0% found this document useful (0 votes)
60 views

I MSC Comprehension-Questions Only

The document provides details about the course structure for an M.Sc. in Information Technology program under a choice-based credit system and outcome-based education model. It lists one core course offered as part of the program - "Comprehension in core courses" with a course code of P20IT1C1, 1 lecture hour, no tutorial, no practical, and carrying 1 credit.

Uploaded by

Kaleeswari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views

I MSC Comprehension-Questions Only

The document provides details about the course structure for an M.Sc. in Information Technology program under a choice-based credit system and outcome-based education model. It lists one core course offered as part of the program - "Comprehension in core courses" with a course code of P20IT1C1, 1 lecture hour, no tutorial, no practical, and carrying 1 credit.

Uploaded by

Kaleeswari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

THE COURSES

OFFERED BY THE DEPARTMENT


Department of Information Technology
Course Structure for M.Sc. (Information Technology)
Under Choice Based Credit System &OBE

Lect
Course Tutorial Practical Credit
Category Course Type Course Title ure
Code (T) (P) (C)
(L)
Comprehension – 1 Comprehensio
PART-III (Online Exam) P20IT1C1 n in core 1 - - 1
courses

1)A process that involves recognizing and focusing on the important characteristics of a
situation or object is known as:
(a) Encapsulation (b) Polymorphism
(c) Abstraction (d) Inheritance.

2)Which statement is true regarding an object?


(a) An object is what classes instantiated are from
(b) An object is an instance of a class
(c) An object is a variable
(d) An object is a reference to an attribute
(e) An object is not an instance of a class.

3)In object-oriented programming, new classes can be defined by extending existing


classes. This is an example of:
(a) Encapsulation (b) Interface
(c) Composition (d) Inheritance.

4)Which of the following does not belong: If a class inherits from some other class, it
should
(a) Make use of the parent class’s capabilities
(b) Over-ride or add the minimum to accomplish the derived class’ purpose
(c) Over-ride all the methods of its parent class
(d) Make sure the result “IS-A-KIND-OF” its base class
5)Object-oriented inheritance models the
(a) “is a kind of” relationship
(b) “has a” relationship
(c) “want to be” relationship
(d) inheritance does not describe any kind of relationship between classes

6)The wrapping up of data and functions into a single unit is called


(a) Encapsulation (b) Abstraction
(c) Data Hiding (d) Polymorphism

7)Polymorphism
(a) Is not supported by Java
(b) Refers to the ability of two or more objects belonging to different classes to respond to
exactly the same message in different class-specific ways
(c) Simplifies code maintenance
(d) Refers to the ability of two or more objects belonging to different classes to respond to
exactly the same message in different class-specific ways and simplifies code maintenance.

8)Given a class named student, which of the following is a valid constructor declaration
for the class?
(a) Student (student s) { } (b) Student student ( ) { }
(c) Private final student ( ) { } (d) Void student ( ) { }

9)What is garbage collection in the context of Java?


(a) The operating system periodically deletes all of the java files available on the system.
(b) Any package imported in a program and not used is automatically deleted.
(c) When all references to an object are gone, the memory used by the object is automatically
reclaimed.
(d) The JVM checks the output of any Java program and deletes anything that doesn’t make
sense.

10)The concept of multiple inheritances is implemented in Java by


I. Extending two or more classes.
II. Extending one class and implementing one or more interfaces.
III. Implementing two or more interfaces.
(a) Only (II) (b) (I) and (II) (c) (II) and (III)(d) Only (I)

11)In Java, declaring a class abstract is useful


(a) To prevent developers from further extending the class
(b) When it doesn’t make sense to have objects of that class
(c) When default implementations of some methods are not desirable
(d) To force developers to extend the class not to use its capabilities

12)A package is a collection of


(a) Classes (b) Interfaces (c) Editing tools
(d) Classes and interfaces (e) Editing tools and interfaces

13)Basic Java language functions are stored in which of the following java package?
(a) java.lang (b) java.io (c) java.net (d) java.util

14)Which of the following is a member of the java.lang package?


(a) List (b) Queue (c) Math (d) Stack.

15)URL stands for


(a) Universal reader locator (b) Universal reform loader
(c) Uniform resource loader (d) Uniform resource locator

16)What is the sequence of major events in the life of an applet?


(a) init, start, stop, destroy (b) start, init , stop , destroy
(c) init, start , destroy, stop (d) init, start, destroy

17)Which of the following is true in regard to applet execution?


(a) Applets loaded from the same computer where they are executing have the same
restrictions as applets loaded from the network.
(b) Applets loaded and executing locally have none of the restrictions faced by applets that
get loaded from the network.
(c) Applets loaded and executing locally have some restrictions faced by applets that get
loaded from the network.
(d) Applets can’t react to user input and change dynamically

18)What is the return type of the method getID() defined in AWTEvent class
(a) Int (b) long (c) Object (d) Component

19) Which of the following events will cause a thread to die?


(a) The method sleep( ) is called (b) The method wait( ) is called
(c) Execution of the start( ) method ends (d) Execution of the run( ) method ends

20)What will be the result of the expression 13 & 25?


(a) 38 (b) 25 (c) 9 (d) 12
21)Which of the following statements are true regarding the finalize( ) method?
(a) The finalize ( ) method must be declared with protected accessibility
(b) The compiler will fail to compile the code that explicitly tries to call the finalize( )
method
(c) The body of the finalize ( ) method can only access other objects that are eligible for
garbage collection
(d) The finalize ( ) method can be overloaded

22) Which one of these is a valid method declaration?


(a)void method1 (b)void method2()
(c)void method3(void) (d)method4()

23) What will be the result of attempting to compile the following program?
public class MyClass {
long var;
public void MyClass(long param) { var = param; } //(1)
public static void main(String[] args) {
MyClassa,b;
a = new MyClass(); //(2)
b = new MyClass(5); //(3)
}
}
(a)A compilation ERROR will occur at (1), since constructors cannot specify a return value
(b)A compilation error will occur at (2), since the class does not have a default constructor
(c)A compilation error will occur at (3), since the class does not have a constructor which
takes one argument of type int
(d)The program will compile correctly

24) Which of these methods is a part of Abstract Window Toolkit (AWT)?


a) display b) paint c) drawstring d) transient

25)Which of these modifierscan be used for a variableso that it can be accessed from any
thread or parts of a program?
a) transient b) volatile c) global d) No modifier is needed

26)Which of these operators can be used to get run time information about an Object?
a)getInfo b)Info c)instanceOf d)getinfoof

27)What is the message is displayed in the applet made by this program?


import java.awt.*;
import java.applet.*;
public class myapplet extends Applet {
public void paint(Graphics g) {
g.drawString("A Simple Applet", 20, 20);    
}
}
a) a simple applet b) a simple applet 20 20 c) compilation error d) runtime error

28) Where are the following four methods commonly used?


1) public void add(Component c)
2) public void setSize(int width,int height)
3) public void setLayout(LayoutManager m)
4) public void setVisible(boolean)
a) Graphics class b) Component class c) Both A & B d) None of the above

29)Which object of HttpSession can be used to view and manipulate information about
a session?
 a)session identifier b)creation time c) last accessed time d)All mentioned above

30)Which is the container that doesn't contain title bar and MenuBars but it can have
other components like button, textfield etc?
a) Window b) Frame c) Panel d) Container

31) Which of these ways used to communicate from an applet to servlet?


a) RMI Communication b) HTTP Communication
c) Socket Communication d) All mentioned above

32)Give the abbreviation of AWT?


a) Applet Windowing Toolkitb) Abstract Windowing Toolkit
c) Absolute Windowing Toolkit d) None of the above

33)Which method is used to set the graphics current color to the specified color in the
graphics class?
a) public abstract void setFont(Font font)
b) public abstract void setColor(Color c)
c) public abstract void drawString(String str, int x, int y)
d) None of the above

34)In Graphics class which method is used to draws a rectangle with the specified width
and height?
a) public void drawRect(int x, int y, int width, int height)
b)public abstract void fillRect(int x, int y, int width, int height)
c) public abstract void drawLine(int x1, int y1, int x2, int y2)
d) public abstract void drawOval(int x, int y, int width, int height)

35)Which object can be constructed to show any number of choices in the visible
window?
a) Labels b) Choice c) List d) Checkbox

36)Which is used to store data and partial results, as well as to perform dynamic
linking, return values for methods, and dispatch exceptions?
a)Window b) Panel c) Frame d)Container

37)Which class is used for this Processing Method processActionEvent( )?


a)Button,List,MenuItem b)Button,Checkbox,Choice
c)Scrollbar,Component,Button d)None of the above

38)Which of these keywords must be used to monitor for exceptions?


a) tryb) finallyc) throwd) catch

39)When does Exceptions in java arises in code sequence?


a) Runtimeb) Compile time c) occur at any time d) None of the mentioned

40)Which of these is a super class of all exceptional type classes?


a) Stringb) Runtime Exceptions c) Throwable d) Catchable

41)What is the name of the method that is used to start the execution of a thread?
a) startb) runc) init()d) none of these e)resume
42)Which method registers a thread in a thread scheduler?
a)Construct b)Start c)run d)register e)none of the above

43)Which method is called internally by Thread start() method?


a)execute() b)run() c)launch() d)start()

44)What is maximum thread priority in Java?


a)10 b)12 c)5 d)8

45)Which method must be implemented by a Java thread?


a)run() b)execute() c)start() d)none

46)Execution of a java thread begins on which method call?


a)start( ) b)run( ) c)execute( ) d)launch ( )

47)What are the major components of the JDBC?


a)DriverManager, Driver, Connection, Statement, and ResultSet
b)DriverManager, Driver, Connection, and Statement
c)DriverManager, Statement, and ResultSet
d)DriverManager, Connection, Statement, and ResultSet

48)Select the packages in which JDBC classes are defined?


a)jdbc and javax.jdbc b)rdb and javax.rdb
c)jdbc and java.jdbc.sql d)sql and javax.sql

49) Thin driver is also known as?


a)Type 3 Driver b)Type-2 Driver c)Type-4 Driver d)Type-1 Driver

50) Java supports RMI, RMI Stands for?


a) Random Method Invocation b)Remote Memory Interface
c) Remote Method Invocation d) Random Method Invocation

51)The spatial coordinates of a digital image (x,y) are proportional to:


a) Position b) Brightness c) Contrast d) Noise
52)Among the following image processing techniques which is fast, precise and flexible.
a) Optical b) Digital c) Electronic d) Photographic

53)Using gray-level transformation, the basic function linearity deals with which of the
following transformation?
a) log and inverse-log transformations
b) negative and identity transformations
c) nth and nth root transformations
d) All of the mentioned

54)The technique of Enhancement that has a specified Histogram processed image as


result, is called?
a) Histogram Linearization b) Histogram Equalization
c) Histogram Matching d) None of the mentioned
55)A pixel p at coordinates (x, y) has neighbors whose coordinates are given by?
(x+1, y), (x-1, y), (x, y+1), (x, y-1)
This set of pixels is called ____________
a) 4-neighbors of p b) Diagonal neighbors
c) 8-neighbors d) None of the mentioned

56) For pixels p(x, y), q(s, t), the Euclidean distance between p and q is defined as?
a) D(p, q) = [(x – s)2 + (y – t)2]1/2 b) D(p, q) = |x – s| + |y – t|
c) D(p, q) = max (|x – s| + |y – t|) d) None of the mentioned

57)Dilation followed by erosion is called ______.


a) opening b) Closing c) Blurring d) Translation

58)Opening smooths the image’s_______.


a)Pixels b)Lines c)Contour d)Boundary

59)Gradient Magnitude images are useful in


a)Point Detection b) Line Detection c)Area Detection d) Edge detection

60)For Edge detection we use


a)First derivative b) Second derivativec) Third derivative d) Both a) and b)

61)-----------Filter cannot be implemented using convolution mechanism.


a) Average b) Gaussian c) Median d) Disk

62)To remove "salt-and-pepper" noise without blurring we use


a) Max Filter b) Median Filter c) Min Filter d) Smoothing Filter

63)Edge detection in images is commonly accomplished by performing a spatial ------of


the image field.
a) Smoothing Filter b) Integration c) Differentiation d) Min Filter

64)Both the -------- and -------- filters are used to enhance horizontal edges (or vertical if
transposed)
a) Prewitt and Sobel b) Sobel and Gaussian
c) Prewitt and Laplacian d) Sobel and Laplacian

66)Transforming the pixel values of an image using the log ( ) transformation is an


example of contrast compression of the dark pixels
a) True b) False

67)To map a narrow range of low gray-level input image into a wider range of output
levels , we use
a) Log Intensity Transformation Function
b) Power-law Intensity Transformation Function
c) Inverse Log Intensity Transformation Function
d) Identity Intensity Transformation Function

68)The sum of all elements in the mask of the smoothing averaging spatial filtering must
be equal to
a) m rows b) n columns c) m * n d d) 1

69)Sharpening the images is commonly accomplished by performing a spatial -------- of


the image field.
a) Min Filter b) Smoothing Filter
c) Integration d) Differentiation

70)One of the following filters is nonlinear


a) Gaussian Filter b) Averaging Filter
c) Laplacian Filter d) Median

71) Which type of enhancement operations are used to modify pixel values according to
the value of the pixel‘s neighbors?
a) point operations b) local operations
c) global operations d) mask operations

72)In which type of progressive coding technique,graycolor is encoded first and then
other colors are encoded?
a) quality progressive b) resolution progressive
c) component progressive d) region progressive

73)If the pixels of an image are shuffled then the parameter that may change is
a) Histogram b) Mean c) Entropy d) Covariance

74) What is the third step in digital image processing?


(A) Image Restoration (B) Segmentation
(C) Image Enhancement (D) Colour Image Processing

75) To convert a continuous image f(x,y) to digital form, we have to sample the function
in _________
a) Coordinates b) Amplitude c) All of the above d) None of the above

76)Which of the following filter(s) attenuates high frequency while passing low
frequencies of an image?
a) Unsharp mask filter b) Lowpass filter
c) Zero-phase-shift filter d) All of the mentioned

77)A spatial domain filter of the corresponding filter in frequency domain can be
obtained by applying which of the following operation(s) on filter in frequency domain?
a) Fourier transform b) Inverse Fourier transform
c) None of the mentioned d) All of the mentioned

80)Filter that replace the pixel value with medians of intensity level is________.
a)Arithmetic mean filter b) Geometric mean filter
c)Median filter d) Sequence mean filter

81)Color transformation is processed between the____________.


a)Singlecolor model b) Dual color model c) Tri color model d) any color model

82)Color transformation technique is used in ____________.


a)Image processing b)Multispectral image processing
c)Multi image processing d)Spectral image processing

83)Closing is represented by_____.


a)B b) A+B c) A-B d) A.B

84) Reflection and translation of the image object are based on _______.
a)Pixels b) Frames c) Structuring elements d) co-ordinates

85)Image compression comprised of____________.


a)Encoder b) Decoder c) Frame d) Both A & B

86)In the coding redundancy we use ______________.


a)Fixed length code b)Variable length code c)Byte d)Both A & B
87)For line detection, we use that mask is__________________.
a)Gaussian b) Laplacian c) Ideal d) Butterworth

88)Image having gradient pixel is called____________.


Sharp image b) gradient Image c) blur image d) Binary image

89)Points exceeding the threshold in output image are marked as_________.


a)0 b)1 c)11 d)x

90)Exampleof discontinuity approach in image segmentation is__________.


a) edge based segmentation b) boundary based segmentation
c) region based segmentation d) Both a and b

91)Image segmentation is also based on ____________.


a)morphology b)set theory c)extraction d)recognition

92)Image whose principle features are edges is called ___________.


a) orthogonal b) isolated c) edge map d) edge normal

93)Vertical lines are angles at__________.


a) 0 b)30 c)45 d)90

94)If R is the entire region of the image then union of all segmented parts should be
equal to_____.
a)R b) R' c) Ri d) Rn

95)Lines in an image can be oriented at angle___________.


a)0 b) 90 c) 30 d)Both a and b

96)Laplacian images need__________.


a)contraction b) expansion c) scaling d) enhancement

97)Thresholding gives the _____________.


a) large image b) gray scale image c) color image d) binary image

98)Marr hildreth method was introduced in_________.


a)1980 b)1981 c)1982 d)1983

99)Segmentation is a process of______.


a)low level processes b)high level processes
c)mid level processes d) edge level processes

100)Image intensities are normally ranged to


a)[0 1] b) [0 2] c) [0 255] d) [0 256]

101)Accuracy of image segmentation can be improved by the type of______.


a) Processes b) images c) divisions d) sensors

102)During segmentation every pixel of an image should be in_______.


a) connected set b) boundaries c) region d) concerned area

103)Dual mode of operating system has_______.


a) 1 mode b) 2 modes c) 3 modes d) 4 modes

104) Multi-processor system gives a_______.


a) small system b) tightly coupled system c) loosely coupled system d) both a andb
105)Logical extension of multiprogramming operating system is_________.
a) time sharing b) multi-tasking c) single programming d) both a and b

106) Multiprocessor systems have advantage of____________.


a) Increased Throughput b) Expensive hardware
c) operating system d) both a and b

107) Scheduling of threads are done by______.


a)input b)output c) operating system d)memory

108) Multiprogramming of the computer system increases_________.


a) memory b) storage c) CPU utilization d)cost

109) Another type of multiple-CPU system is the_____.


a)mini computer b) Super Computer c) Clustered System d)both a and b

110) Interrupt table of pointers having addresses for each interrupt is located at_____.
a)high memory b) low memory c) mid memory d) both a and b

111) Example of open source operating system is____.


a) UNIX b) Linux c) windows d)both a and b

112) Main memory of the computer system is also called_____.


a) non volatile b) volatile c) reserved d) large

113)A large number of disks in a system improves the rate at which data can be read or
written if ____________
a) the disks are operated on sequentially b) the disks are operated on selectively
c) the disks are operated in parallel d) all of the mentioned

114)RAID stands for ____________


a) Redundant Allocation of Inexpensive Disksb) Redundant Array of Important Disks
c)Redundant Allocation of Independent Disksd)Redundant Array of Independent Disks

115)If the mean time to failure of a single disk is 100,000 hours, then the mean time to
failure of some disk in an array of 100 disks will be ____________
a) 100 hours b) 10 days c) 10 hours d) 1000 hours.

116)The solution to the problem of reliability is the introduction of __________


a) aging b) scheduling c) redundancy d) disks

117)The technique of duplicating every disk is known as ____________


a) mirroring b) shadowing c) redundancy d) all of the mentioned

118)The mean time to failure of a mirrored disk depends on ____________


I) the mean time to failure of individual disks
II) the mean time to repair
a) Only I b) Only II c) Both I and II d) Neither I nor II

119) A single parity bit can be used for ____________


a) detection b) multiple error corrections
c) few error corrections d) all of the mentioned

120)What is a mobile operating system?


a)The type of device you have, whether Apple or Samsung.
b)The application where you purchase new games and software.
c)The foundation on which all of your programs and applications run.
d)The programming behind the computer you use
121) Which of these mobile operating systems is considered ''open-source,'' meaning
that software developers have more freedom to design and build applications and
programs?
a)Android b)iOS c)BlackBerry d)Windows

122) __________________ is a service that lets developers send short message data to


their users on Android devices, without needing a proprietary sync solution.
a) SMS b )MMS c)CAM d )GCM

123)____ is the mechanism of removing process from memory, storing on disk, bringing
back in from disk to continue execution.
a)Scheduling b)Synchronizing c)Swapping d)Dispatching

124)Semaphore is _____ variable.


a)integer b)character c) Boolean d)float

125)Distributed systems have ?


a)high security b)better resource sharing
c)better system utilization d)low system overhead

126)Which amongst the following is not an advantage of Distributed systems?


a)Reliabilityb)Incremental growth c)Resource sharing d)None of the above

127)The request and release of resources are ___________.


a)Command line statements b) interrupts c)system calls d) special programs

128)For Mutual exclusion to prevail in the system :


a)at least one resource must be held in a non sharable mode
b)the processor must be a uniprocessor rather than a multiprocessor
c)there must be at least one resource in a sharable mode
d) All of these

129)Deadlock prevention is a set of methods :


a)to ensure that at least one of the necessary conditions cannot hold
b) to ensure that all of the necessary conditions do not hold
c) to decide if the requested resources for a process have to be given or not
d) to recover from a deadlock

130)If several jobs are ready to run at the same time the system must choose among
them. This decision is called ___
a)Job scheduling b) CPU scheduling c) Program scheduling d) Time scheduling

131)A technique that allows the execution of process that isnot completely in memory is
called______
a)Cache memory b)Physical memory c)Both a&b d)Virtual memory

132) In a distributed computing environment, distributed shared memory is used which


is_____
a) Logical combination of virtual memories on the nodes
b) Logical combination of physical memories on the nodes
c) Logical combination of the secondary memories on all the nodes
d) All of the above

133)Whenever the data is found in the cache memory it is called as ______


a) HIT b) MISS c) FOUND d) ERROR
134)When the data at a location in cache is different from the data located in the main
memory, the cache is called _____________
a) Unique b) Inconsistent c) Variable d) Fault

135)Kernel mode is also called____.


a)Supervisor mode b)System mode c)Privileged mode d)All the above

136)What is the equation of IoT?


a)Physical object + controller, sensors , actuators + Internet
b)Physical object + controller
c)Physical object + compiler+ intranet
d)Physical object only

137)Internet_____.
a) Inter connection of local area networkb) A waste collection of different networks
c) A single network d) Intra connection of local area network

138)Which protocol is used by IoT Devices?


a)UDP b) Both UDP and TCP c) TCP d) Neither UDP nor TCP

139)IOT devices should have the characteristic to be calm, ambient and ubiquitous.
Which means?
a) They are not present everywhere but silently working and not seeking attention
b) They are present everywhere but not silently working and seekingattention.
c) They are present everywhere, silently working not seeking attention.
d) They are present everywhere, silently working and seeking attention.

140)The systems which allow only one process execution at a time, are called
_________?
a) uniprogramming systems b) uniprocessing systems
c) unitasking systems d)all of the above

141)_______ is the ready state of a process?


a) when process is scheduled to run after some execution b) unable to run
c) when process is using the CPU d) none of the mentioned

142) When the operating system selects jobs from the job pool, it loads that job into
––––––––– for execution.
(a) memory (b) interface (c) controller (d) resource

143) ––––––––– and the registers built into the processor itself are the only storage that
the CPU can access directly.
(a) Main Memory (b) Secondary memory (c) Virtual memory (d) Buffer

144) For a deadlock to arise, which of the following conditions must hold
simultaneously?
a) Mutual exclusion b) No pre-emption c) Hold and waitd) All of the mentioned

145)The request and release of resources are ___________


a) command line statements b) interrupts
c) system calls d) special programs

146) In real time operating system ____________


a) all processes have the same priority b)a task must be serviced by its deadline period
c) process scheduling can be done only once d) kernel is not required

147) Which one of the following is a real time operating system?


a) RTLinux b) VxWorks c) Windows CE d) All of the mentioned
148) Which binary format is supported by linux?
a) a.out b) elf c) both a.out and ELF d) none of the mentioned

149) Which one of the following bootloader is not used by linux?


a) GRUB b) LILO c) NTLDR d) None of the mentioned

150) What is Linux?


a) single user, single tasking b) single user, multitasking
c) multi user, single tasking d) multi user, multitasking

151) Data scrubbing is which of the following?


a) A process to reject data from the data warehouse and to create the necessary indexes
b) A process to load the data in the data warehouse and to create the necessary indexes
c) A process to upgrade the quality of data after it is moved into a data warehouse
d) A process to upgrade the quality of data before it is moved into a data warehouse

152)Which of the following features usually applies to data in a data warehouse?


a)Data are often deleted
b)Most applications consist of transactions
c)Data are rarely deleted
d)Relatively few records are processed by applications

153)Which of the following statement is true?


a)The data warehouse consists of data marts and operational data
b)The data warehouse is used as a source for the operational data
c)The operational data are used as a source for the data warehouse
d)All of the above

154)The following is true of three-tier data warehouses:


a)Once created, the data marts will keep on being updated from the data warehouse at
periodic times
b)Once created, the data marts will directly receive their new data from the operational
databases
c)The data marts are different groups of tables in the data warehouse
d)A data mart becomes a data warehouse when it reaches a critical size

155)The following technology is not well-suited for data mining:


a)Expert system technology
b)Data visualization
c)Technology limited to specific data types such as numeric data types
d)Parallel architecture

156)What is true of the multidimensional model?


a)It typically requires less disk storage
b)It typically requires more disk storage
c)Typical business queries requiring aggregate functions take more time
d)Increasing the size of a dimension is difficult

157)The most common source of change data in refreshing a data warehouse is:
a)Querytable change data
b)Cooperative change data
c)Logged change data
d)Snapshot change data

158)Which of the following statements is not true about refreshing a data warehouse:
a)It is a process of managing timing differences between the updating of data sources and the
related data warehouse objects
b)Updates to dimension tables may occur at different times than the fact table
c)The data warehouse administrator has more control over the load time lag than the valid
time lag
d)None of the above

159)A data warehouse is which of the following?


a)Can be updated by end users.
b)Contains numerous naming conventions and formats.
c)Organized around important subject areas.
d)Contains only current data.

160)An operational system is which of the following?


a)A system that is used to run the business in real time and is based on historicaldata.
b) A system that is used to run the business in real time and is based on current data.
c)A system that is used to support decision making and is based on current data.
d)A system that is used to support decision making and is based on historical data.

161)The generic two-level data warehouse architecture includes which of the following?
a)At least one data mart
b)Data that can extracted from numerous internal and external sources
c)Near real-time updates
d)All of the above.

162)The @active data warehouse architecture includes which of the following?


a) at least one data mart
b) data that can extracted from numerous internal and external sources
c) near real-time updates
d)All of the above.

163)Reconciled data is which of the following?


a) Data stored in the various operational systems throughout the organization.
b) Current data intended to be the single source for all decision support systems.
c) Data stored in one operational system in the organization.
d) Data that has been selected and formatted for end-user support applications.

164)Transient data is which of the following?


a) Data in which changes to existing records cause the previous version of the records to be
eliminated
b)Data in which changes to existing records do not cause the previous version of the records
to be eliminated
c)Data that are never altered or deleted once they have been added
d)Data that are never deleted once they have been added

165)The extract process is which of the following?


a)Capturing all of the data contained in various operational systems
b)Capturing a subset of the data contained in various operational systems
c)Capturing all of the data contained in various decision support systems
d)Capturing a subset of the data contained in various decision support systems

166)Data scrubbing is which of the following?


a)A process to reject data from the data warehouse and to create the necessary indexes
b)A process to load the data in the data warehouse and to create the necessary indexes
c)A process to upgrade the quality of data after it is moved into a data warehouse
d)A process to upgrade the quality of data before it is moved into a data warehouse

167)The load and index are which of the following?


A. A process to reject data from the data warehouse and to create the necessary indexes
B. A process to load the data in the data warehouse and to create the necessary indexes
C. A process to upgrade the quality of data after it is moved into a data warehouse
D. A process to upgrade the quality of data before it is moved into a data warehouse

168)Data transformation includes which of the following?


a)A process to change data from a detailed level to a summary level
b)A process to change data from a summary level to a detailed level
c)Joining data from one source into various sources of data
d)Separating data from one source into various sources of data

169)A multifield transformation does which of the following?


a)Converts data from one field into multiple fields
b)Converts data from multiple fields into one field
c)Converts data from multiple fields into multiple fields
d)All of the above

170)A star schema has what type of relationship between a dimension and fact table?
a)Many-to-many b)One-to-one
c)One-to-many d)All of the above

171)Fact tables are which of the following?


a)Completely demoralized b)Partially demoralized
c)Completely normalized d)Partially normalized

172)A snowflake schema is which of the following types of tables?


a)Fact b)Dimension
c)Helper d)All of the above

173)A goal of data mining includes which of the following?


a)To explain some observed event or condition
b)To confirm that data exists
c)To analysed data for expected relationships
d)To create a new data warehouse

174)Which of the following statements does not apply to relational databases?


a)Relational databases are simple to understand
b)Tables are one of the basic components of relational databases
c)Relational databases have a strong procedural orientation
d)Relational databases have a strong mathematical foundation

175)In the relational database terminology, a table is synonymous with:


a)A column b)A row c)An attribute d)A relation

176)A null value indicates:


a)A numeric value with value 0
b)The absence of a value
c)A very small value
d)An erroneous value

177)When the referential integrity rule is enforced, which one is usually not a valid
action in response to the deletion of a row that contains a primary key value referenced
elsewhere?
a)Do not allow the deletion
b)Accept the deletion without any other action
c)Delete the related rows
d)Set the foreign keys of related rows to null

178)When an equi-join is performed on a table of N rows and a table of M rows, the


resulting table has the following number of rows:
a)M b)N c)The smaller of M or N d)A number in the range 0 to M*N

179)What is true about data mining?


a)Data Mining is defined as the procedure of extracting information from huge sets of data
b)Data mining also involves other processes such as Data Cleaning, Data Integration, Data
Transformation
c)Data mining is the procedure of mining knowledge from data.
d)All of the above

180)How many categories of functions involved in Data Mining?


a) 2 b) 3 c) 4 d)5

181)The mapping or classification of a class with some predefined group or class is


known as?
a)Data characterization `b)Data discrimination
c)Data set d)Data Sub Structure

182)The analysis performed to uncover interesting statistical correlations between


associated-attribute-value pairs is called?
a)mining of association b)mining of clusters
c) mining of correlations d) none of the above

183) __________ may be defined as the data objects that do not comply with the general
behaviour or model of the data available.
a)outlier analysis b)evolution analysis
c)prediction d)classification

184) "Efficiency and scalability of data mining algorithms" issues comes under?


a) mining methodology and user interaction issues b)performance issues
c)diverse data types issues d)none of the above

185)To integrate heterogeneous databases, how many approaches are there in Data
Warehousing?
a)2 b)3 c)4 `d) 5

186)Which of the following is correct advantage of Update-Driven Approach in Data


Warehousing?
a)This approach provides high performance.
b) The data can be copied, processed, integrated, annotated, summarized and restructured in
the semantic data store in advance.
c)Both A and B d)None Of the above

187) What is the use of data cleaning?


a)to remove the noisy data b)correct the inconsistencies in data
c) transformations to correct the wrong data. d)all of the above
188)Data Mining System Classification consists of?
a) Database Technology b)Machine Learning
c) Information Science d) All of the above

189)Which of the following is correct application of data mining?


a) Market Analysis and Management
b) Corporate Analysis & Risk Management
c) Fraud Detection
d) All of the above

190) In Data Characterization, class under study is called as?


a) Study Class
b)Intial Class
c) Target Class
d) Final Class

191) A sequence of patterns that occur frequently is known as?


a) Frequent Item Set
b) Frequent Subsequence
c) Frequent Sub Structure
d) All of the above

192) __________ refers to the description and model regularities or trends for objects
whose behaviour changes over time.
a) Outlier Analysis
b) Evolution Analysis
c) Prediction
d) Classification

193) Pattern evaluation issue comes under?


a) Mining Methodology and User Interaction Issues
b) Performance Issues
c) Diverse Data Types Issues
d) None of the above

194)"Handling of relational and complex types of data" issue comes under?


a) Mining Methodology and User Interaction Issues
b) Performance Issues
c) Diverse Data Types Issues
d) None of the above

195)Which of the following is correct disadvantage of Query-Driven Approach in Data


Warehousing?
a) The Query Driven Approach needs complex integration and filtering processes.
b) It is very inefficient and very expensive for frequent queries.
c) This approach is expensive for queries that require aggregations.
d) All of the above

196)The first steps involved in the knowledge discovery is?


a) Data Integration
b) Data Selection
c) Data Transformation
d) Data Cleaning

197)In which step of Knowledge Discovery, multiple data sources are combined?
a)Data Cleaning
b)Data Integration
c)Data Selection
d)Data Transformation

198)DMQL stands for?


a) Data Mining Query Language
b)Dataset Mining Query Language
c)DBMiner Query Language
d) Data Marts Query Language

199)Which of the following features usually applies to data in a data warehouse?


a)Data are often deleted
b)Most applications consist of transactions
c)Data are rarely deleted
d)Relatively few records are processed by applications

200)A star schema has what type of relationship between a dimension and fact table?
a)Many-to-many
b)One-to-one
c)One-to-many
d)All of the above.

201) Which of the following is not an operating system?


a) Windows
b) Linux
c) Oracle
d) DOS

202) What is the maximum length of the filename in DOS?


a)4
b)5
c)8
d)12

203) when was the first operating system developed?


a)1948
b)1949
c)1950
d)1951

204) when were MS windows operating systems proposed?


a)1994
b) 1990
c) 1992
d)1985

205) Which of the following is the extension of Notepad?


a).txt
b).xls
c).ppt
d).bmp

206) What else is a command interpreter called?


a) prompt
b) kernel
c) shell
d) command
207) what is the full name of FAT?
a) File attribute table
b) File allocation table
c) Font attribute table
d) Format allocation table

208) BIOS is used?


a) By operating system
b) By compiler
c) By interpreter
d) By application software

209) what is the mean of the Booting in the operating system?


a) Restarting computer
b) Install the program
c) To scan
d) To turn off

210) when does page fault occur?


a) The page is present in memory.
b) The deadlock occurs.
c) The page does not present in memory.
d) The buffering occurs.

211) Banker's algorithm is used?


a) To prevent deadlock
b) To deadlock recovery
c) To solve the deadlock
d) None of these

212) When you delete a file in your computer, where does it go?
a) Recycle bin
b) Hard disk
c) Taskbar
d) None of these

213) Which is the Linux operating system?


a)Private operating system
b) Windows operating system
c) Open-source operating system
d) None of these

214) What is the full name of the DSM?


a)Direct system module
b)Direct system memory
c)Demoralized system memory
d)Distributed shared memory

215) What is the full name of the IDL?


a) Interface definition language
b) Interface direct language
c) Interface data library
d) None of these

216) What is bootstrapping called?


a)Cold boot
b)Cold hot boot
c)Cold hot strap
d)Hot boot
217) What is the fence register used for?
a)To disk protection
b)To CPU protection
c)To memory protection
d)None of these

218) If the page size increases, the internal fragmentation is also?..?


a)Decreases
b)Increases
c)Remains constant
d)None of these

219) Which of the following is a single-user operating system?


a)Windows
b)MAC
c)Ms-Dos
d)None of these

220) The size of virtual memory is based on which of the following?


a)CPU
b)RAM
c)Address bus
d)Data bus

221) If a page number is not found in the translation lookaside buffer, then it is known
as a?
a)Translation Lookaside Buffer miss
b)Buffer miss
c)Translation Lookaside Buffer hit
d)All of the mentioned

222) Which of the following is not application software?


a)Windows 7
b)WordPad
c)Photoshop
d)MS-excel

223) Which of the following supports Windows 64 bit?


a)Window XP b)Window 2000
c)Window 1998 d)None of these

224) Which of the following windows does not have a start button?
a)Windows 7
b)Windows 8
c)Windows XP
d)None of these

225) Which of the following operating systems does not support more than one program
at a time?
a)Linux b)Windows c)MAC d)DOS

226) Which of the following is a condition that causes deadlock?


a)Mutual exclusion b)Hold and wait
c)Circular wait d)No pre-emption e)All of these

227) Who provides the interface to access the services of the operating system?
a)API
b)System call
c)Library
d)Assembly instruction
228) Where are placed the list of processes that are prepared to be executed and
waiting?
a)Job queue
b)Ready queue
c)Execution queue
d)Process queue

229) Who among the following can block the running process?
a)Fork b)Read c)Down d)All of these

230) Which of the following does not interrupt the running process?
a)Timer interrupt b)Device
c)Power failure d)Scheduler process

231) What is Microsoft window?


a)Operating system b)Graphics program
c)Word Processing d)Database program

232) Which of the following is group of programs?


a)Accessories
b)Paint
c)Word
d)All of above

233) Which of the following is an example of a Real Time Operating System?


a)MAC
b)MS-DOS
c)Windows 10
d)Process Control

234) Which of the following operating systems do you use for a client-server network?
a)MAC
b)Linux
c)Windows XP
d)Windows 2000

235) Which windows was introduced to My Computer?


Windows 10
Windows XP
Windows 95
Windows 98

236) What type of commands are required to perform various tasks in DOS?
a)Internal commands
b)External commands
c)Valuable commands
d)Primary commands

237) What is the number of characters contained in the primary name of the file of MS-
DOS?
a)Up to 8 characters
b)3 characters
c)Up to 10 characters
d)None of the above

238) Which command is used to fetch a group (.doc) of files that have just been deleted?
a)Undelete
b)Undelete/all
c)Undelete *.doc
d)All of above

239) Which of the following is system software?


a)Operating system
b)Compiler
c)Utilities
d)All of the above

240) Which program runs first after booting the computer and loading the GUI?
a)Desktop Manager
b)File Manager
c)Windows Explorer
d)Authentication

241) What is the use of directory structure in the operating system?


a)The directory structure is used to solve the problem of the network connection in OS.
b)It is used to store folders and files hierarchically.
c)It is used to store the program in file format.
d)All of the these

242) What type of scheduling is round-robin scheduling?


a)Linear data scheduling
b)Non-linear data scheduling
c)Preemptive scheduling
d)Non-preemptive scheduling

243) Which conditions must be satisfied to solve a critical section problem?


a)Bounded Waiting
b)Progress
c)Mutual Exclusion
d)All of these.

244) Which of the following options is correct about the windows operating system?
a)Windows is a CUI operating system.
b)Windows is based on CUI.
c)Windows is a GUI operating system.
d)None of the these

245) Which of the following file systems is supported by the windows OS?
a)NTFS
b)FAT32
c)exFAT
d)All of the these
246) Which of the following keys does the user use to switch between applications
running simultaneously in the Windows operating system?
a)FN + TAB
b)ALT + TAB
c)CTRL + TAB
d)SHIFT + TAB

247) Which of the following commands creates an emergency repair disk for Windows
NT 4.0?
a)BAT
b)EXE
c)EXE/S
d)ADD/REMOVE program

248) Which of the following scheduling algorithms is preemptive scheduling?


a)FCFS Scheduling
b)SJF Scheduling
c)Network Scheduling
d)SRTF Scheduling

249) How can you get a printout of the system configuration on windows 9x OS?
a)Open the CMD window, type "MSDN", and press <printscrn>
b)From the device manager, click the print button
c)Open the CMD window, type "SYS", and press <printscrn>
d)None of the these

250) Which of the following operating system runs on the server?


a)Batch OS
b)Distributed OS
c)Real-time OS
d)Network OS

251) What type of memory stores data in a swap file on a hard drive?
a)Secondary memory
b)Virtual memory
c)Low memory
d)RAM

252)What is Digital Image Processing?


a) It’s an application that alters digital videos
b) It’s a software that allows altering digital picture
c) It’s a system that manipulates digital medias
d) It’s a machine that allows altering digital images

253) Which of the following process helps in Image enhancement?


a) Digital Image Processing
b) Analog Image Processing
c) Both a and b
d) None of the above

254)Among the following, functions that can be performed by digital image processing is?
a) Fast image storage and retrieval
b) Controlled viewing
c) Image reformatting
d) All of the above

255) Which of the following is an example of Digital Image Processing?


a) Computer Graphics
b) Pixels
c) Camera Mechanism
d) All of the mentioned

256) What are the categories of digital image processing?


a) Image Enhancement
b) Image Classification and Analysis
c) Image Transformation
d) All of the mentioned

257) How does picture formation in the eye vary from image formation in a camera?
a) Fixed focal length
b) Varying distance between lens and imaging plane
c) No difference
d) Variable focal length
258) What are the names of the various colour image processing categories?
a) Pseudo-color and Multi-color processing
b) Half-color and pseudo-color processing
c) Full-color and pseudo-color processing
d) Half-color and full-color processing

259) Which characteristics are taken together in chromaticity?


a) Hue and Saturation
b) Hue and Brightness
c) Saturation, Hue, and Brightness
d) Saturation and Brightness

260) Which of the following statement describe the term pixel depth?
a) It is the number of units used to represent each pixel in RGB space
b) It is the number of mm used to represent each pixel in RGB space
c) It is the number of bytes used to represent each pixel in RGB space
d) It is the number of bits used to represent each pixel in RGB space

261) The aliasing effect on an image can be reduced using which of the following methods?
a) By reducing the high-frequency components of image by clarifying the image
b) By increasing the high-frequency components of image by clarifying the image
c) By increasing the high-frequency components of image by blurring the image
d) By reducing the high-frequency components of image by blurring the image

262)Which of the following is the first and foremost step in Image Processing?
a) Image acquisition
b) Segmentation
c) Image enhancement
d) Image restoration

263)Which of the following image processing approaches is the fastest, most accurate, and
flexible?
a) Photographic
b) Electronic
c) Digital
d) Optical

264) Which of the following is the next step in image processing after compression?
a) Representation and description
b) Morphological processing
c) Segmentation
d) Wavelets

265)___________ determines the quality of a digital image.


a) The discrete gray levels
b) The number of samples
c) discrete gray levels & number of samples
d) None of the mentioned

266) Image processing involves how many steps?


a) 7
b) 8
c) 13
d) 10

267)Which of the following is the abbreviation of JPEG?


a) Joint Photographic Experts Group
b) Joint Photographs Expansion Group
c) Joint Photographic Expanded Group
d) Joint Photographic Expansion Group

268)Which of the following is the role played by segmentation in image processing?


a) Deals with property in which images are subdivided successively into smaller regions
b) Deals with partitioning an image into its constituent parts or objects
c) Deals with extracting attributes that result in some quantitative information of interest
d) Deals with techniques for reducing the storage required saving an image, or the bandwidth
required transmitting it

269) The digitization process, in which the digital image comprises M rows and N columns,
necessitates choices for M, N, and the number of grey levels per pixel, L. M and N must have
which of the following values?
a) M have to be positive and N have to be negative integer
b) M have to be negative and N have to be positive integer
c) M and N have to be negative integer
d) M and N have to be positive integer

270) Which of the following tool is used in tasks such as zooming, shrinking, rotating, etc.?
a) Filters
b) Sampling
c) Interpolation
d) None of the Mentioned

271)The effect caused by the use of an insufficient number of intensity levels in smooth areas
of a digital image _____________
a) False Contouring
b) Interpolation
c) Gaussian smooth
d) Contouring

272) What is the procedure done on a digital image to alter the values of its individual pixels
known as?
a) Geometric Spacial Transformation
b) Single Pixel Operation
c) Image Registration
d) Neighbourhood Operations

273) Points whose locations are known exactly in the input and reference images are used in
Geometric Spacial Transformation.
a) Known points
b) Key-points
c) Réseau points
d) Tie points

274) ___________ is a commercial use of Image Subtraction.


a) MRI scan
b) CT scan
c) Mask mode radiography
d) None of the Mentioned

275) Approaches to image processing that work directly on the pixels of incoming image
work in ____________
a) Spatial domain
b) Inverse transformation
c) Transform domain
d) None of the Mentioned

276) Which of the following in an image can be removed by using a smoothing filter?
a) Sharp transitions of brightness levels
b) Sharp transitions of gray levels
c) Smooth transitions of gray levels
d) Smooth transitions of brightness levels

277) Region of Interest (ROI) operations is generally known as _______


a) Masking
b) Dilation
c) Shading correction
d) None of the Mentioned

278) Which of the following comes under the application of image blurring?
a) Image segmentation
b) Object motion
c) Object detection
d) Gross representation

279)Which of the following filter’s responses is based on the pixels ranking?


a) Sharpening filters
b) Nonlinear smoothing filters
c) Geometric mean filter
d) Linear smoothing filters

280) Which of the following illustrates three main types of image enhancing functions?
a) Linear, logarithmic and power law
b) Linear, logarithmic and inverse law
c) Linear, exponential and inverse law
d) Power law, logarithmic and inverse law

281) Which of the following is the primary objective of sharpening of an image?


a) Decrease the brightness of the image
b) Increase the brightness of the image
c) Highlight fine details in the image
d) Blurring the image

282) Which of the following operation is done on the pixels in sharpening the image, in the
spatial domain?
a) Differentiation
b) Median
c) Integration
d) Average

283) ________ is the principle objective of Sharpening, to highlight transitions.


a) Brightness
b) Pixel density
c) Composure
d) Intensity

284) _________ enhance Image Differentiation?


a) Pixel Density
b) Contours
c) Edges
d) None of the mentioned

285) Which of the following fact is correct for an image?


a) An image is the multiplication of illumination and reflectance component
b) An image is the subtraction of reflectance component from illumination component
c) An image is the subtraction of illumination component from reflectance component
d) An image is the addition of illumination and reflectance component

286) Which of the following occurs in Unsharp Masking?


a) Subtracting blurred image from original
b) Blurring the original image
c) Adding a mask to the original image
d) All of the mentioned

287) Which of the following makes an image difficult to enhance?


a) Dynamic range of intensity levels
b) High noise
c) Narrow range of intensity levels
d) All of the mentioned

288) _________ is the process of moving a filter mask over the image and computing the
sum of products at each location.
a) Nonlinear spatial filtering
b) Convolution
c) Correlation
d) Linear spatial filtering

289)Which side of the greyscale is the components of the histogram concentrated in a dark
image?
a) Medium
b) Low
c) Evenly distributed
d) High

290) Which of the following is the application of Histogram Equalisation?


a) Blurring
b) Contrast adjustment
c) Image enhancement
d) None of the Mentioned

291)Which of the following is the expansion of PDF, in uniform PDF?


a) Probability Density Function
b) Previously Derived Function
c) Post Derivation Function
d) Portable Document Format

292) ____________ filter is known as averaging filters.


a) Bandpass
b) Low pass
c) High pass
d) None of the Mentioned

293)What is/are the resultant image of a smoothing filter?


a) Image with reduced sharp transitions in gray levels
b) Image with high sharp transitions in gray levels
c) None of the mentioned
d) All of the mentioned

294)The response for linear spatial filtering is given by the relationship __________
a) Difference of filter coefficient’s product and corresponding image pixel under filter mask
b) Product of filter coefficient’s product and corresponding image pixel under filter mask
c) Sum of filter coefficient’s product and corresponding image pixel under filter mask
d) None of the mentioned

295) ___________ is/are the feature(s) of a highpass filtered image.


a) An overall sharper image
b) Have less gray-level variation in smooth areas
c) Emphasized transitional gray-level details
d) All of the mentioned
296) The filter order of a Butterworth lowpass filter determines whether it is a very sharp or
extremely smooth filter function, or an intermediate filter function. Which of the following
filters does the filter approach if the parameter value is very high?
a) Gaussian lowpass filter
b) Ideal lowpass filter
c) Gaussian & Ideal lowpass filters
d) None of the mentioned

297) Which of the following image component is characterized by a slow spatial variation?
a) Reflectance and Illumination components
b) Reflectance component
c) Illumination component
d) None of the mentioned

298) Gamma Correction is defined as __________


a) Light brightness variation
b) A Power-law response phenomenon
c) Inverted Intensity curve
d) None of the Mentioned

299) ____________________ is known as the highlighting the contribution made to total


image by specific bits instead of highlighting intensity-level changes.
a) Bit-plane slicing
b) Intensity Highlighting
c) Byte-Slicing
d) None of the Mentioned

300) Which gray-level transformation increases the dynamic range of gray-level in the
image?
a) Negative transformations
b) Contrast stretching
c) Power-law transformations
d) None of the mentioned

You might also like