EMRS PGT Computer Science 2023
Question Paper
Leave a Comment / By LarasAcademy /
1. Which of the following is an invalid method/function in Python dictionary?
1. get( )
2. pop( )
3. popitem( )
4. remove( )
2. Select the correct output for the following python code.
for I in range (6, 1, -2):
print(end = ‘*$$’)
1. *
*$$
2. *
3. *
4. *
∗
:
*$$
3. For the following Python statement
Txt = list(‘PEACE’)
What shall be the output of print(Txt)?
1. Error in statement
2. [‘PEACE’]
3. [‘P’,’E’,’A’,’C’,’E’]
4. [P,E,A,C,E]
4. For the following Python statement
Msg = (‘Good Day’)
What shall be the data type of Msg ?
1. Error in statement
2. string
3. tuple
4. list
5. Which of the following will not run the loop statement an infinite number of
times in Python ?
1. while True :
print(“ALWAYS”)
2. while 1%1 :
print(“ALWAYS”)
3. while 21%2 :
print(“ALWAYS”)
4. while 21//2:
print(“ALWAYS”)
6. Given the following assignment of a variable
LS = [1,9,2,8,3,7,5,4]
What will be the output of the following ?
1. [4,7,8,9,1,2,3,5]
2. [9,8,7,4,5,3,2,1]
:
3. [5,3,2,1,9,8,7,4]
4. [1,2,3,5,4,7,8,9]
7. Which of the following is the correct syntax for panda’s dataframe ?
1. pandas.dataFrame(data, index, dtype, cpy)
2. pandas.DataFrame(data, index, dtype, cpy)
3. pandas.DataFrame(data, index, col, dtype, cpy)
4. pandas.DataFrame(data, index, row, dtype, cpy)
8. Which of the following options is true in Python ?
1. Logical errors can be handled using try. . . except
2. Syntex errors can be handled using try. . . except
3. Execution/Runtime errors can be handled using try. . . except
4. No erros can handled using try. . .except
9. Which out of the following module is required to be used to create a binary
file in Python ?
1. binfile
2. Binary
3. bin
4. pickle
10. A dictionary is declare as
D = {10 : ‘A’, 25 : ‘B’, 32 : ‘C’, 54 : ‘D’}
Which of the following is incorrect ?
1. D[32] += ‘*’
2. D[‘X’] = 100
3. D[20] = ‘E’
4. D[30] += 20
11. What will the following code result in ?
import pandas as pd
pd.Series([10,20], index = [‘A’,’B’,’C’]
1. IndexError
2. SyntaxError
:
3. ValueError
4. NameError
12. What is the output of the following ?
import pandas as pd
S1 = pd.Series ([100,200,300])
print(S1)
1. 1 100
2 200
3 300
dtype: float64
2. 0 100
1 200
2 300
dtype: int64
3. 1 100
2 200
3 300
dtype: int64
4. 0 100
1 200
2 300
dtype: float64
13. Consider the following Python code and answer the question givne below :
with open(“NOTES.TXT”,”r”) as F :
Line = F.readlines( )
______________# Statement 1
which of the follwing Python statement will find and display the number of
lines present in the file “NOTES. TXT”?
1. print(LINE.count(‘\n’))
2. print(LINE.len())
:
3. print(len(LINE))
4. print(LINE.count())
14. Which method out of the following is used to write a line of content in a CSV
file in a Python program ?
1. write
2. writeline
3. writer
4. writerow
15. Which method out of the following will allow the read operation from a
Binary file in a Python program ?
1. accept
2. load
3. read
4. input
16. Which of the following method is used to move the file pointer to read the
content from a specific position in a text file inside a Python program ?
1. find
2. seek
3. move
4. tell
17. Which out of the following mode is required to be used while opening a
binary file to allow read as well as write operations in a Python program ?
1. r+
2. rb+
3. ab
4. wb
18. Obseve the following flowchart and find the output.
:
1. 100
2. 160
3. 180
4. 120
19. The Boolean expression (A.B)’ is equivalent to :
1. A . B’
2. A’ + B’
3. A’ . B’
4. A + B’
20. Which of the following memory is non-volatile ?
1. ROM and Cache
2. RAM
3. ROM
4. Cache
21. Which is the Linux ?
1. Windows based Application Software
2. Proprietary Operating System
3. Open-source Operating System
4. Open-source Application Software
:
22. if ⊕ represents XOR Gate in Boolean algebra and A⊕B = C, then B⊕C equals to
:
1. A’
2. 0
3. 1
4. A
23. What is an interpreter ?
1. A program that converts a program into machine code line by line as
the program is run.
2. A program that writes instructions to perform.
3. A program that converts machine language to high-level language.
4. A program that converts whole of a program code into machine
language in one step.
24. Identify the Boolean expression from the given options, which is equivalent
to the Logic Circuit Diagram.
1. A + B’.C’ + D
2. (A.B’ + C’).D
3. (A + B’).C’ + D
4. A.B’ + C’.D
25. Identify the Boolean Gate, which represents the following truth table :
1. NAND
:
2. OR
3. XOR
4. NOR
26. What is the updated version of the IT Act, 2000 called?
1. Advanced IT Act, 2007
2. IT Act, 2007
3. IT Act, 2007
4. Advanced IT Act, 2000
27. Octal equivalent of the Binary number (10110)2 is:
1. 62
2. 16
3. 26
4. 52
28. Binary equivalent of the decimal number (11)10 is :
1. 1111
2. 1011
3. 1101
4. 1001
29. Intellectual Property Rights (IPR) protect the use of information and ideas
that are of :
1. Commercial value
2. Ethical value
3. Traditional value
4. Historical value
30. In Boolean algebra, A.(A+B) is logically equivalent to :
1. A + B
2. A
3. B
4. A.B
31. The decimal representation for the character ‘a’ (lower A) in ASCII is
:
________
1. 122
2. 65
3. 90
4. 97
32. Decimal equivalent of the hexadecimal number (ADD)16 is :
1. 2187
2. 2781
3. 2871
4. 2178
33. Considering the following dictionary :
Num = {10 : ‘Ten’, 100: ‘Hundred’, 10 : ‘Decimal’}
What shall be the output of print(Num) ?
1. {10 : ‘Decimal’, 100: ‘Hundred’}
2. Error
3. {10 : ‘Ten’, 100: ‘Hundred’,10 : ‘Decimal’}
4. {10 : ‘Ten’, 100: ‘Hundred’}
34. What minimum and the maximum values will be generated from the
following python statement ?
print (random.randrange(100)+1)
1. 1 and 99
2. 0 and 99
3. 1 and 100
4. 0 and 100
35. Identify the term, which is an unauthorized real-time interception, or
monitoring of private communication between two entities over network.
1. Snooping
2. Cyberstalking
3. Eavesdropping
4. Phishing
:
36. Identify the Logical Operator used in Python out of the following.
1. <=
2. +=
3. and
4. in
37. Which of the following Function Headers in a Python code will result in error
?
1. def Compu(X = 100, Y = 100, Z = 1) :
2. def Compu(X, Y = 10, Z = 1) :
3. def Compu(X = 100, Y = 10, Z ) :
4. def Compu(X, Y, Z = 1) :
38. Which of the following cannot be used as a valid identifier in Python ?
1. Name_1
2. FirstName
3. 1stName
4. Name1
39. Choose the best option to fill the blank correctly.
A ________________ is a human-friendly text form of the IP address.
1. Memory address
2. URL
3. domain name
4. MAC address
40. XML is designed to ________ and ________ data. Select the beast pair
of answers from the following options.
1. store, transport
2. format, design
3. design, transport
4. store, design
41. Identify the communication protocol, which establishes and dedicated and
direct connection between two communiting devices. This protocol defines
:
how to devices with authenticate each other and establish a direct link
between them to exchange the data.
1. TELNET
2. FTP
3. PPP
4. SMTP
42. Using join, which of the follwoing MySQL query is almost equivalent to :
SELECT NAME, MARKS FROM STUDENT, RESULT WHERE STUDENT.ROLL =
RESULT.ROLL;
1. SELECT NAME, MARKS FORM STUDENT NATURAL JOIN RESULT;
2. SELECT NAME, MARKS FROM STUDENT, RESULT;
3. SELECT NAME, MARKS FROM STUDENT JOIN RESULT;
4. SELECT NAME, MARKS FROM STUDENT EQUI JOIN RESULT;
43. Which datatype is mostly returned by fetchall( ) method in Python – MySQL
connectivitiy ?
Select the most common answer.
1. A list of dictionaries or an empty list, if no more rows are available.
2. A single tuples or an empty tuple, if no more rows are available.
3. A single list or an empty list, If no more rows are available.
4. A list of tuples are an empty list, If no more rows are available.
44. Which type of cable has high bandwidth supports high data transfer rate,
signals can travel longer distances and electromagnetic noise cannot affect
the cable, However expensive. Identify the transmission media.
1. Twisted pair cable.
2. Cat6 cable.
3. Coaxial cable.
4. Optical fiber.
45. Select the correct full form of the term ARPANET from the given options.
1. Advanced Research Programs Academic Network
2. Advanced Research Project Agency Network.
:
3. American Research Projects Advanced Network.
4. American Research Programs Advanced Network.
46. Identify the topology from the given options, which is a hierarchical topology
in which there are multiple branches, and each branch can have one or more
basic topologies, and are usually connect multiple LANs.
1. Start topology.
2. Mesh topology.
3. Bus topology.
4. Tree topology.
47. Identify the term from the given options, which is a small file or data packet
stored by a website on the client’s computer and used by the websites to
store browsing information of the user.
1. Spyware.
2. Trojan.
3. Firewall.
4. Cookies.
48. GPRS is basically standard barrier of.
1. 4G technology
2. 2G technology.
3. 2.5G technology.
4. 3G technology.
49. Which computer hardware device used to convert data from a digital format
into a format suitable for an analog transmission medium? Select the best
answer out of the given options.
1. Repeater
2. Hub.
3. Modem
4. Switch.
50. Identify the switching technique in which the message is sent in one go, but
it is divided into smaller pieces, and they are sent individually. The pieces
:
are given a unique number and adresses to identify their order at the
receiving end.
1. Binary switching
2. Circuit switching
3. Message switching
4. Packet switching
51. As per NEP 2020 from which class will vocational education be introduced?
1. Class 9
2. Class 6.
3. Class 7.
4. Class 8.
52. Ms Monica wants to introduce the topic on ‘Nutrition’ to her class three
students. She should :
1. Ask the students to open their tiffin boxes, see the contents and
discuss their advantages and disadvantages.
2. Draw the diagram of the digestive system on the blackboard.
3. Use chart showing different kinds of foods and their advantages.
4. Give examples of different foods rich in nutrients and their advantages.
53. The best method to teach the concept of the ‘germination of a seed’ is to :
1. Make students plant seeds and observe germination.
2. Show pictures of seed growth.
3. Provide detailed explanations.
4. Draw pictures on the board and give descriptions.
54. Which approach of learning out of the following, engages participants in
activity, leads them to reflect on the activity critically and obtain useful
insight and learning?
1. Observation.
2. Experiential learning.
3. Collaboration.
4. Passive learning.
:
55. Which of the following components of pre-service teacher education
program has granted scope for experiential learning?
1. Critical reading based on great thinkers work.
2. Internship through school attachment.
3. Pedagogy courses through use of critical thinking.
4. Foundation courses through critical exposure.
56. A school organizes an educational trip for middle school students to Jim
Corbett National Park. What would be the teachers advisory to the children
during the visit?
1. Observe keenly make note and share observations with other fellow
students and teachers.
2. Enjoy the trip along with fellow students.
3. Observe everything without asking questions about it.
4. Note down their doubts and ask the questions after reaching back.
57. What is the full form of ABC as per the NEP 2020 ?
1. Academic Bank of Credit.
2. Assessment Book of Certificates.
3. Assessment Book of Credits.
4. Academic Bank of Certificates.
58. What are the classes which cover at secondary stage according to NEP 2020
curriculum structure?
1. Class 9 to 10
2. Class 6 to 9
3. Class 9 to 12
4. Class 6 to 8
59. Which course will be discontinued as per National Education Policy 2020?
1. Ph.D.
2. Ed.D.
3. M.Ed.
4. M.Phil.
:
60. As per NEP 2020, students’ holistic multidimensional progress card will be
redesigned in which of the following format?
1. Comprehensive progress card.
2. Tabular progress card.
3. Continuous progress card.
4. 360-degree progress card.
61. Out of the following expressions, which one will not find the result as
Xraised to the power Y?
1. math.pow(X,Y)
2. X**Y
3. pow(X,Y)
4. power(X,Y)
62. Which out of the following is considered as a membership operator in
python ?
1. not
2. is
3. in
4. or
63. Which of the following is correct precedence of operators in Python?
1. not, Braces, or, and
2. Braces, not, and, or
3. Braces, or ,and, not
4. not, Braces, and, or
64. Withstring method out of the following will always break the string into
3parts in Python.
1. mid
2. split
3. break
4. partiton
65. Consider the following assignment for a List L.
:
L = [10, 20, 30, 40, 50, 60]
Which print statement option will display the content in the following way?
L = [60, 10, 20, 30, 40, 50]
1. print(L[len(L)-1] + L[l : len(L)])
2. print(L[-1], L[1 : ])
3. print(l[-1] + L[1:])
4. print(L[-1] + L[:len(L)-1])
66. What is the output of the following?
import numpy as np
A = np.array([[2,3],[10,20]])
print(A+1)
1. [ [ 2 3 ] ]
[11 21 ] ]
2. [ [ 3 3]
[11 20 ] ]
3. [ [ 3 4]
[10 20] ]
4. [ [ 3 4 ]
[11 21] ]
67. What will the following code result in?
import numpy as np
A = np.array([12,23])
B = np.array([10,20])
print(A – B)
1. [ [ 10 20]
[ 12 23] ]
2. [ 2 3]
3. [-2 -3]
4. [ [ 12 23]
[10 20] ]
:
68. What is the default color for matplotlib plots?
1. Black.
2. Red.
3. Blue.
4. Green.
69. Which module is required to be imported in a Python program to use mean,
median and mode methods?
1. standard
2. math
3. stats
4. statistics
70. Which of the following is false about global variables in Python?
1. global keyboard is a must for first time of assignment of a global
variable.
2. global variables can be accessed anywhere in the program.
3. global immutable variables require global keyword inside function.
4. global mutable variables don’t require global keyword inside function.
71. What is the purpose of legend( ) function in matplotlib ?
1. To label different lines or markers on a plot.
2. To label the X and Y axis of a plot.
3. To add a title to a plot.
4. To add annotations to a plot.
72. Observe the following graph and find the missing statement in the Python
code.
import matplotlib.pyplot as pl
_____________________
pl.show( )
:
1. pl.plot( [5, 2, 3, 1] )
2. pl.line( [5, 2, 3, 1] )
3. pl.bar( [5, 2, 3, 1] )
4. pl.scatter( [5, 2, 3, 1] )
73. The number of attributes in a relation is called the __________of
relation.
1. Cardinality.
2. Tuples.
3. Degree.
4. Domain.
74. Find the number of rows and columns of Cartesian product of two tables If
the number of rows and columns of the first table is 2 and 3 respectively,
and the number of rows and columns of the second table is 4 and 5
respectively.
1. Number of rows = 8 & Number of columns = 15
2. Number of rows = 6 & Number of columns = 15
3. Number of rows = 8 & Number of columns = 8
4. Number of rows = 6 & Number of columns = 8
75. Identify the key, which is a column (or attribute) or a group of columns in a
:
table in RDBMS that is used to unique identify the rows of data in that table.
1. Candidate key
2. Primary key
3. Alternate key
4. Foreign key
76. Which command in mySQL is used to list all (non temporary) tables in a
given database.?
1. VIEW TABLES
2. SHOW TABLES
3. DESCRIBE TABLES
4. DISPLAY TABLES
77. Which of the following is not true for VARCHAR data type in MySQL ?
1. Generally faster compared to CHAR data type.
2. Variable character data type.
3. A set of character data of Indeterminate length.
4. Generally memory efficient compared to CHAR data type.
78. Identify the output value (ignoring the output header) of the MySQL query.
SELECT 6 mod 20;
1. 20
2. 2
3. 3
4. 6
79. Which of the following MySQL query is syntactically correct and most
preferred one?
1. SELECT SECTION, COUNT(*) FROM STUDENT WHERE MARKS < 33 GROUP
BY SECTION HAVING COUNT(*) >0 ORDER BY SECTION;
2. SELECT SECTION, COUNT(*) FROM STUDENT GROUP BY SECTION WHERE
MARKS<33 AND COUNT(*)>0 ORDER BY SECTION;
3. SELECT SECTION, COUNT(*) FROM STUDENT ORDER BY SECTION GROUP
BY SECTION WHERE MARKS < 33 AND COUNT(*) > 0;
:
4. SELECT SECTION, COUNT(*) FROM STUDENT WHERE MARKS<33 HAVING
COUNT(*) > 0 GROUP BY SECTION ORDER BY SECTION;
80. Which of the following MySQL query will display all the name from the table
STUDENT, which are having maximum five characters and starting with the
alphabet ‘A’?
1. SELECT NAME FROM STUDENT WHERE NAME = ‘A%%%%’;
2. SELECT NAME FROM STUDENT WHERE NAME LIKE ‘A%%%%’;
3. SELECT NAME FROM STUDENT WHERE NAME LIKE ‘A_ _ _ _’;
4. SELECT NAME FROM STUDENT WHERE NAME =’A_ _ _ _’;
Previous Post
Next Post
Related Posts
UGC – NET Computer Science December 2010 – Paper – II
Leave a Comment / Previous Papers, UGC - NET Computers Previous Papers / By
LarasAcademy
UGC – NET Computer Science June 2011 – Paper – II
Previous Papers, UGC - NET Computers Previous Papers / By LarasAcademy
:
Leave a Comment
Your email address will not be published. Required fields are marked *
Type here..
Name*
Email*
Website
Save my name, email, and website in this browser for the next time I
comment.
Post Comment »
:
Copyright © 2025
: