Gupta Tutorial

M.Sc.CSIT 2020 Entrance Exam Questions

M.Sc. CSIT 2020 entrance exam questions and solutions are here to help you prepare effectively for your upcoming exams! 🚀 With this resource, you’ll have access to a complete collection of questions paired with detailed explanations, ensuring you understand every concept thoroughly.

In this post, we provide the M.Sc. CSIT 2020 entrance questions in a structured format to help you:
✅ Gain a deep understanding of key concepts covered in the exam.
✅ Learn effective problem-solving techniques for tackling the M.Sc. CSIT 2020 entrance exam questions.
✅ Boost your preparation for future entrance exams with confidence.

Our curated solutions for the M.Sc. CSIT 2020 entrance exam questions are designed to simplify complex problems, enhance your analytical skills, and provide clarity. Whether you’re revising for the exam or building a strong knowledge base, this resource is tailored to meet your academic needs.

Why This Resource is Perfect for You:

  • Access accurate and detailed solutions for all M.Sc. CSIT 2020 entrance exam questions.
  • Improve your understanding of Computer Science and Information Technology fundamentals through these real exam examples.
  • Gain valuable insights into the exam pattern and strategies for solving the M.Sc. CSIT 2020 entrance exam questions with precision.

Don’t miss this opportunity to strengthen your preparation! Dive into the M.Sc. CSIT 2020 entrance exam questions and solutions now, and take the next step toward acing your exam. 💡📘

For Entrance Exam Syllabus Check this out https://entrancepreparationhub.com/m-sc-csit-entrance-exam/

You Have only 2 hours

Sorry Time up


2020 Questions

Welcome to the M.Sc. CSIT Entrance Preparation Website. You are about to take the exam based on the 2020 past year questions. For entrance exam syllabus check this one https://entrancepreparationhub.com/m-sc-csit-entrance-exam/

1 / 100

1. The values of h and k make the following system consistent is

2x1 – x2 = h
-6x1 + 3x2 = k

2 / 100

2.

and the option are;

Option

3 / 100

3.

4 / 100

4. If T(x1, x2) = (x1 + x2, x1 + 2x2, 3x1 + x2), then T

5 / 100

5.

and the options are

6 / 100

6.

and the options are

 

7 / 100

7.

and the options are

8 / 100

8.

9 / 100

9.

10 / 100

10. The standard matrix of T:ℜ^2→ℜ^4, T(e1) = (1, 2, 0 , 5) and T(e2) = (3, -6, 1, 0) is

and the options are

11 / 100

11. If f(x) = x^2– 1, g(x) = sinx, h(x) = x^2, then fogoh =

12 / 100

12.

13 / 100

13.

14 / 100

14. The slope of the tangent line to the curve y = 9 – 2x^2 at (2, 1) is

15 / 100

15. If f ’(x) = 12x^2+ 6x – 4 and f(0) = 2, then f(x) is

16 / 100

16. If the position (s, t) of a particle is given by the equation s = t^3– 3t^2+ 2t, then the velocity after 2 second is

17 / 100

17. The area of the region bounded by the parabola y = x^2 and y = 2x –x^2 is

18 / 100

18. If f(x, y) = x^3+ x^2y^2-2y^2, then fx(1, 2) is

19 / 100

19.

20 / 100

20. The power series expansion of e^t is

and the options are

21 / 100

21. Which of the following statement is true?

22 / 100

22. Which one of the following is the execution order of commands in SQL query?

23 / 100

23. Which of the following normal form is based on the concept multi-valued dependency?

24 / 100

24. After successful completion, a transaction is in ___________ state.

25 / 100

25. Which of the following system development approach is appropriate if in which user requirements are certain and precise?

26 / 100

26. Which one of the following diagram is used for process modelling in structure
development?

27 / 100

27. Single location installation is also called

28 / 100

28. A file organization in which the address for each row is determined using an algorithm is
called

29 / 100

29. Which one of the following was an early packet-switched network and the first network
to implement TCP/IP protocol suite?

30 / 100

30. Which of the following layer considers the functions that allows the data to move along
different networks?

31 / 100

31. Which of the following subnet-mask is used if we divide a class C address into 8 subnets?

32 / 100

32. What is the header size of a UDP packet?

33 / 100

33. Which feature was already introduced before HTML5?

34 / 100

34. DOM stands for

35 / 100

35. Which of the following symbol describes class selector in CSS?

36 / 100

36. Number of incoming links (backlinks) is used for .................optimization.

37 / 100

37. Which one of the following is transitive rule?

and the options are

38 / 100

38. Which one of the following is principle of inclusion and exclusion?

39 / 100

39. The number of colours required to colour a complete graph, Kn, is

40 / 100

40. Which one of the following statement is true?

41 / 100

41. A digital signature is

42 / 100

42. Which of the following register is loaded with the contents of the memory location
pointed by PC?

43 / 100

43. A hexadecimal number A20 is equal to the octal number

44 / 100

44. In MS Word, borders can be applied to

45 / 100

45. Which of the following is executed by pre-processor?

46 / 100

46. Output of the following code is
int main()
{
int a,b,c;
a=5; b=10; c=a+b;
printf(“%i”,c);
return(0);
}

47 / 100

47. In the following code “Hello World!” is printed
int main()
{
int a=0;
while (a++)
printf(“Hello World!”);
return(0);
}

48 / 100

48. Which of the following ways are correct to comment out?

49 / 100

49. Can a DFA recognize palindromes?

50 / 100

50. A.A* can be expressed in the form of

51 / 100

51. A CFG is ambiguous if

52 / 100

52. A turing machine that can simulate other turing machines is called

53 / 100

53. Following are the ways to generate random numbers except 8

54 / 100

54. ___________ model follows the changes over time that results from the system activities.

55 / 100

55. Monte Carlo Simulation method got its name from

56 / 100

56. Which of the following statistical method is commonly used to analyze simulation result?

57 / 100

57. LR parser is a

58 / 100

58. Three address code involves

59 / 100

59. Consider a grammar
S ::= bX | XYa
X::= bYY | ɛ
Y ::= cXYb
What is First(S)?

60 / 100

60. A “decorated parse tree” is the output of

61 / 100

61. A binary search tree whose left sub tree and right sub tree differ in height by at most 1
unit is called

62 / 100

62. The postfix form of the expression (A+ B)*(C*D- E)*F / G is

63 / 100

63. What’s happen if base condition is not defined in recursion?

64 / 100

64. Suppose we are sorting an array of eight integers using quicksort, and we have just
finished the first partitioning with the array looking like this:2,5,1,7,9,12,11,10. Which statement is correct?

65 / 100

65. In which of the following method, we approximate the curve of solution by the tangent in each interval.

66 / 100

66. In general the ratio of truncation error to that of round off error is

67 / 100

67. The convergence of which of the following method is sensitive to starting value?

68 / 100

68. A partial differential equation requires

69 / 100

69. The method which is based on the principle of checking the visibility point at each pixel position on the projection plane are called

70 / 100

70. Reflection of a point about x-axis, followed by a counter-clockwise rotation of 90°, is
equivalent to reflection about the line?

71 / 100

71. In Bresenham's algorithm, while generating a circle, it is easy to generate?

72 / 100

72. Which algorithm is a faster method for calculating pixel positions?

73 / 100

73. Operation carried out by a NOT gate are also termed as

74 / 100

74. Logic circuit with only one output and one or more inputs is said to be

75 / 100

75. The output of NOR gate is

76 / 100

76. Which of the following adders can add three or more numbers at a time?

77 / 100

77. INTR is a ...........................

78 / 100

78. Which of the following instruction is not possible in 8085?

79 / 100

79. Which of the following statement is correct?

80 / 100

80. 8085 consists of ....................... total number of instruction

81 / 100

81. The pipelining process is also called as ........................

82 / 100

82. The addressing mode, where operand value is directly specified is ....

83 / 100

83. The transformation between the Parallel and serial ports is done with the help of

84 / 100

84. The sign followed by the string of digits is called as ....................

85 / 100

85. Which of the following sorting methods would be most suitable for sorting a list which is almost sorted?

86 / 100

86. Heap is defined to be a .....................

87 / 100

87. Boolean satisfiability problem belongs to...............class.

88 / 100

88. Dynamic programming focuses on ...................

89 / 100

89. The copy constructors can be used to ________

90 / 100

90. Class is _________ abstraction.

91 / 100

91. If class A is derived from another derived class B which is derived from class C, which class will have maximum level of abstraction?

92 / 100

92. Multiple catch blocks __________________

93 / 100

93. In operating system, when does round robin scheduling become FCFS

94 / 100

94. If a system has 1 GB RAM with a page size of 8KB and operating system occupies 16 MB of RAM, how many page frames does the system have for user process.

95 / 100

95. Threshing problem in operating system can be solved by using

96 / 100

96. Which of the following inter-process communication mechanism is most efficient in an operating system?

97 / 100

97. An admissible heuristic h(n) means:

98 / 100

98. What is the assumption of Naïve Bayes Document classification model:

99 / 100

99. In the expression “Grade(Brother(Jane))”, what does “Brother( )” represents:

100 / 100

100. The morphological analysis in Natural Language Processing deals with

Your score is

The average score is 48%

0%

Leave a Comment