>
Computer Science and IT Engineering
List of top Computer Science and IT Engineering Questions
Which of the following statements is true about the distributed system?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Distributed Systems
Which of the following computing models is not an example of a distributed computing environment?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Distributed Systems
Which of the following models has the most stringent consistency requirement and is also called the strongest form of memory coherence?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Distributed Systems
When the physical location of the file changes in a distributed file system:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Distributed Systems
The number of additions required to compute N-point DFT using radix-2 FFT is given by:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
The transfer function of a Butterworth filter is given by:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
Fast Fourier Transform algorithms exploit:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
Low pass Butterworth filters are:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
The CREATE TRIGGER statement is used to create the trigger. THE _________ clause specifies the table name on which the trigger is to be attached. The ___________ pecifies that this is an AFTER INSERT trigger.
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
Which of the following is a semi join?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
Which of the following is not a clustering method?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
Which of the following is the characteristic of RAID-5?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
All activities lying on the critical path have slack time equal to:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
If \( P \) is risk probability, \( L \) is loss, then Risk Exposure (RE) is computed as:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
For a function of two variables, boundary value analysis yields:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
Which test refers to the retesting of a unit, integration and system after modification, in order to ascertain that the changes have not introduced new faults?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
Which one of the following multiplexing techniques cannot be used for analog signals?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Mobile Computing
In a wireless network, an extended service set is considered to be a set of
TANCET - 2024
TANCET
Computer Science and IT Engineering
Mobile Computing
The radius within which the receiver receives the signals with an error rate low enough to be able to communicate and can also act as a sender is:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Mobile Computing
Delay spread in signal propagation is due to:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Mobile Computing
Which of the following methods provides a one-time session key for two parties?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Security In Computing
Which one of the following options contains the list of escape characters in the HTML escape function?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Security In Computing
Prev
1
2
3
4
Next