Select Goal &
City
Select Goal
Search for Colleges, Exams, Courses and More..
Write a Review
Get Upto ₹500*
Explore
Explore More
Study Abroad
Get upto 50% discount on Visa Fees
Top Universities & Colleges
Abroad Exams
Top Courses
Exams
Read College Reviews
News
Admission Alerts 2024
Education Loan
Institute (Counselling, Coaching and More)
Ask a Question
College Predictor
Test Series
Practice Questions
Course Finder
Scholarship
All Courses
B.Tech
MBA
M.Tech
MBBS
B.Com
B.Sc
B.Sc (Nursing)
BA
BBA
BCA
Course Finder
No Data Found
>
Common University Entrance Test
>
Informatics Practices
List of top Informatics Practices Questions asked in Common University Entrance Test
In data processing cycle after generating output, data is summarized using some statistical techniques. Choose the technique that is not used for Data summarization from the options given below
(A) Mean
(B) Matplotlib
(C) Mode
(D) Rank
(E) Numpy
Choose the correct answer from the options given below :
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Plotting Data using Matplotlib
is a combination of hardware and software which tulfill request by the web browser.
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Web browser
Which of the following are true about cookies.
(A) A cookie is a text file containing a string of information which is transferred by the website to the Browser when we browse it.
(B) The information stored is retransmitted to the server.
(C) It helps in customizing the information that will be displayed.
(D) Cookies are always harmless.
(E) First cookie software was created in 1994 at Netscape.
Choose the
correct
answer from the options given below :
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Web browser
A scenario wherein a hacker limit or stop an authorised used to access service, device or other resource by overloading that resource with illegitimate request -
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Commands and Requests
Which of the following are correct about firewall ?
A. Firewall can be implemented only in software
B. Firewall can be implemented only in hardware
C. Firewall can be implemented both hardware as well as software
D. Firewall can be implemented among two or more networks
E. Firewall acts as a first barrier against malware
Choose the correct answer from the options given below :
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Software Development Models
The File Transfer Protocol (FTP) requires a reliable transport service. Which protocol of the TCP/IP suite does it use ?
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Basic of IP support protocols
When a hacker uses knowledge to find and help in fixing the security flaws in the system is called -
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Network Security
A ______ is a hardware device or software program that prevents unwanted traffic.
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Software Testing
Which of the following is measured in Kbps, Mbps and Gbps ?
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Memory Management
To define the limit of axes of a chart, which function can be used ?
CUET (UG) - 2023
CUET (UG)
Informatics Practices
types of functions
Match List I with List II
List I
List II
A.
IP Address
I.
www.ncert.nic.in
B.
URL
II.
FC:FS:AE:CE:7B:16
C.
Domain Name
III.
https:/www.cbse.nic.in/skillsubject
D.
MAC
IV.
164.100.163.65
Choose the correct answer from the options given below :
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Web browser
A sender wants to transmit their data at the rate of 3200 bit-per 16 second. What will be the data rate of the channel ?
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Data Handling
The number of pins in an RJ45 connector is :
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Connections
What is the full form of OGD ?
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Data Handling
Match List I with List II
List I
List II
A.
Mesh
I.
nodes connected linearly
B.
Bus
II.
n connections
C.
ring
III.
central device connected to all nodes
D.
star
IV.
(n*(n-1))/2 connections
Choose the correct answer from the options given below :
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Connections
Modulation is the process of ______
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Transmission Lines
____ is a unique address that can be used to uniquely identify each node in the network.
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Web browser
_____ is not a Temporary fastener.
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Structural Fasteners
Choose the Correct statement for the given figure:
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Horizontal and vertical curves
Choose the Correct statement for the given figure:
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Pressure Force on Curved Surface
Choose the Correct statement for the given figure:
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Parallel Lines
Choose the Correct statement for the given figure:
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Perpendicular from the Centre to a Chord
_____ is used for drawing isometric projection.
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Isometric Projection
Consider the following series:
SeriesA = pd.series([1, 2, 3, 4, 5], index = ['a', 'b', 'c', 'd', 'e'])
SeriesB = pd.series([10, 20, -10, -50, -100], index=['z', 'y', 'a', 'c', 'e'])
Based on the above paragraph answer the following questions:
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Reading Comprehension
Read the passage carefully and answer the question based on the passage :
In the current digital era we are familiar with different kinds of social media. These are the websites that enable users to participate in social networking by creating and sharing contents with others in the community. In this way users can interact with others online users of those social media apps. There are certain etiquettes which need to be followed on social media too, because whenever we surf the internet we leave a trail of the activities we perform online. When the computer and network is used as a tool to perform criminal activities or offences can be considered as cyber crime like hacking, phishing, spamming. We should be careful as excessive usage of digital devices has a negative impact on our physical as well as psychological well being.
CUET (UG) - 2023
CUET (UG)
Informatics Practices
Reading Comprehension
Prev
1
2
3
Next