>
Tamil Nadu Common Entrance Test
List of top Questions asked in Tamil Nadu Common Entrance Test
Which one of the following is the ability to represent all kinds of knowledge that are needed in that domain?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Artificial Intelligence
For a function of two variables, boundary value analysis yields:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
The reason for the uncertainty in the Wumpus World Problem is that the agent’s sensor provides only the following information.
TANCET - 2024
TANCET
Computer Science and IT Engineering
Artificial Intelligence
If \( P \) is risk probability, \( L \) is loss, then Risk Exposure (RE) is computed as:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
The number of levels used in defining a knowledge-based agent is
TANCET - 2024
TANCET
Computer Science and IT Engineering
Artificial Intelligence
Which test refers to the retesting of a unit, integration and system after modification, in order to ascertain that the changes have not introduced new faults?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
All activities lying on the critical path have slack time equal to:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stuffing is 01111100101, then the input bit-string is
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Networks
Which of the following is a semi join?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
If 5 TCP segments of 100-byte MSS are sent consecutively, starting with sequence number 101, 201, 301, 401, and 501, and if the first segment is lost, the ACKs returned will have ACK numbers as:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Networks
Which of the following is not a clustering method?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
Which of the following is the characteristic of RAID-5?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
The transfer function of a Butterworth filter is given by:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
What is the maximum size of data that the application layer can pass on to the TCP layer below?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Networks
Low pass Butterworth filters are:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
The number of additions required to compute N-point DFT using radix-2 FFT is given by:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
A channel has \( B = 4 \) KHz, what is the channel capacity having the signal-to-noise ratio of 20 dB?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Networks
Fast Fourier Transform algorithms exploit:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
What is the formula for Hit Ratio?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Organization and Architecture
The elimination stage of WAR and WAW hazards is often called:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Organization and Architecture
In the absolute addressing mode:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Organization and Architecture
A greedy algorithm is an approach for solving a problem by:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Algorithm design techniques
Recursive algorithm like Merge Sort cannot use Dynamic Programming because:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Algorithm design techniques
What is the recurrence for the worst case of quicksort, and what is the time complexity in the worst case?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Algorithm design techniques
Let \( S \) be an NP-complete problem and \( Q \) and \( R \) be two other problems not known to be in NP. \( Q \) is polynomial-time reducible to \( S \) and \( S \) is polynomial-time reducible to \( R \). Which one of the following statements is true?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Algorithm design techniques
Prev
1
2
3
4
...
8
Next