Advance Topics -2017

1. A beam of electrons emitted by an electron gun is also called as :

 
 
 
 

2. Picture Definition is stored in_____buffer area in memory .

 
 
 
 

3. In Liquid Crystal Display the flat Pannel device is reffered to as a ____LCD.

 
 
 
 

4. Refreshing on Raster scan .Display is carried out at the rate of 60 to 80 _____per second .

 
 
 
 

5. The Transformation applied  in an object  prepositioning along a straight line is called:

 
 
 
 

6. Which is not a color model used in computer graphics :

 
 
 
 

7. What is the color of layers of phosphors are used in beam penetration Method :

 
 
 
 

8. The phase of determining the appropriate pixels for representing images or graphics object is called as –

 
 
 
 

9. TIIF file format are used for :

 
 
 
 

10. The Intersection of three R.G.B Colour Produces :

 
 
 
 

11. The Process of extracting a portion of a database or a picture inside or outside a specified region are called :

 
 
 
 

12. Warnock’s Algorithm is a Area subdivision Algorithm which Subdi- video each area into ——–equal squares:

 
 
 
 

13. The algorithm for drawing a circle is:

 
 
 
 

14. The transformation that produces a parallel mirror image of an object are called.

 
 
 
 

15. The ratio of the horizon and vertical points to produce a line of equal length in both the directions is called.

 
 
 
 

16. In raster scan display, the frame buffer holds ………………….

 
 
 
 

17. Extension of DVST is :

 
 
 
 

18. The Transformation which change the shape of an object is called :

 
 
 
 

19. LED is a device that convert electrical energy into………………..

 
 
 
 

20. Wireless Mouse Works on :

 
 
 
 

21. The Point About which an object is rotation in a circular path in Rotation Transformation is called :

 
 
 
 

22. The area marked for viewing a picture is called:

 
 
 
 

23. Translation, rotation, subtraction / extending reflection are examples of ,

 
 
 
 

24. The distance between the base line and the cape line of a letter is called :

 
 
 
 

25. Refresh Buffer in CRT is used to store the picture information in the form of :

 
 
 
 

26. Refresh Buffer in CRT is used to store the picture information in the form of :

 
 
 
 

27. The main hardware components of a graphics work station are :

 
 
 
 

28. Multimedia files stored on a  remote server are delivered to a client across the network using a technique called as :

 
 
 
 

29. The best definition of hypermedia is :

 
 
 
 

30. Full Form of VRML :

 
 
 
 

31. WAV audio Formate was developed by :

 
 
 
 

32. Good Example of Hypermedia in actual use is :

 
 
 
 

33. Expension of  AVI is :

 
 
 
 

34. Which of the following statement is true :

 
 
 
 

35. The Delay that occur during the playback of a stream is called :

 
 
 
 

36. Which of the following is a technique to blend two or more images to form a new image .

 
 
 
 

37. Conversion of a Analog Waves to a digital  format is called :

 
 
 
 

38.

A ____________ can be added to your presentation and then used to go to a variety of locations…..

 
 
 
 

39. In which type of streaming multimedia file is delivered to the client, but not shared?

 
 
 
 

40. MPEG Standard :

 
 
 
 

41. Dynamic web page :

 
 
 
 

42. The Process of removing blank spaces from the front of recording is called :

 
 
 
 

43. _____ is a popular effect in which one image transformations into another

 
 
 
 

44. Which of the following is an example of a client- server Model?

 
 
 
 

45. MP3 is an Extension of

 
 
 
 

46. The Components  of Multimedia are :

 
 
 
 

47. Multimedia project is said to be —-and user Interactive when users are given navigation control :

 
 
 
 

48. A Smaller version of an Image is called a :

 
 
 
 

49. The Process of Drwaing a series of frames between keyframe is called :

 
 
 
 

50. Multimedia elements are typically joined together into a project using one of the following:

 
 
 
 

51. The speed of computer used for AI application is measured in :

 
 
 
 

52. Expert System is also know as ——- of AI System:

 
 
 
 

53. What is cypher ?

 
 
 
 

54. The Two major language are LISP and

 
 
 
 

55. We make a machine……….by using Artificial Intelligence concept

 
 
 
 

56. Digital Images are displayed as a Descrete set of :

 
 
 
 

57. Digitising the coordinate values is called:

 
 
 
 

58. OPI Stands for

 
 
 
 

59. Which type data compression technique is used in ZIP file Format :

 
 
 
 

60. In Asymmetric key Cryptography the private key is kept by :

 
 
 
 

61. DES is :

 
 
 
 

62. Who is Known as “Father” of Artificial Intelligence ?

 
 
 
 

63. LISP machines are also known as :

 
 
 
 

64. What is the name of computer program that contains the distllied knowledge of an expert :

 
 
 
 

65. Underlined text,such as text and folder names in reffered to as :

 
 
 
 

66. First AI Programming Language was called :

 
 
 
 

67. The Characterstics of computer System capable of thinking,reasoning and learning is known as :

 
 
 
 

68. In Asymmetric Key Cipher :

 
 
 
 

69. This is an Image file with lossy compression :

 
 
 
 

70. An Algorithm performs various transformation on plain text with public key :

 
 
 
 

71. An Algorithm performs various transformation on cipher text with private key is known as :

 
 
 
 

72. Which layer of OSI are responsible for encryption and Decryption ?

 
 
 
 

73. Which particular Generation of computer is associated with artificial Intelligence ?

 
 
 
 

74. “ARM” of robot is also Known as :

 
 
 
 

75. We use Cryptography to transforming menages to make them secure and immune to:

 
 
 
 

76. A program in Execution is called :

 
 
 
 

77. The Address of next Instruction to be executed by the current process is provided by the :

 
 
 
 

78. Which is not a memory used in computer ?

 
 
 
 

79. The FIFO Algorithm :

 
 
 
 

80. Which of following algorithm tends to the minimize the process flow time :

 
 
 
 

81.

In Priority scheduling Algorithm when a process arrives at the ready queue , its priority is compared with the priority of :
 
 
 
 

82. Time Quantum is defined in

 
 
 
 

83. Which of the following is not true?

 
 
 
 

84. By Operating System the resource management can be done via :

 
 
 
 

85. A system is an safe state if :

 
 
 
 

86. Banker’s Algorithm is

 
 
 
 

87. For Effective Operating System When to check for deadlock ?

 
 
 
 

88. The Deadlock Avoidance Algorithm Dynamically Examples the ——–of ensure that a circular wait condition can never exist :

 
 
 
 

89. Which One of the following is the address generated by CPU :

 
 
 
 

90. Memory Management technique in Which System stores Retrieves data From Secondary Storage for Use in Main Memory is called :

 
 
 
 

91. Page Table Contains:

 
 
 
 

92. ____Is Generally faster than ____and ______

 
 
 
 

93. Buying and selling goods over the Internet is Called :

 
 
 
 

94. Which of the Following Protocol is used for transferring electronic mail message from one machines to another :

 
 
 
 

95. On Which of the following storage media , storage of information is organised as a single continuous spiral grove

 
 
 
 

96. Which of the Following memory improves the speed of execution of a program:

 
 
 
 

97. The Memory which does not loose its content on failure of power supply is know as ___ Memory

 
 
 
 

98. Which of the Following Techniques Allows Execution of program Larger Than the size of physical memory ?

 
 
 
 

99. Copying a process from memory to disk to allow space for other process is called :

 
 
 
 

100. The Primary purpose of an operating system is to :

 
 
 
 

Question 1 of 100

Leave a Reply

Your email address will not be published. Required fields are marked *