Advance 2019 paper ( computer science B.A/ B.Sc/B.com) 27 Mar,2021 boomtecho2@gmail.comLeave a comment Please enter your email: 1. What is the ready state of processor When a process is scheduled to run after some execution Which process is unable to run after some execution When process is using CPU None of above 2. The interval from the time of submission of a process to the time of completion called: waiting time turnaround time response time throughput 3. In which of the following process are classified into different groups Shortest -job- Scheduling – Algorithm Round -Robin Scheduling – Algorithm Priority Scheduling – Algorithm Multilevel Queue Scheduling – Algorithm 4. Scheduling is done so as to : Increase CPU Utilization Decrease CPU Utiliztion Keep the CPU More idle none of the above 5. Two Basic memory are used in Computer RAM & ROM RW/RAM & SWROM ERAM & PROM none of above 6. A window manager that allow user to display multiple windows, menus , icons is : WUI MUI GUI LUI 7. Basic Techniques for producing color displays with a CRT are Shadow mask method & DVST Beam Penetration method Shear Rotation 8. Which of the following color graphics display adapter has the highest resolution. HGA CGA VGA SVGA 9. Matrix Transformation is used in- video morphing Audio All of above 10. The transformation which disturbs the shape of an object is called – Morphing Shear Rotation None of above 11. Which colour model is used in computer graphics R.G.B H.S.V C.M.Y All of above 12. The minimum nuber of points that can be displayed without overlap on a CRT is known as : Resolutions Pixels Picture None of Above 13. An Algorithms is used for drawing both line & circle Mid Point Algorithm Bresenham D.D.A Boundary fill 14. A Circle, if scaled i only one dimension will be become Circle Ellipse Hyperbola None of above 15. In Which of the following type of CRT Technology Flood guns bombard the Phosphorus surface of the tube Direct View Strong Tube Refresh Vector CRT Raster Scan CRT Strock CRT 16. In Which type of technology flat panel display is used- view larger Scale Intergration Direct View Storage Tube Solid State R.G.B monitor 17. A Two dimensional rotation is applied to an object by repositioning it along a Circular path in the X-Y plane Staight path in the X-Y plane Diagonals Path in the X-Y plane Upword in X-Y Plane 18. What is the colour of phasphor used in beam penetration method.? Blue & green Red & Green Yellow & Green Orange & Green 19. Mirror Image of an object relative to an axis is produce in the _____Transformation Rotation Translation reflection none of above 20. In random Scan Display ____ is provided for scan algorithm. Local Memory Register Flash Memory No Local Memory 21. What is Pixel? Software Hardware A term of Graphics or video display A point 22. Some time it may require undoing the applied transformation in such a case which of the following transformation will be used ? Shear translation Reflection Inverse transformation 23. The Region code of a point with in the window is : 1111 0000 1000 0001 24. Two Consecutive roation transformation r1 & r2 are : Additive Multiplicative Subtractive None of above 25. The Phenomenon of having a continuous glow of a beam on the screen even after it is removed is called as : Fluorescence Persistance Phosphorescences none of above 26. Each pixel has ___ basic colour component Two or three one or twoo three or four four or five 27. Flow of electrons in CRT is regulated by___ Electron Gun Focusing anode Control grid None of above 28. The amount of light emitted by the phosphor coating depend on the: Number of electrons striking the screen speed of electrons striking the screen Distance from the cathode to the screen none of above 29. The refresh rate below which a picture flicker is 25 30 35 60 30. Graphics & Image Processing Technique used to produce a transformation of one object into another is called. Animation Morphing Half toning None of above 31. EPS image file format is used for : Vector Graphics Bitmap Both A and B None of these 32. The Instruction of three R.G.B colour produces White Color Black Color Cyan Color Magenta color 33. A smaller version of image is called a : thumbnail Bitmap Clip Art None of the above 34. The technique used to deliver multimedia file stored on a remote server to a client across the network is called Downloading Flowing Leaking Streaming 35. Which one of the following is the characteristic of a multimedia system. High Storage High Data rate Both A and B None of the above 36. A video consists of a sequence of _____ Frames Signals Packets Slots 37. Which is the based on Multimedia Video Confrencing Online Education Computer Animation All of Above 38. Moving Picture Experts Group (MPEG) is used to Compress which of the following: Frames Images Audio Video 39. Establishing a session in Session Initiation Protocol (SIP) requires a three way___ Protocols System Ports Handshake 40. The process of drawing a series of frames between keyframes is called Tweening Morphing Tweaking None of above 41. The Creation of motion from still pictures is called A presentation 3-D Modelling Transition Animation 42. In Audio & Video Compressio each frame is divided into small grids called picture or____ Frames Packets Pixels Mega Pixels 43. Real Time Traffic need support of following Unicasting Multicasting Layered Control Protocol Control 44. Which compression provides some loss of quality Lossy Object Based Cell Based Loss Less 45. Which of the following is a lossy format GIF MPEG JPEG PNG 46. In Teardown state of real time streaming protocol The server resources for client The Server deliver the stream to client Server suspends delivery of stream Server breaks down the connection 47. Multimedia System requires hard real time Scheduling To Ensure critical tasks will be serviced within timing dead lines to deliver the media file to the client to minimize the delay for security 48. The major difference between multimedia file and regular file is : the size the attribute the ownership the rate at which the file must be accessed 49. the two type of streaming techniques are: Progressive download & real time streaming Regular download & real time Streaming Real time & Virtual time Streaming Progressive Download & Virtual time streaming 50. Media file containing audio and video is downloaded & Stored on the client’s local file system in Progressive Download Regular Download real time streaming Virtual time streaming 51. A compressed file is : It has a better quality It takes up less space for storage It can not be delivered to the client more quality none of above 52. Lossy technique provide when compared to lossless techniques. Lower compression ration much higher compression ration Similar compression ratio none of above 53. Delay & Jitter Mean the same thing are two completely different things errors none of above 54. The full form of MPEG Motion Pictures Engineering Group Motion Pictures Engineers Group Motion Pictures Expert Group none of above 55. the Delay that occur during the play back of a stream is called Stream delay Play back delay Jitter Event delay 56. The Characteristics of the ye to retain the image for a short time after it has been presented is known persistence of the vision Learning power Memory mapped input none of above 57. Which particular generation of computer is associated with artificial intelligence First Third Fourth Fifth 58. What is cypher : Encryption message Algorithm for performing encryption & Decryption A node None of above 59. using Artificial Intelligence , we aim to build these kind of machines Dumb Intelligent Hard Working Cost effective 60. If P is a plain text ,C is Cypher text K is Key (E)K is Encryption (D)k Is Decryption What is the output of (D)k [ (E)k(p)] C P K (D)K (E)K 61. Which is application of cryptography : Password Safe Internet Browsing Digital Certificate All of above 62. Same Key for Encryption & Decryption is used in _____ Symmetric key Cipher Asymmetric Key Cipher Both A and B None of above 63. What is Data Encryption standard (DES): Block Cipher Stream Cipher Bit Cipher none of above 64. Decryption & Encryption of data are handled by : Physical layer Data Link Layer Session Layer Presentation Layer 65. A public Key Cryptography is an example of : Asymmetric Symmetric Both A and B None of above 66. Who is father of AI Fisher Ada John Mc carthy Alien Newwell Alan Turing 67. ART (Automatic Reasoning Tool )is designed to be used on LISP Machines Personal Computer Micro Computer None of above 68. Which of the following symbols used i describing the syntax of a programming language are: () {} “” <> 69. Expert System also Known as : Heart Brain Nerve None of above 70. Digital Images are displayed as a descrete set of Values Numbers Frequencies None of above 71. Which of the following is the smallest use of memory byte bit nibble blue byte 72. Buying And Selling goods over the internet is called E- Commerce Euro- Conversion Hyper _Marketing Cyber Selling 73. PROLOGO rlies on ___ to solve the problem. Declarations Logic Schemes All of the above 74. Public Key Encryption System Allows any one to decode the data Allows only the correct sender to decode the data Allows only the correct receiver to decode the data All of above 75. Which unit is used to calculate Arithmetic & Logical Operations CU CPU Memory ALU 76. Primary Storage is___ as compared to secondary storage Slow & Inexpensive Fast & Inexpensive Fast & Expensive none Of above 77. Data Dictionary Contains Details of Data Structure Data Flows data Stores All of the Above 78. IDEA( International Data Encryption Algorithm )is a – Symmetric key Block Cipher Stream Cipher Best Cipher All of the above 79. RSA Algorithm Invented by Rivest , Shamir, And ___ Aldeman Anderson Andrew None of above 80. Computer Programs Designed Cognitive Process used by the human brain is called Neural Network Expert Network Strong Network All of the above 81. A computer Can not be “Boot” if it does not have Computer Loader Operating System Assembler 82. An Operating System Manages Memory Processor Disk & I/O Device All of above 83. NTFS stands for : New Tyepe file System Never terminated File System New Technology file system Non terminated file system 84. Which is pre-emptive Scheduling Algorithm Round Robin Shortest Job Next Priority Based All of the Above 85. Which type of command requires addition files to perform specific operation Internal Commands External Commands Valuable Commands Primary Commands 86. Which of the following memory unit that processor can access more rapidly Main Memory Virtual cache Rom 87. Bringing a page into memory only when it is needed ,this mechanism is called. Deadlock page fault Dormant Paging Demand Paging 88. Round Robin Is a Kind of Magnetic Drum Process Scheduling Policy Process Synchronization Policy Memory Allocation Policy 89. Four Necessary condition for dead lock to exist are mutual exclusion, non premption, circular wait & hold & wait Multiprogramming race around condition Buffer Overflow 90. Banker’s Algorithm for resource Al-location is used . to rectify deadlock To Detect Deadlock to prevent deadlock to solve deadlock 91. The FIFO Algorithm – Executes first the job that last entered the queue Execution first the job that first entered the queue Executes first the Job with the least processor needs Executes First the job that has been in the queues the longest 92. When an Interrupt occurs,an operating system Ignores the Interrrupt always changes, state of interrupted process after processing the interrupt always resumes execution of interrupted process after processing the interrupt May change state of interrupted process to ” Blocked” & Schedule another process 93. Which one of the following is the deadlock avoidance Algorithm Elevator Algorithm Round Robin Algorithm Banker’s Algorithm Karn’s Algorithm 94. The address of next instruction to be executed by the current process is provided by the CPU Register by the Program counter By the process stack by the pipe 95. Which is fastest Memory RAM Hard Disk C.P.U register ROM 96. Which one of the following error will be handle by the operating system Power Failure Lack of paper in printer Connection failure in Network All of Above 97. Which of the Following is Related with dynamic loading for better memory utilization It does not requires special support from the operating system Disadvantage is unused routine is never loaded All of above 98. File Access Method is Sequential Direct Both A And B None Of these 99. The process of transferring Data intended for a peripheral device into a disk so that it can be transferred to peripheral at a more convenient time or in bulk is known Multiprogramming Spooling caching Virtual programming 100. By operating system the resource management can be done via Time Division Multiplexing Space Division Multiplexing Both time & space Multiplexing None of above Loading …