>
Tamil Nadu Common Entrance Test
List of top Questions asked in Tamil Nadu Common Entrance Test
Consider a binary Max-heap implemented using an array. Which one of the following arrays represents a binary Max-heap?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Programming and Data Structures
A B-tree of minimum degree \( t \) can have a maximum of _________ pointers in a node.
TANCET - 2024
TANCET
Computer Science and IT Engineering
Programming and Data Structures
The number of trees in a binomial heap with \( n \) nodes is:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Programming and Data Structures
What is the recurrence for the worst case of quicksort, and what is the time complexity in the worst case?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Algorithm design techniques
Let \( S \) be an NP-complete problem and \( Q \) and \( R \) be two other problems not known to be in NP. \( Q \) is polynomial-time reducible to \( S \) and \( S \) is polynomial-time reducible to \( R \). Which one of the following statements is true?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Algorithm design techniques
Recursive algorithm like Merge Sort cannot use Dynamic Programming because:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Algorithm design techniques
A greedy algorithm is an approach for solving a problem by:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Algorithm design techniques
In the absolute addressing mode:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Organization and Architecture
The elimination stage of WAR and WAW hazards is often called:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Organization and Architecture
What is the formula for Hit Ratio?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Organization and Architecture
The Sun Microsystems processors usually follow ________ architecture.
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Organization and Architecture
The number of additions required to compute N-point DFT using radix-2 FFT is given by:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
The transfer function of a Butterworth filter is given by:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
Fast Fourier Transform algorithms exploit:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
Low pass Butterworth filters are:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
What is the maximum size of data that the application layer can pass on to the TCP layer below?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Networks
A channel has \( B = 4 \) KHz, what is the channel capacity having the signal-to-noise ratio of 20 dB?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Networks
A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stuffing is 01111100101, then the input bit-string is
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Networks
If 5 TCP segments of 100-byte MSS are sent consecutively, starting with sequence number 101, 201, 301, 401, and 501, and if the first segment is lost, the ACKs returned will have ACK numbers as:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Networks
The CREATE TRIGGER statement is used to create the trigger. THE _________ clause specifies the table name on which the trigger is to be attached. The ___________ pecifies that this is an AFTER INSERT trigger.
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
Which of the following is a semi join?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
Which of the following is not a clustering method?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
Which of the following is the characteristic of RAID-5?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
All activities lying on the critical path have slack time equal to:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
If \( P \) is risk probability, \( L \) is loss, then Risk Exposure (RE) is computed as:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
Prev
1
...
50
51
52
53
54
...
59
Next