Advance Topics -2016

1.

coordinates of window are known as :

 
 
 
 

2. Identify Line Clipping algorithm from the following:

 
 
 
 

3. According to Cohen-Sutherland Algorithm a fine is completely outside the window is :

 
 
 
 

4. Sutherland -Hodgeman algorithm works well for__

 
 
 
 

5. Smallest size object that can be displayed on a monitor is called :

 
 
 
 

6. The distance from one pixel to the next pixel is called:

 
 
 
 

7. The Shortest Distance between any two dots of the same color is called :

 
 
 
 

8. The standard aspect ratio for PC is ——

 
 
 
 

9. Intensity representation of an image is called :

 
 
 
 

10. In random Scan display ,the frame buffer holds…..

 
 
 
 

11.  The fundamental geometric transformations are as follows:

 
 
 
 

12. Which technique of color CRT is used for production of realistic Image:

 
 
 
 

13. The transformation in which an Object is moved in a minimum distance path from one position to another is called :

 
 
 
 

14. the process of mapping a world window  in world coordinate system to viewport are called:

 
 
 
 

15. The Process of extracting a portion of a database or a picture inside or outside a specified region are called :

 
 
 
 

16. Beam Penetration Method is usually used in…….

 
 
 
 

17. DVST Stands For :

 
 
 
 

18. The Purpose of flood gun in DVST is :

 
 
 
 

19. The Translation Distances (dx,dy) is called as:

 
 
 
 

20. The Viewer of a multimedia project to control what and  when the elements are delivered it is called ……….

 
 
 
 

21. Multimedia elements are typically joined together into a project using :

 
 
 
 

22. HTML And DHTML web pages or site are generally viewed using a ……………..

 
 
 
 

23. ____________ refers to any type of application or presentation that involves more than one type of media, such as text, graphics, video, animation, and sound:

 
 
 
 

24. One of the disadvantage of multimedia is :

 
 
 
 

25. The text color in a presentation should contrast with the ……………………color .

 
 
 
 

26. Image Include in many software titles are called ……………………….

 
 
 
 

27. The process of planning your multimedia presentation is known as a :

 
 
 
 

28. Programming contain(s):

 
 
 
 

29. Digital Signature is :

 
 
 
 

30. Digital Signature is :

 
 
 
 

31. Tool that is used to transfer data /files among computers on the internet:

 
 
 
 

32. Collection of interconnected networks sometimes called :

 
 
 
 

33. The digital information or software on DVD is typically multiplexed audio , image text and video data optimized for motion picture display using :

 
 
 
 

34. When a program assign 8 bits to a pixel that pixel can display one of up to :

 
 
 
 

35. A digital photography is a :

 
 
 
 

36. CAD Software is  primarilly used in :

 
 
 
 

37. Full form of CAM is :

 
 
 
 

38. We can divide audio and video services into :

 
 
 
 

39. What is Artificial Intelligence :

 
 
 
 

40. Which is not the commonly used programming language for AI:

 
 
 
 

41. Fuzzy logic is a form of :

 
 
 
 

42. Fuzzy logic usually represented as:

 
 
 
 

43. ………………..is/are the way(s) to represent uncertainty :

 
 
 
 

44. In which way does the ‘combined encryption’ combine symmetric and asymmetric encryption ?

 
 
 
 

45. Strong Artificial Intelligence is :

 
 
 
 

46. A deadlock exists in the system if and only if the wait-for graph contains a ___________

 
 
 
 

47. CPU fatches the Instruction from memoory according to the value of :

 
 
 
 

48. Run time mapping  from virtual to physical address is done by :

 
 
 
 

49. The Address of the page table in memory is pointed by :

 
 
 
 

50. In Contiguous memory allocation :

 
 
 
 

51. When memory is divided into several fixed sized partitions ,each  partition may contain…….

 
 
 
 

52. The first fit best and worst fit are strategies to select a………..

 
 
 
 

53. Which of these an example of a virtual resource :

 
 
 
 

54. Interval between the time of submission and completion of the job is called :

 
 
 
 

55. A program execution time is called :

 
 
 
 

56. A set of techniques that allow to execute a  program which is not entirely in memory is called :

 
 
 
 

57. What is shell in Operating system

 
 
 
 

58. A Logical Address generated by CPU consists of :

 
 
 
 

59. A computer system that permits multiple users to run program at same time :

 
 
 
 

60. Which concept explains the working of an operating system :

 
 
 
 

61. Which of the following is the feature of operating system?

 
 
 
 

62. What is the drawback of banker’s Algorithm :

 
 
 
 

63. A deadlock state can be changed back to stable by using …..statement

 
 
 
 

64. What are the ways of dealing with deadlock :

 
 
 
 

65. Full form of GIF is :

 
 
 
 

66. The transformation in which an object is moved from one position to another in circular path around a specified pivot point is called:

 
 
 
 

67. Which technique of color CRT is used for production of realistic Image :

 
 
 
 

68. The process of Calculating the production of matrices of number of transformation in sequence is called ……..

 
 
 
 

69. The Point about which an object is rotated is called :

 
 
 
 

70. ….. Combines virtual worlds with networking placing multiple participants in a virtual space :

 
 
 
 

71. Software that can create art that a designer can rotate, view from a variety of angles, and take two dimension snapshots of the best views is  known as :

 
 
 
 

72. The transformation that  produces a parallel mirror image of an object is called :

 
 
 
 

73. The Primary color for TV are :

 
 
 
 

74. Moving Picture Experts group (MPEG-2), was designed for high-quality DVD with a Data Rate of :

 
 
 
 

75. The creation of motion from still pictures is called :

 
 
 
 

76. Full form of JPEG is :

 
 
 
 

77. What is the process that condenses file to be stored in less apace and therfore ,sent faster over the internet :

 
 
 
 

78. A Standard Interface that is used to send commands to instruments and sound sources is :

 
 
 
 

79. The Term “Hypertext ” was used when textual information was linked in …….ways :

 
 
 
 

80. A public key encryption system

 
 
 
 

81. Encryption and decryption of data are responsibility of :

 
 
 
 

82. A high speed communication equipment would not be needed for :

 
 
 
 

83. What is data encyption statndard (DES) ?

 
 
 
 

84.

In which of the following situations might a blind search be acceptable?
 
 
 
 

85. Which particular generation  of computers is associated with Artificial Intelligence:

 
 
 
 

86. Which is tha first fundamental step in image processing :

 
 
 
 

87. Image compression is :

 
 
 
 

88. Mouse device may be :

 
 
 
 

89.

The term ‘page traffic’ describes ____________________.
 
 
 
 

90. Through put of a system

 
 
 
 

91. Before processing with its execution each process must acquire all the resources it needs is called :

 
 
 
 

92. Virtual memory is :

 
 
 
 

93. Which of the following is wrong example of network layer :

 
 
 
 

94. ATM (Asynchronous Transfer)is fundamentally a …..technology

 
 
 
 

95. Which is a fundamental task in image processing use to match two or more picture  :

 
 
 
 

96. A schedule which select process from secondary storage device is called :

 
 
 
 

97. The “Turn around time ” of a user job is the :

 
 
 
 

Question 1 of 97

Leave a Reply

Your email address will not be published. Required fields are marked *