Advance Topics -2017 29 Jun,2021 boomtecho2@gmail.comLeave a comment 1. A beam of electrons emitted by an electron gun is also called as : Electric rays Magnetic rays Cathode rays Infra-red rays 2. Picture Definition is stored in_____buffer area in memory . Frame Outer Refresh Restore 3. In Liquid Crystal Display the flat Pannel device is reffered to as a ____LCD. Matrix Passive Active Submissive 4. Refreshing on Raster scan .Display is carried out at the rate of 60 to 80 _____per second . Points Pixels Position Frame 5. The Transformation applied in an object prepositioning along a straight line is called: Translation Rotation Scaling Shearing 6. Which is not a color model used in computer graphics : RGB BMI CMY HSV 7. What is the color of layers of phosphors are used in beam penetration Method : Red and Green Blue and Green Yellow and green Orange and green 8. The phase of determining the appropriate pixels for representing images or graphics object is called as – Rasterization Transformation Translation scaling 9. TIIF file format are used for : Vector Graphics Bit Map Both A and B None Of these 10. The Intersection of three R.G.B Colour Produces : White color Black color Magenta color Blue color 11. The Process of extracting a portion of a database or a picture inside or outside a specified region are called : Transformation Projection Clipping Mapping 12. Warnock’s Algorithm is a Area subdivision Algorithm which Subdi- video each area into ——–equal squares: Two Four Eight None of above 13. The algorithm for drawing a circle is: Floating Algorithm Horizan Algorithm DDA algorithm All of the Above 14. The transformation that produces a parallel mirror image of an object are called. Rotation Reflection Translation Scaling 15. The ratio of the horizon and vertical points to produce a line of equal length in both the directions is called. dot pich Height -Width Ratio Revolution Aspect Ratio 16. In raster scan display, the frame buffer holds …………………. Line drawing commands Scanning instructions Image Resolution Intensity information 17. Extension of DVST is : Digital View Storage Tube Digital View Storage Table Direct View Storage Tube Direct View Storage Table 18. The Transformation which change the shape of an object is called : Morphing Shear Rotation Scaling 19. LED is a device that convert electrical energy into……………….. Light Magnet Colours Picture 20. Wireless Mouse Works on : Infra-Blue Radiation Infra-Red Radiation X-Rays UV-rays 21. The Point About which an object is rotation in a circular path in Rotation Transformation is called : Fixed Point Central Point Pivot Point None of the Above 22. The area marked for viewing a picture is called: Window Glow view Picture 23. Translation, rotation, subtraction / extending reflection are examples of , Point drafting Picture creation Graphics 2D Translation 24. The distance between the base line and the cape line of a letter is called : Character size Character height character lenght none of the above 25. Refresh Buffer in CRT is used to store the picture information in the form of : voltage level 0’s and 1’s Line and level -1’s and 1’s 26. Refresh Buffer in CRT is used to store the picture information in the form of : voltage level 0’s and 1’s Line and level -1’s and 1’s 27. The main hardware components of a graphics work station are : display devices, recorder input and out put device CPU and Display Processor plotter, joystick 28. Multimedia files stored on a remote server are delivered to a client across the network using a technique called as : Download Flowing Streaming Leaking 29. The best definition of hypermedia is : Linked concept Linked Test Linked Media None of above 30. Full Form of VRML : Very Real Marking Language Virtual Reality Marking Language Virtual Reality Markup Language None of the above 31. WAV audio Formate was developed by : Microsoft Apple Silicon Graphics None of the above 32. Good Example of Hypermedia in actual use is : The Internet Videotape Audiotape None of the above 33. Expension of AVI is : Audio for voice on internet Audio voice Interleaved Audio video Interleaved None of the Above 34. Which of the following statement is true : MIDI files are generally larger than WAV files Video files are generally larger than Audio files Audio and video are same All of the Above 35. The Delay that occur during the playback of a stream is called : stream delay Playback delay Jitter Event delay 36. Which of the following is a technique to blend two or more images to form a new image . Modeling Morphing Animation Warping 37. Conversion of a Analog Waves to a digital format is called : Echo Sampling Sound Forge Frequency 38. A ____________ can be added to your presentation and then used to go to a variety of locations….. menulink hyperlink sidelink toolink 39. In which type of streaming multimedia file is delivered to the client, but not shared? real-time streaming progressive download compression none of the mentioned 40. MPEG Standard : stores the compression values of each frame stores the differences between successive frames stores multiple frames’ values together none of the mentioned 41. Dynamic web page : is same everytime whenever it displays Generates on Demand by a program or a request from browser Both A and B None Of the above 42. The Process of removing blank spaces from the front of recording is called : Digital signal Processing Resampling Trimming None of the Above 43. _____ is a popular effect in which one image transformations into another Inverse Kinematics Morphing Tweaking Tweening 44. Which of the following is an example of a client- server Model? TELENT FTP DNS All of the Above 45. MP3 is an Extension of Sound file Music File Audio file All of the Above 46. The Components of Multimedia are : Audio Video Image All of the Above 47. Multimedia project is said to be —-and user Interactive when users are given navigation control : Hypertext Linear Non-Linear None of the Above 48. A Smaller version of an Image is called a : Clip Art Bitmap Thumbnail None of the Above 49. The Process of Drwaing a series of frames between keyframe is called : Tweening Morphing Tweaking None of the above 50. Multimedia elements are typically joined together into a project using one of the following: Authoring tools Multimedia tools Audio tools video tools 51. The speed of computer used for AI application is measured in : Cycles/sec Logical Interface/sec Revolution/sec None of the above 52. Expert System is also know as ——- of AI System: Heart Real Brain Nerve Non of the Above 53. What is cypher ? Algorithm for performing encryption and decryption Encrypted message Both A and b none of the Above 54. The Two major language are LISP and PROLOG COBOL BASIC PASCAL 55. We make a machine……….by using Artificial Intelligence concept Dumb Intelligence Hardworking Cost Effective 56. Digital Images are displayed as a Descrete set of : Value Numbers Frequences Intensities 57. Digitising the coordinate values is called: radiance sampling illuminance quantization 58. OPI Stands for dots per image dots per inches dots per intensity diameter per inches 59. Which type data compression technique is used in ZIP file Format : Loosless Lossy Both A and B None of the Above 60. In Asymmetric key Cryptography the private key is kept by : Sender Receiver Sender and Receiver both None of the Above 61. DES is : Dual Energy System Data Encryption System Decryption Encryption System None of above 62. Who is Known as “Father” of Artificial Intelligence ? George Boole John Mc Carthy Allen Newell Allan Turing 63. LISP machines are also known as : AI Workstations Super Mini Computer Time Sharing Terminals All of the Above 64. What is the name of computer program that contains the distllied knowledge of an expert : MIS DBMS Expert system Artificial Intelligence 65. Underlined text,such as text and folder names in reffered to as : Hyperlink Menu Source None of the Above 66. First AI Programming Language was called : Basic Fortran IPL LISP 67. The Characterstics of computer System capable of thinking,reasoning and learning is known as : Human intelligence Machine Intelligence Artificial Intelligence Virtual Intelligence 68. In Asymmetric Key Cipher : Different keys are used for encryption and decryption same key in used for encryption and decryption No key are used None of the above 69. This is an Image file with lossy compression : File1.txt File1.bmp File1.jpg file1.avt 70. An Algorithm performs various transformation on plain text with public key : Decryption Algorithm Security Algorithm Encryption Algorithm None of the Above 71. An Algorithm performs various transformation on cipher text with private key is known as : Decryption Algorithm Security Algorithm Encryption Algorithm None of the Above 72. Which layer of OSI are responsible for encryption and Decryption ? Physical Layer Data Link Layer Presentation Layer Session Layer 73. Which particular Generation of computer is associated with artificial Intelligence ? Fourth Third Fifth Second 74. “ARM” of robot is also Known as : Manipulator Aculator End Effector Servomachanism 75. We use Cryptography to transforming menages to make them secure and immune to: Change Idle Attacks Defined 76. A program in Execution is called : Process Function CPU Memory 77. The Address of next Instruction to be executed by the current process is provided by the : CPU register Program Counter Process Stack Pipe 78. Which is not a memory used in computer ? RAM EROM PROM SAM 79. The FIFO Algorithm : First executes the job that came in last in the queue First Executes the Job that came in first in the queue First executes the job that need minimal processor None of the Above 80. Which of following algorithm tends to the minimize the process flow time : FCFS Shortest Job First Earliesrt Deadline First Longest Job First 81. In Priority scheduling Algorithm when a process arrives at the ready queue , its priority is compared with the priority of : All Process Currently Running Process Parent Process All of the Above 82. Time Quantum is defined in Shortest job Scheduling Algorithm Round Robin Scheduling Algorithm priority Scheduling Algorithm Multilevel Queue Scheduling Algorithm 83. Which of the following is not true? Kernel is the program that constitutes central core of OS , Kernel is the first part of OS to Load in the memory during booting kernel is made of various modules which can not be loaded in running OS None of the Above 84. By Operating System the resource management can be done via : Time division multiplexing Space division multiplexing Both A and B None of the Above 85. A system is an safe state if : The System can allocate resources to each process in same order and still avoid a deadlock There exist a safe sequence Both A and B None of the Above 86. Banker’s Algorithm is Scheduling Algorithm Deadlock Avoidance Algorithm Kernel Algorithm Memory Allocation Algorithm 87. For Effective Operating System When to check for deadlock ? Every Time a resource request is made At fixed time Intervals Both A and B None of the Above 88. The Deadlock Avoidance Algorithm Dynamically Examples the ——–of ensure that a circular wait condition can never exist : resource allocation state system storage state operating system resources 89. Which One of the following is the address generated by CPU : Physical Address Absolute Address Logical Address None Of the Above 90. Memory Management technique in Which System stores Retrieves data From Secondary Storage for Use in Main Memory is called : Fragmentation Paging Mapping None of the Above 91. Page Table Contains: Base Address of each page in physical memory page Offset Page Size None of the Above 92. ____Is Generally faster than ____and ______ First Fit , best fit, worst fit Best Fit ,First Fit, Worst Fit Worst Fit ,best Fit, first Fit None Of the Above 93. Buying and selling goods over the Internet is Called : E- Commerce Euro-Conversion Hyper – Marketing Cyber Selling 94. Which of the Following Protocol is used for transferring electronic mail message from one machines to another : SNMP HTTP FTP SMTP 95. On Which of the following storage media , storage of information is organised as a single continuous spiral grove Flopy disk CD-ROM RAM Hard disk 96. Which of the Following memory improves the speed of execution of a program: Cache -Memory Virtual Memory Primary Memory Secondary Memory 97. The Memory which does not loose its content on failure of power supply is know as ___ Memory RAM Volatile None Volatile Primary Memory 98. Which of the Following Techniques Allows Execution of program Larger Than the size of physical memory ? Demand Paging Thrasing DMA Buffering 99. Copying a process from memory to disk to allow space for other process is called : Swapping Demand Paging Deadlock Page Fault 100. The Primary purpose of an operating system is to : Make Computer easier to use Make the most efficient use of hardware Allow anyone to use the computer all of the above Loading … Question 1 of 100