Advance Topics -2016 24 Jun,2021 boomtecho2@gmail.comLeave a comment 1. coordinates of window are known as : System Coordinates World Coordinates Device Coordinates Cartesian Coordinates 2. Identify Line Clipping algorithm from the following: Cohen-Sutherland Algorithm Liang-Barsky Algorithm Nicholl-Lee -Nicholi clipping All of the above 3. According to Cohen-Sutherland Algorithm a fine is completely outside the window is : The region codes of line endpoints have a “i” in same bit position. The endpoints region code are non-zero values If L bit and R bit are non-Zero The region codes of line endpoints have a ‘o’ in same bit position. 4. Sutherland -Hodgeman algorithm works well for__ Concave polygon Convex-polygon Smooth curves Line segment 5. Smallest size object that can be displayed on a monitor is called : Picture element Point Dot Pitch Aspect ratio 6. The distance from one pixel to the next pixel is called: Resolution Pix map PPI Dot pitch 7. The Shortest Distance between any two dots of the same color is called : Resolution Pixel Depth PPI Dot Pitch 8. The standard aspect ratio for PC is —— 6:5 4:3 3:2 5:3 9. Intensity representation of an image is called : Frame Buffer Picture definition Display list Brightness 10. In random Scan display ,the frame buffer holds….. Line drawing commands Scanning Instructions Image Resolution Intensity Information 11. The fundamental geometric transformations are as follows: Translation Scalling Rotation All of the above 12. Which technique of color CRT is used for production of realistic Image: Beam Penetration Shadow Mask Both A and B None of the Above 13. The transformation in which an Object is moved in a minimum distance path from one position to another is called : Rotation Replacement Translation Scalling 14. the process of mapping a world window in world coordinate system to viewport are called: Transformation viewing viewport Clipping window Screen coordinate system 15. The Process of extracting a portion of a database or a picture inside or outside a specified region are called : Transformation Projection Clipping Mapping 16. Beam Penetration Method is usually used in……. LCD Raster Scan Display Random Scan Display DVST 17. DVST Stands For : Digital View Storing table Direct Visual Storge Tube Direct View Storage tube Digital view Storage tube 18. The Purpose of flood gun in DVST is : To Store the picture pattern TO slow down the flood electrons TO focus the electron beam To Enable color Pixels 19. The Translation Distances (dx,dy) is called as: Translation Vector Shift Vector Both A and B Neither A and B 20. The Viewer of a multimedia project to control what and when the elements are delivered it is called ………. Interactive Multimedia Selective Multimedia On screen Multimedia Portable multimedia 21. Multimedia elements are typically joined together into a project using : Authoring tools Multimedia tools Audio tools Vedio tools 22. HTML And DHTML web pages or site are generally viewed using a …………….. Browser Software Compiler Script 23. ____________ refers to any type of application or presentation that involves more than one type of media, such as text, graphics, video, animation, and sound: A executable file Desktop publishing Multimedia Hyper text 24. One of the disadvantage of multimedia is : Cost Adaptability Usability Relativity 25. The text color in a presentation should contrast with the ……………………color . CPU Frame Stock Background 26. Image Include in many software titles are called ………………………. Clipart Popups Jpg file tift files 27. The process of planning your multimedia presentation is known as a : Design Story board Development layout 28. Programming contain(s): Printed language and synthesized speech Manipulation of physical object Locomotion All of the above 29. Digital Signature is : Scanned signature Signature in binary from Signature information Hand written signature 30. Digital Signature is : Scanned signature Signature in binary from Signature information Hand written signature 31. Tool that is used to transfer data /files among computers on the internet: FTP Archive TCP Gopher 32. Collection of interconnected networks sometimes called : Internet Wireless Mobile network None of the above 33. The digital information or software on DVD is typically multiplexed audio , image text and video data optimized for motion picture display using : IPEG encoding JPEG Encoding AV Encoding MPEG Encoding 34. When a program assign 8 bits to a pixel that pixel can display one of up to : 32 64 256 1024 35. A digital photography is a : Resolution graphics Raster Graphics Bitmapped Graphics Raster Image 36. CAD Software is primarilly used in : Engineering Software Development Desktop publishing Accountion 37. Full form of CAM is : Computer Assisted manufacturing Computer Application and manifestation computer -aided manufacturing Computer -application and marketing 38. We can divide audio and video services into : 1 broad categories 2 broad categories 3 broad categories 4 broad categories 39. What is Artificial Intelligence : Putting your intelligence into computer Programming with your own intelligence making a machine intelligent Playing a game 40. Which is not the commonly used programming language for AI: PROLOG JAVA LISP PED 41. Fuzzy logic is a form of : Two-valued logic crisp -set logic many valued logic Binary -set logic 42. Fuzzy logic usually represented as: If -then else rules If-then-rules Both A and B none of the above 43. ………………..is/are the way(s) to represent uncertainty : Fuzzy logic Probability Entropy All of the Above 44. In which way does the ‘combined encryption’ combine symmetric and asymmetric encryption ? First, the message and encrypted with symmetric encryption and afterwords it is encrypted asymmetrically together with the key The secret key is symmetrically transmitted the message itself asymmetrically First, the message is encrypted with asymmetric encryption and afterwards it is encrypted symmetricall together with the key The secret key is asymmetrically transmitted the message it self symmetrically 45. Strong Artificial Intelligence is : The combodiment of human intelligence capabilities within computer A set of computer programs that produce output that would be considered to reflect intelligence it were generated by humans. The Study of mental facilities through the use of mental models implemented on a computerb. All of the Above 46. A deadlock exists in the system if and only if the wait-for graph contains a ___________ Cycle Direction Bi-Direction Rotation 47. CPU fatches the Instruction from memoory according to the value of : Program counter Status register program status work Instruction register 48. Run time mapping from virtual to physical address is done by : Memory Management Unit CPU PCI None of the Above 49. The Address of the page table in memory is pointed by : Stack pointer Page table based register Page register program counter 50. In Contiguous memory allocation : Each process is contained in a single contiguous section of memory All process are contained in a single contiguous section of memory The memory space is contiguous none of the above 51. When memory is divided into several fixed sized partitions ,each partition may contain……. Exactly one process at least one process Multiple processes at once none 52. The first fit best and worst fit are strategies to select a……….. Process from a queue to put in memory Process to run the next process Free hole from a set of available hole All of the above 53. Which of these an example of a virtual resource : Print server Virtual machine Virtual memory All of the above 54. Interval between the time of submission and completion of the job is called : Waiting time though put turnaround time Resource time 55. A program execution time is called : process function CPU Memory 56. A set of techniques that allow to execute a program which is not entirely in memory is called : Demand paging Virtual paging Auxiliary memory Second memory 57. What is shell in Operating system It is a Hardware component It is a command interpreter It is a part of compiler It is a tool in CPU scheduling 58. A Logical Address generated by CPU consists of : Page address and page offset Page address and page value Page offset and default page page number and page offset 59. A computer system that permits multiple users to run program at same time : Real Time system Multiprogramming system Time sharing system multi testing system 60. Which concept explains the working of an operating system : It is event deriven It is object orieted It is procedure based system software It is a collection of procedures that interact with each other 61. Which of the following is the feature of operating system? Accessibility Portability Reliability All of the above 62. What is the drawback of banker’s Algorithm : In Advance processes rerely know that how much resources they will need The number of process changes as time progresses Resources once available can disappear All of the above 63. A deadlock state can be changed back to stable by using …..statement Commit Roll Back Dead lock save point 64. What are the ways of dealing with deadlock : Deadlock Recovery Deadlock prevention Deadlock detection All of the above 65. Full form of GIF is : Global Image Format Graphics Interchange Format Graphics Image Format None of the Above 66. The transformation in which an object is moved from one position to another in circular path around a specified pivot point is called: Rotation Shearing Translation Scalling 67. Which technique of color CRT is used for production of realistic Image : Beam Penetration Shadow Mask Both A and B None of the above 68. The process of Calculating the production of matrices of number of transformation in sequence is called …….. Concatenation Continuation mixing None of the Above 69. The Point about which an object is rotated is called : Fixed Point Central Point Pivot Point None of the Above 70. ….. Combines virtual worlds with networking placing multiple participants in a virtual space : Virtual reality Hyper media Hyper reality real time 71. Software that can create art that a designer can rotate, view from a variety of angles, and take two dimension snapshots of the best views is known as : 3-D Modelling Software Photo data base Software Photo Management software Gray-scale Graphics Software 72. The transformation that produces a parallel mirror image of an object is called : Rotation Reflection Translation Scalling 73. The Primary color for TV are : Blue , white, Black Red , Green, Yellow Red, Green Black red ,Green,Blue 74. Moving Picture Experts group (MPEG-2), was designed for high-quality DVD with a Data Rate of : 3 to 6 mbps 4 to 8 mbps 5 to 6 mbps 6 to 6 mbps 75. The creation of motion from still pictures is called : A presentation 3-D Modeling Transition Animation 76. Full form of JPEG is : Joint Picture Engineering Group Joint Picture Engieenring Group Joint Picture Experts Group None of the Above 77. What is the process that condenses file to be stored in less apace and therfore ,sent faster over the internet : Data Condensation Data Compression Zipping Defragmentation 78. A Standard Interface that is used to send commands to instruments and sound sources is : Downloading Real audio MIDI AAC 79. The Term “Hypertext ” was used when textual information was linked in …….ways : Sequential Real Time Non- Sequential Linear 80. A public key encryption system allows anyone to decode the transmissions allows only the correct sender to decode the data allows only the correct receiver to decode the data does not encode the data before transmitting it 81. Encryption and decryption of data are responsibility of : Physical Layer Data Link Layer Presentation layer Session Layer 82. A high speed communication equipment would not be needed for : E-mail Transferring large volume of data Supporting communication between nodes in a LAN All of the above 83. What is data encyption statndard (DES) ? Block Cipher Stream Cipher Bit Cipher None of the above 84. In which of the following situations might a blind search be acceptable? Real time situation Complex game Small search space all of the above 85. Which particular generation of computers is associated with Artificial Intelligence: Third Fourth Fifth Second 86. Which is tha first fundamental step in image processing : Filtarion Image acqulsition Image Enhancement Image Restoration 87. Image compression is : Making image look better Sharpening The Intensisty Transition regions Minimizing degradation over image Reducing the redundancy of the image data 88. Mouse device may be : Electro-chemical Mechanical Optical Both B and C 89. The term ‘page traffic’ describes ____________________. number of pages of executing programs loaded in memory the movement of pages in and out of memory Number of pages required to be brought in at a given page request number of pages in memory at a given instant 90. Through put of a system Number of programs processed by it per unit time Number of time program is invoked by the system number of requests mode to a program by the system None of the above 91. Before processing with its execution each process must acquire all the resources it needs is called : Hold and wait No-pre-emption circular wait Starvation 92. Virtual memory is : An extremely large main memory All illusion of extremely large main memory An Extremely large secondary memory A type of memory used in super computers 93. Which of the following is wrong example of network layer : x25 level 2-ISO Source Routing and Domain Usenet Internet Protocal-ARPANET None of the above 94. ATM (Asynchronous Transfer)is fundamentally a …..technology Circuit Switching Packet Switching Narrow Band None Of these 95. Which is a fundamental task in image processing use to match two or more picture : Registration Segmentation Computer Vision Image Differencing 96. A schedule which select process from secondary storage device is called : Short term Schedular Long term Schedular Medium term Schedular process Schedular 97. The “Turn around time ” of a user job is the : Time since its submission to the time its results become available time duration for which the CPU is allotted to the job. total time taken to execute the job. time taken for the job to move from assembly phase to completion phase. Loading … Question 1 of 97