.dat in a binary file: 1. import pickle f1=open("notes.dat","r") data=pickle.load(f1) print(data) f1.close() 2. import pickle f1=open("notes.dat","rb") data=f1.load() print(data) f1.closen 3. import pickle f1=open("notes.dat","rb") data=pickle.load(f1) print(data) f1.close() 4. import pickle f1=open("notes.dat", "rb") data=f1.read() print(data) f1.close() | wer: 3. |
| 16 | Q.16. Identify the correct python statement to open a text file "data.txt" in both read and write mode. 1. file.open("data.txt") 2. file.open("data.txt","r+") 3. file.open("data.txt"."rw") 4. file.open("data.txt","rw+") | wer: 2. file.open("data.txt","r+"). • "r+" mode opens a file for both reading and writing. |
| 17 | Q.17. Identify the type of expression where operators are placed before the corresponding operands: 1. Polish expression 2. Infix expression 3. Postfix expression 4. Reverse polish expression | wer: 1. Polish expression. |
| 18 | Q.18. Evaluate the postfix expression: 24 5 7* 5 / + 1. 29 2. 30 3. 31 4. 0 | wer: 3. 31 |
| 19 | Q.19. STACK follows ______________ principle, where insertion and deletion is from end/ends only. 1. LIFO, two 2. FIFO, two 3. HFO, top 4. LIFO, one | wer: 4. LIFO, one. |
| 20 | Q.20. Given a scenario: Suppose there is a web-server hosting a website to declare results. This server can handle a maximum of 100 concurrent requests to view results, So, as to serve thousands of user reguests. a ______________ would be the most appropriate data structure to use. 1. Stack 2. Queue 3. List 4. Dictionary | wer : 2. Queue. |
| 21 | Q.21. To perform enqueue and dequeue efficiently on a queue, which of the following operations are required? A) isEmpty B) peek C) isfull D) update Choose the correct answer from the options given below: 1. (A), (B) and (D) only 2. (A), (B) and (C) only 3. (B) (C) and (D) only 4. (A), (C) and (D) only | wer: 2. (A), (B) and (C) only. |
| 22 | Q.22. Distance table: A to B 20 mtr. A to C 50 mtr. A to D 110 mtr. A to Е /0 mtr. Identify the correct place where we have to use repeaters. 1. Between A to В 2. Between A to C 3. Between A to D 4. Between A to E | wer: 3. Between A to D. • From the distance table: |
| 23 | Q.23. In MAC address, Organisational Unique Identifier (OUI) consist of _______. 1. 32 bits 2. 48 bits 3. 24 bits 4. 64 bits | wer: 3) 24 bits |
| 24 | Q.24. Given a list numList of n elements and key value K, arrange the following steps for finding the position of the key K in the numList using binary search algorithm i.e. BinarySearch(numList, key) (A) Calculate mid = (first+last)//2 (B) SET first = 0, last = n-1 (C) PRINT "Search unsuccessful" (C) PRINT "Search unsuccessful" IF numList[mid] = key DRIIT "Flemept found at position" mid+1 STOP ELSE IF numList[mid] > key, THEN last = mid-1 EL SE first = mid + 1 Choose the correct answer from the options given below: 1. (A), (B), (D), (C) 2. (D), (B), (A), (C) 3. (B), (A), (D), (C) 4. (D), (A), (B), (C) | wer: 3) (B), (A), (D), (C) |
| 25 | Q.25. In binary search after every pass of the algorithm, the search area: 1. gets doubled 2. gets reduced by half 3. remains same 4. gets reduced by one third | wer: 2) gets reduced by half |
| 26 | Q.26. For binary search, the list is in ascending order and the key is present in the list. If the middle element is less than the key, it means: 1. The key is in the first half. 2. The key is in the second half. 3. The key is not in the list. 4. The key is the middle element. | wer: 2) The key is in the second half |
| 27 | Q.27. Arrange the following in order related to bubble sort for a list of elements: (A) (B) (C) (D) Choose the correct answer from the options given below: 1. (A), (B), (D), (C) 2. (A), (C), (B), (D) 3. (B), (A), (D), (C) 4. (C), (B), (D), (A) | wer: 2. (A), (C), (D), (B) |
| 28 | Q.28. The amount of time an algorithm takes to process a given data can be called its: 1. Process time 2. Time period 3. Time complexity 4. Time bound | Answer: 3. Time complexity |
| 29 | Q.29. Identify the incorrect statement in the context of measures of variability: 1. Range is the difference between maximum and minimum values of the data. 2. Mean is the average of numeric values of an attribute. 3. Standard deviation refers to differences within the set of data of a variable. 4. Measures of variability is also known as measures of dispersion. | wer: (2) Mean is the average of numeric values of an attribute. the data is, such as range, variance, or standard deviation. Hence, the |
| 30 | Q.30. Identify type of data being collected/generated in the scenerio of recording a video: 1. Structured Data 2. Ambiguous data 3. Unstructured data 4. Formal Data | wer: (3) Unstructured data |
| 31 | Q.31. Given data: Weight of 20 student in kgs=[35, 35, 40, 40, 40, 50, 50, 50, 50, 50, 60, 65, 65, 70, 70, 72, 75, 75, 78, 78] Find the mode. 1. 50 2. 55 3. 57.4 4. 57 | wer: 1. 50 |
| 32 | Q.32. Match List-I with List-II List-1 List-II (A). Primary key I). Total number of attributes in a table. (B). Degree (II). Attribute used to relate two tables. (C). Foreign key (III). Attribute used to uniquely identify a tuple. (D) Copotroint (IV) A resriction on the Type of datoa that Can be inserted in a column of a table. Choose the correct answer from the options given below: 1. (A) - (1), (B) - (II), (C) - (III), (D) - (IV) 2. (A) - (III), (B) - (1), (C) - (II), (D) - (IV) 3. (A) - (1), (B) - (II), (C) - (IV), (D) - (I1I) 4. (A) - (III), (B) - (IV), (C) - (1), (D) - (11) | wer: 2. (A) → (III), (B) → (I), (C) → (II), (D) → (IV) |
| 33 | Q.33. In SQL table, the set of values which a column can take in each row is called __________ . 1. Tuple 2. Attribute 3. Domain 4. Relation | wer: 3. Domain |
| 34 | Q.34. Which of the following is synonym for Meta - data? 1. Data Dictionary 2. Database Instance 3. Database Schema 4. Data Constraint | wer: 1. Data Dictionary |
| 35 | Q.35. Single row functions are also known as _____________ functions. 1. Multi row 2. Group 3. Mathematical 4. Scalar | wer: 4. Scalar |
| 36 | Q.36. Ms Ritika wants to delete the table 'sports' permanently. Help her in selecting the correct SQL command from the following. 1. DELETE FROM SPORTS; 2. DROP SPORTS; 3. DROP TABLE SPORTS; 4. DELETE* FROM SPORTS; | wer: 1. DROP TABLE SPORTS; Hence, to delete the table ‘sports’ permanently, the correct command is: |
| 37 | Q.37. Which of the following are text functions? (A) MIDO (B) INSTRO (C) SUBSTRO (D) LENGTH) Choose the correct answer from the options given below: 1. (A), (B) and (D) only 2. (A), (B) and (C) only 3. (A), (B), (C) and (D) 4. (B), (C) and (D) only | wer: 3. (A), (B), (C) and (D) |
| 38 | Q.38. Match List-I with List-II List-I List-II (A) ROUTER (1) NETWORK TOPOLOGY (B) ETHERNET CARD (I1) NETWORK DEVICE (C).RING (III) NETWORK TYPЕ (D) PAN (IV) NETWORK INTERFACE CARD Choose the correctanswer from the options given below: 1. (A) - (11), (B) - (IV), (C) - (1), (D) - (III) 2. (A) - (1), (B) - (III), (C) - (II), (D) - (IV) 3. (A) - (IV), (B) - (II), (C) - (II), (D) - (I) 4. (A) - (III), (B) - (IV), (C) - (I), (D) - (II) | wer: (A) → (II), (B) → (IV), (C) → (I), (D) → (III) |
| 39 | Q.39. ____________ is a language used to design web pages. 1. Web browser 2. HTTP 3. HTML 4. WWW | wer: 3. HTML |
| 40 | Q.40. Match List-I with List-II List-1 List-I1 (A) Modem (1) An eight pin connector used with Ethernet cables for networking. (B) RJ45 (II) Modulator-Demodulator (C) Network interface unit (III) An organization that provides services for accessing the internet. (D) ISP (IV) Ethernet card Choose the correct answer from the options given below: 1. (A) - (I), (B) - (II), (C) - (III), (D) - (IV) 2. (A) - (I), (B) - (I), (C) - (IV), (D) - (D) 3. (A) - (I), (B) - (II), (C) - (IV), (D) - (III) 4. (A) - (II), (B) - (IV), (C) - (I), (D) - (III) | wer: 4. (A) → (II), (B) → (I), (C) → (IV), (D) → (III) |
| 41 | Q.41. Bandwidth of a channel is: 1. The range of frequencies available for transmission of data through that channel. 2. The path of message travels between source and destination. 3. The set of rules on the Internet. 4. I he data or inrormation that heeds to be exchanged. | wer: 1. The range of frequencies available for transmission of data through A higher bandwidth means more data can be transmitted per second — just |
| 42 | Q.42. Data Transfer Rate 1 Gbps is equal to: (A) 1024 Mbps (B) 1024 Kbps (C) 230 bps (D) 22 bps Choose the correct answer from the options given below: 1. (A) and (D) only 2. (A) and (C) only 3. (B) and (D) only 4. (B) and (C) only | wer: 2. (A) and (C) only (because 1 Gbps = 1024 Mbps).1 Gbps stands for |
| 43 | Q.43. Identify the wired transmission media for the following: "They are less expensive and commonly used in telephone lines and LANs. These cables are of two types: Unshielded and shielded." 1. Optical Fibre 2. Coaxial Cable 3. TWisted pair cabie 4. Microwaves | wer: 3. Twisted Pair Cable |
| 44 | Q.44. The term Cookie is defined as: 1. A computer cookie is a small file or data packet which is stored by a website on the server' s computer. 2. A cookie is edited only by the website that created it, the client's computer acts as a host to store the cookie. 3. Cookies are used by the user to store data on the computer. 4. A cookie is a security system to protect your data. | wer: 2. A cookie is edited only by the website that created it, the client’s |
| 45 | Q.45. Identify the concept behind the below-given scenario: If an attacker limits or stops an authorized user to access a service, device or any such resource by overloading that resource with illegitimate requests. 1. Snooping 2. Eavesdropping 3. Deniar or service 4. Plagiarism | wer: 3. Denial of Service |
| 46 | Q.46. The HTTPS based websites require: 1. Search Engine Optimization 2. Digital authencity 3. WWW Certificate 4. SSL Digital Certificate | wer: 4. SSL Digital Certificate |
| 47 | Q.47. State the output of the following query. SELECT ENGTH(MID('INFORMATICS PRACTICES',5,-5)); 1. NO OUTPUT 2. 5 3. 0 4. ERROR | wer: 4. ERROR |
| 48 | Q.48. Match List-I with List-II List-I List-I1 (A) group by (1) math function (B) mid) (II) aggregate function (C) count() (III) having (D) mod() (IV) text function Choose the correctanswer from the options given below: 1. (A) - (III), (B) - (IV), (C) - (II), (D) - (I) 2. (A) - (I), (B) - (III), (C) - (II), (D) - (IV) 3. (A) - (I), (B) - (II), (C) - (IV), (D) - (III) 4. (A) - (III), (B) - (IV), (C) - (I), (D) - (II) | wer: 1. (A) → (III), (B) → (IV), (C) → (II), (D) → (I) List-I |
| 49 | Q.49. What will be the format of the output of the NOW) function? 1. HH:MM:SS 2. YYYY-MM-DD HH:MM:SS 3. HH:MM:SS YYYY-MM-DD 4. YYYY-DD-MM HH:MM:SS | wer: 2. YYYY-MM-DD HH:MM:SS |
| 50 | Q.50. State the output of the following query: SELECT ROUND(9873.567,-2); 1.9900 2.9873 3.9800 4.9873.5 | wer: 1. 9900 ROUND(9873.567, -2) |
FAQs
- Are the CUET UG 2025 questions changed here? No. The original question wording is kept as close to the source paper as possible.
- What is simplified on these pages? Only the solutions are rewritten into easier, step-based explanations for students.
- How can students use these pages? They work well for quick revision, topic recall, mock practice, and answer-checking after solving the paper.