Category: M.Sc.CSIT

  • M.Sc. CSIT at Tribhuvan University: Admission Process, Eligibility, and Syllabus

    Introduction: The M.Sc. in Computer Science and Information Technology (M.Sc. CSIT) is a 2-year postgraduate program designed to provide in-depth knowledge and advanced skills in the field of computing and IT. The program is divided into 4 semesters, following a grading system (GPA) to assess student performance and academic excellence.

    To be eligible to appear in the final examinations, students are required to maintain at least 80% attendance in each subject throughout the semester. This attendance policy ensures that students actively participate in classes, gain hands-on learning, and engage with the curriculum effectively.

    The semester-based structure allows students to focus on a manageable workload while advancing through the program systematically. This approach not only enhances learning but also prepares students to tackle real-world challenges in the ever-evolving IT industry.

    For those aiming to excel in this program, regular attendance, active participation, and consistent effort are key to achieving success. The M.Sc. CSIT program is an ideal pathway for individuals aspiring to advance their careers in the rapidly growing field of technology!

    Eligibility and Admission Process for M.Sc. CSIT Program: To enroll in the M.Sc. CSIT program, applicants must hold a B.Sc. CSIT degree from Tribhuvan University (TU) or an equivalent qualification or with a Bachelor’s degree in Engineering (B.E.) specializing in Computer, Electronics and Communication, or Electrical are also eligible to apply.

    You Can Apply the Entrance Exam Form this Website ➡️ https://iost.tu.edu.np/ ⬅️. Go Entrance Exam Nav Bare Sections and Choose M.Sc. & Masters’ Degree Entrance drop Down Menu and Fill-up your Form.

    M.Sc. CSIT Program Total Seats: The M.Sc. CSIT program is conducted at the Central Campus of Tribhuvan University (TU), admitting 60 students annually out of them

    • 48 students are selected under the Open Quota, which is based solely on merit and performance in the entrance exam.
    • 12 students are admitted through the Samabeshi Quota, a reserved category like Madeshi, Janjati, Female, Dalit, Tharu and so on.

    Aspiring students should focus on their entrance exam preparation to secure admission to this prestigious program and become part of the vibrant academic community at Tribhuvan University.

    M.Sc. CSIT Program Fee Structure at Tribhuvan University: The fee for the M.Sc. CSIT program is charged on a per-semester basis, making it manageable for students. For the 2080 batch, the semester fee was set at Rs. 48,950. However, for the 2081 batch, the fee is expected to be approximately Rs. 50,000 per semester.

    On average, the total cost for completing the entire program is estimated to be around Rs. 2,00,000 or this could reach a maximum of Rs. 2,20,000, depending on any updates in the fee structure.

    This fee is quite reasonable compared to similar programs, especially considering the high-quality education and resources provided by Tribhuvan University. Prospective students are encouraged to plan their finances accordingly and reach out to the university for the most accurate and up-to-date information.

    Investing in this program not only boosts your academic credentials but also opens doors to advanced career opportunities in the field of Computer Science and Information Technology!

    M.Sc. CSIT Entrance Exam Syllabus: For M.Sc.CSIT Entrance Exam Syllabus Check it out from here ➡️https://entrancepreparationhub.com/m-sc-csit-entrance-exam/ ⬅️

    M.Sc. CSIT Entrance Exam Questions: For M.Sc.CSIT Entrance Exam Questions Check it out from here ➡️https://entrancepreparationhub.com/m-sc-csit-entrance-questions/ ⬅️

  • M.Sc.CSIT 2020 Entrance Exam Questions

    M.Sc. CSIT 2020 entrance exam questions and solutions are here to help you prepare effectively for your upcoming exams! 🚀 With this resource, you’ll have access to a complete collection of questions paired with detailed explanations, ensuring you understand every concept thoroughly.

    In this post, we provide the M.Sc. CSIT 2020 entrance questions in a structured format to help you:
    ✅ Gain a deep understanding of key concepts covered in the exam.
    ✅ Learn effective problem-solving techniques for tackling the M.Sc. CSIT 2020 entrance exam questions.
    ✅ Boost your preparation for future entrance exams with confidence.

    Our curated solutions for the M.Sc. CSIT 2020 entrance exam questions are designed to simplify complex problems, enhance your analytical skills, and provide clarity. Whether you’re revising for the exam or building a strong knowledge base, this resource is tailored to meet your academic needs.

    Why This Resource is Perfect for You:

    • Access accurate and detailed solutions for all M.Sc. CSIT 2020 entrance exam questions.
    • Improve your understanding of Computer Science and Information Technology fundamentals through these real exam examples.
    • Gain valuable insights into the exam pattern and strategies for solving the M.Sc. CSIT 2020 entrance exam questions with precision.

    Don’t miss this opportunity to strengthen your preparation! Dive into the M.Sc. CSIT 2020 entrance exam questions and solutions now, and take the next step toward acing your exam. 💡📘

    For Entrance Exam Syllabus Check this out https://entrancepreparationhub.com/m-sc-csit-entrance-exam/

    You Have only 2 hours

    Sorry Time up


    2020 Questions

    Welcome to the M.Sc. CSIT Entrance Preparation Website. You are about to take the exam based on the 2020 past year questions. For entrance exam syllabus check this one https://entrancepreparationhub.com/m-sc-csit-entrance-exam/

    1 / 100

    1. The values of h and k make the following system consistent is

    2×1 – x2 = h
    -6×1 + 3×2 = k

    2 / 100

    2.

    and the option are;

    Option

    3 / 100

    3.

    4 / 100

    4. If T(x1, x2) = (x1 + x2, x1 + 2×2, 3×1 + x2), then T

    5 / 100

    5.

    and the options are

    6 / 100

    6.

    and the options are

     

    7 / 100

    7.

    and the options are

    8 / 100

    8.

    9 / 100

    9.

    10 / 100

    10. The standard matrix of T:ℜ^2→ℜ^4, T(e1) = (1, 2, 0 , 5) and T(e2) = (3, -6, 1, 0) is

    and the options are

    11 / 100

    11. If f(x) = x^2– 1, g(x) = sinx, h(x) = x^2, then fogoh =

    12 / 100

    12.

    13 / 100

    13.

    14 / 100

    14. The slope of the tangent line to the curve y = 9 – 2x^2 at (2, 1) is

    15 / 100

    15. If f ’(x) = 12x^2+ 6x – 4 and f(0) = 2, then f(x) is

    16 / 100

    16. If the position (s, t) of a particle is given by the equation s = t^3– 3t^2+ 2t, then the velocity after 2 second is

    17 / 100

    17. The area of the region bounded by the parabola y = x^2 and y = 2x –x^2 is

    18 / 100

    18. If f(x, y) = x^3+ x^2y^2-2y^2, then fx(1, 2) is

    19 / 100

    19.

    20 / 100

    20. The power series expansion of e^t is

    and the options are

    21 / 100

    21. Which of the following statement is true?

    22 / 100

    22. Which one of the following is the execution order of commands in SQL query?

    23 / 100

    23. Which of the following normal form is based on the concept multi-valued dependency?

    24 / 100

    24. After successful completion, a transaction is in ___________ state.

    25 / 100

    25. Which of the following system development approach is appropriate if in which user requirements are certain and precise?

    26 / 100

    26. Which one of the following diagram is used for process modelling in structure
    development?

    27 / 100

    27. Single location installation is also called

    28 / 100

    28. A file organization in which the address for each row is determined using an algorithm is
    called

    29 / 100

    29. Which one of the following was an early packet-switched network and the first network
    to implement TCP/IP protocol suite?

    30 / 100

    30. Which of the following layer considers the functions that allows the data to move along
    different networks?

    31 / 100

    31. Which of the following subnet-mask is used if we divide a class C address into 8 subnets?

    32 / 100

    32. What is the header size of a UDP packet?

    33 / 100

    33. Which feature was already introduced before HTML5?

    34 / 100

    34. DOM stands for

    35 / 100

    35. Which of the following symbol describes class selector in CSS?

    36 / 100

    36. Number of incoming links (backlinks) is used for ……………..optimization.

    37 / 100

    37. Which one of the following is transitive rule?

    and the options are

    38 / 100

    38. Which one of the following is principle of inclusion and exclusion?

    39 / 100

    39. The number of colours required to colour a complete graph, Kn, is

    40 / 100

    40. Which one of the following statement is true?

    41 / 100

    41. A digital signature is

    42 / 100

    42. Which of the following register is loaded with the contents of the memory location
    pointed by PC?

    43 / 100

    43. A hexadecimal number A20 is equal to the octal number

    44 / 100

    44. In MS Word, borders can be applied to

    45 / 100

    45. Which of the following is executed by pre-processor?

    46 / 100

    46. Output of the following code is
    int main()
    {
    int a,b,c;
    a=5; b=10; c=a+b;
    printf(“%i”,c);
    return(0);
    }

    47 / 100

    47. In the following code “Hello World!” is printed
    int main()
    {
    int a=0;
    while (a++)
    printf(“Hello World!”);
    return(0);
    }

    48 / 100

    48. Which of the following ways are correct to comment out?

    49 / 100

    49. Can a DFA recognize palindromes?

    50 / 100

    50. A.A* can be expressed in the form of

    51 / 100

    51. A CFG is ambiguous if

    52 / 100

    52. A turing machine that can simulate other turing machines is called

    53 / 100

    53. Following are the ways to generate random numbers except 8

    54 / 100

    54. ___________ model follows the changes over time that results from the system activities.

    55 / 100

    55. Monte Carlo Simulation method got its name from

    56 / 100

    56. Which of the following statistical method is commonly used to analyze simulation result?

    57 / 100

    57. LR parser is a

    58 / 100

    58. Three address code involves

    59 / 100

    59. Consider a grammar
    S ::= bX | XYa
    X::= bYY | ɛ
    Y ::= cXYb
    What is First(S)?

    60 / 100

    60. A “decorated parse tree” is the output of

    61 / 100

    61. A binary search tree whose left sub tree and right sub tree differ in height by at most 1
    unit is called

    62 / 100

    62. The postfix form of the expression (A+ B)*(C*D- E)*F / G is

    63 / 100

    63. What’s happen if base condition is not defined in recursion?

    64 / 100

    64. Suppose we are sorting an array of eight integers using quicksort, and we have just
    finished the first partitioning with the array looking like this:2,5,1,7,9,12,11,10. Which statement is correct?

    65 / 100

    65. In which of the following method, we approximate the curve of solution by the tangent in each interval.

    66 / 100

    66. In general the ratio of truncation error to that of round off error is

    67 / 100

    67. The convergence of which of the following method is sensitive to starting value?

    68 / 100

    68. A partial differential equation requires

    69 / 100

    69. The method which is based on the principle of checking the visibility point at each pixel position on the projection plane are called

    70 / 100

    70. Reflection of a point about x-axis, followed by a counter-clockwise rotation of 90°, is
    equivalent to reflection about the line?

    71 / 100

    71. In Bresenham’s algorithm, while generating a circle, it is easy to generate?

    72 / 100

    72. Which algorithm is a faster method for calculating pixel positions?

    73 / 100

    73. Operation carried out by a NOT gate are also termed as

    74 / 100

    74. Logic circuit with only one output and one or more inputs is said to be

    75 / 100

    75. The output of NOR gate is

    76 / 100

    76. Which of the following adders can add three or more numbers at a time?

    77 / 100

    77. INTR is a ………………………

    78 / 100

    78. Which of the following instruction is not possible in 8085?

    79 / 100

    79. Which of the following statement is correct?

    80 / 100

    80. 8085 consists of ………………….. total number of instruction

    81 / 100

    81. The pipelining process is also called as ……………………

    82 / 100

    82. The addressing mode, where operand value is directly specified is ….

    83 / 100

    83. The transformation between the Parallel and serial ports is done with the help of

    84 / 100

    84. The sign followed by the string of digits is called as ………………..

    85 / 100

    85. Which of the following sorting methods would be most suitable for sorting a list which is almost sorted?

    86 / 100

    86. Heap is defined to be a …………………

    87 / 100

    87. Boolean satisfiability problem belongs to……………class.

    88 / 100

    88. Dynamic programming focuses on ……………….

    89 / 100

    89. The copy constructors can be used to ________

    90 / 100

    90. Class is _________ abstraction.

    91 / 100

    91. If class A is derived from another derived class B which is derived from class C, which class will have maximum level of abstraction?

    92 / 100

    92. Multiple catch blocks __________________

    93 / 100

    93. In operating system, when does round robin scheduling become FCFS

    94 / 100

    94. If a system has 1 GB RAM with a page size of 8KB and operating system occupies 16 MB of RAM, how many page frames does the system have for user process.

    95 / 100

    95. Threshing problem in operating system can be solved by using

    96 / 100

    96. Which of the following inter-process communication mechanism is most efficient in an operating system?

    97 / 100

    97. An admissible heuristic h(n) means:

    98 / 100

    98. What is the assumption of Naïve Bayes Document classification model:

    99 / 100

    99. In the expression “Grade(Brother(Jane))”, what does “Brother( )” represents:

    100 / 100

    100. The morphological analysis in Natural Language Processing deals with

    Your score is

    The average score is 47%

    0%