THE COURSES
OFFERED BY THE DEPARTMENT
Department of Information Technology
Course Structure for M.Sc. (Information Technology)
Under Choice Based Credit System &OBE
Lect
Course Tutorial Practical Credit
Category Course Type Course Title ure
Code (T) (P) (C)
(L)
Comprehension – 1 Comprehensio
PART-III (Online Exam) P20IT1C1 n in core 1 - - 1
courses
1)A process that involves recognizing and focusing on the important characteristics of a
situation or object is known as:
(a) Encapsulation (b) Polymorphism
(c) Abstraction (d) Inheritance.
2)Which statement is true regarding an object?
(a) An object is what classes instantiated are from
(b) An object is an instance of a class
(c) An object is a variable
(d) An object is a reference to an attribute
(e) An object is not an instance of a class.
3)In object-oriented programming, new classes can be defined by extending existing
classes. This is an example of:
(a) Encapsulation (b) Interface
(c) Composition (d) Inheritance.
4)Which of the following does not belong: If a class inherits from some other class, it
should
(a) Make use of the parent class’s capabilities
(b) Over-ride or add the minimum to accomplish the derived class’ purpose
(c) Over-ride all the methods of its parent class
(d) Make sure the result “IS-A-KIND-OF” its base class
5)Object-oriented inheritance models the
(a) “is a kind of” relationship
(b) “has a” relationship
(c) “want to be” relationship
(d) inheritance does not describe any kind of relationship between classes
6)The wrapping up of data and functions into a single unit is called
(a) Encapsulation (b) Abstraction
(c) Data Hiding (d) Polymorphism
7)Polymorphism
(a) Is not supported by Java
(b) Refers to the ability of two or more objects belonging to different classes to respond to
exactly the same message in different class-specific ways
(c) Simplifies code maintenance
(d) Refers to the ability of two or more objects belonging to different classes to respond to
exactly the same message in different class-specific ways and simplifies code maintenance.
8)Given a class named student, which of the following is a valid constructor declaration
for the class?
(a) Student (student s) { } (b) Student student ( ) { }
(c) Private final student ( ) { } (d) Void student ( ) { }
9)What is garbage collection in the context of Java?
(a) The operating system periodically deletes all of the java files available on the system.
(b) Any package imported in a program and not used is automatically deleted.
(c) When all references to an object are gone, the memory used by the object is automatically
reclaimed.
(d) The JVM checks the output of any Java program and deletes anything that doesn’t make
sense.
10)The concept of multiple inheritances is implemented in Java by
I. Extending two or more classes.
II. Extending one class and implementing one or more interfaces.
III. Implementing two or more interfaces.
(a) Only (II) (b) (I) and (II) (c) (II) and (III)(d) Only (I)
11)In Java, declaring a class abstract is useful
(a) To prevent developers from further extending the class
(b) When it doesn’t make sense to have objects of that class
(c) When default implementations of some methods are not desirable
(d) To force developers to extend the class not to use its capabilities
12)A package is a collection of
(a) Classes (b) Interfaces (c) Editing tools
(d) Classes and interfaces (e) Editing tools and interfaces
13)Basic Java language functions are stored in which of the following java package?
(a) java.lang (b) java.io (c) java.net (d) java.util
14)Which of the following is a member of the java.lang package?
(a) List (b) Queue (c) Math (d) Stack.
15)URL stands for
(a) Universal reader locator (b) Universal reform loader
(c) Uniform resource loader (d) Uniform resource locator
16)What is the sequence of major events in the life of an applet?
(a) init, start, stop, destroy (b) start, init , stop , destroy
(c) init, start , destroy, stop (d) init, start, destroy
17)Which of the following is true in regard to applet execution?
(a) Applets loaded from the same computer where they are executing have the same
restrictions as applets loaded from the network.
(b) Applets loaded and executing locally have none of the restrictions faced by applets that
get loaded from the network.
(c) Applets loaded and executing locally have some restrictions faced by applets that get
loaded from the network.
(d) Applets can’t react to user input and change dynamically
18)What is the return type of the method getID() defined in AWTEvent class
(a) Int (b) long (c) Object (d) Component
19) Which of the following events will cause a thread to die?
(a) The method sleep( ) is called (b) The method wait( ) is called
(c) Execution of the start( ) method ends (d) Execution of the run( ) method ends
20)What will be the result of the expression 13 & 25?
(a) 38 (b) 25 (c) 9 (d) 12
21)Which of the following statements are true regarding the finalize( ) method?
(a) The finalize ( ) method must be declared with protected accessibility
(b) The compiler will fail to compile the code that explicitly tries to call the finalize( )
method
(c) The body of the finalize ( ) method can only access other objects that are eligible for
garbage collection
(d) The finalize ( ) method can be overloaded
22) Which one of these is a valid method declaration?
(a)void method1 (b)void method2()
(c)void method3(void) (d)method4()
23) What will be the result of attempting to compile the following program?
public class MyClass {
long var;
public void MyClass(long param) { var = param; } //(1)
public static void main(String[] args) {
MyClassa,b;
a = new MyClass(); //(2)
b = new MyClass(5); //(3)
}
}
(a)A compilation ERROR will occur at (1), since constructors cannot specify a return value
(b)A compilation error will occur at (2), since the class does not have a default constructor
(c)A compilation error will occur at (3), since the class does not have a constructor which
takes one argument of type int
(d)The program will compile correctly
24) Which of these methods is a part of Abstract Window Toolkit (AWT)?
a) display b) paint c) drawstring d) transient
25)Which of these modifierscan be used for a variableso that it can be accessed from any
thread or parts of a program?
a) transient b) volatile c) global d) No modifier is needed
26)Which of these operators can be used to get run time information about an Object?
a)getInfo b)Info c)instanceOf d)getinfoof
27)What is the message is displayed in the applet made by this program?
import java.awt.*;
import java.applet.*;
public class myapplet extends Applet {
public void paint(Graphics g) {
g.drawString("A Simple Applet", 20, 20);
}
}
a) a simple applet b) a simple applet 20 20 c) compilation error d) runtime error
28) Where are the following four methods commonly used?
1) public void add(Component c)
2) public void setSize(int width,int height)
3) public void setLayout(LayoutManager m)
4) public void setVisible(boolean)
a) Graphics class b) Component class c) Both A & B d) None of the above
29)Which object of HttpSession can be used to view and manipulate information about
a session?
a)session identifier b)creation time c) last accessed time d)All mentioned above
30)Which is the container that doesn't contain title bar and MenuBars but it can have
other components like button, textfield etc?
a) Window b) Frame c) Panel d) Container
31) Which of these ways used to communicate from an applet to servlet?
a) RMI Communication b) HTTP Communication
c) Socket Communication d) All mentioned above
32)Give the abbreviation of AWT?
a) Applet Windowing Toolkitb) Abstract Windowing Toolkit
c) Absolute Windowing Toolkit d) None of the above
33)Which method is used to set the graphics current color to the specified color in the
graphics class?
a) public abstract void setFont(Font font)
b) public abstract void setColor(Color c)
c) public abstract void drawString(String str, int x, int y)
d) None of the above
34)In Graphics class which method is used to draws a rectangle with the specified width
and height?
a) public void drawRect(int x, int y, int width, int height)
b)public abstract void fillRect(int x, int y, int width, int height)
c) public abstract void drawLine(int x1, int y1, int x2, int y2)
d) public abstract void drawOval(int x, int y, int width, int height)
35)Which object can be constructed to show any number of choices in the visible
window?
a) Labels b) Choice c) List d) Checkbox
36)Which is used to store data and partial results, as well as to perform dynamic
linking, return values for methods, and dispatch exceptions?
a)Window b) Panel c) Frame d)Container
37)Which class is used for this Processing Method processActionEvent( )?
a)Button,List,MenuItem b)Button,Checkbox,Choice
c)Scrollbar,Component,Button d)None of the above
38)Which of these keywords must be used to monitor for exceptions?
a) tryb) finallyc) throwd) catch
39)When does Exceptions in java arises in code sequence?
a) Runtimeb) Compile time c) occur at any time d) None of the mentioned
40)Which of these is a super class of all exceptional type classes?
a) Stringb) Runtime Exceptions c) Throwable d) Catchable
41)What is the name of the method that is used to start the execution of a thread?
a) startb) runc) init()d) none of these e)resume
42)Which method registers a thread in a thread scheduler?
a)Construct b)Start c)run d)register e)none of the above
43)Which method is called internally by Thread start() method?
a)execute() b)run() c)launch() d)start()
44)What is maximum thread priority in Java?
a)10 b)12 c)5 d)8
45)Which method must be implemented by a Java thread?
a)run() b)execute() c)start() d)none
46)Execution of a java thread begins on which method call?
a)start( ) b)run( ) c)execute( ) d)launch ( )
47)What are the major components of the JDBC?
a)DriverManager, Driver, Connection, Statement, and ResultSet
b)DriverManager, Driver, Connection, and Statement
c)DriverManager, Statement, and ResultSet
d)DriverManager, Connection, Statement, and ResultSet
48)Select the packages in which JDBC classes are defined?
a)jdbc and javax.jdbc b)rdb and javax.rdb
c)jdbc and java.jdbc.sql d)sql and javax.sql
49) Thin driver is also known as?
a)Type 3 Driver b)Type-2 Driver c)Type-4 Driver d)Type-1 Driver
50) Java supports RMI, RMI Stands for?
a) Random Method Invocation b)Remote Memory Interface
c) Remote Method Invocation d) Random Method Invocation
51)The spatial coordinates of a digital image (x,y) are proportional to:
a) Position b) Brightness c) Contrast d) Noise
52)Among the following image processing techniques which is fast, precise and flexible.
a) Optical b) Digital c) Electronic d) Photographic
53)Using gray-level transformation, the basic function linearity deals with which of the
following transformation?
a) log and inverse-log transformations
b) negative and identity transformations
c) nth and nth root transformations
d) All of the mentioned
54)The technique of Enhancement that has a specified Histogram processed image as
result, is called?
a) Histogram Linearization b) Histogram Equalization
c) Histogram Matching d) None of the mentioned
55)A pixel p at coordinates (x, y) has neighbors whose coordinates are given by?
(x+1, y), (x-1, y), (x, y+1), (x, y-1)
This set of pixels is called ____________
a) 4-neighbors of p b) Diagonal neighbors
c) 8-neighbors d) None of the mentioned
56) For pixels p(x, y), q(s, t), the Euclidean distance between p and q is defined as?
a) D(p, q) = [(x – s)2 + (y – t)2]1/2 b) D(p, q) = |x – s| + |y – t|
c) D(p, q) = max (|x – s| + |y – t|) d) None of the mentioned
57)Dilation followed by erosion is called ______.
a) opening b) Closing c) Blurring d) Translation
58)Opening smooths the image’s_______.
a)Pixels b)Lines c)Contour d)Boundary
59)Gradient Magnitude images are useful in
a)Point Detection b) Line Detection c)Area Detection d) Edge detection
60)For Edge detection we use
a)First derivative b) Second derivativec) Third derivative d) Both a) and b)
61)-----------Filter cannot be implemented using convolution mechanism.
a) Average b) Gaussian c) Median d) Disk
62)To remove "salt-and-pepper" noise without blurring we use
a) Max Filter b) Median Filter c) Min Filter d) Smoothing Filter
63)Edge detection in images is commonly accomplished by performing a spatial ------of
the image field.
a) Smoothing Filter b) Integration c) Differentiation d) Min Filter
64)Both the -------- and -------- filters are used to enhance horizontal edges (or vertical if
transposed)
a) Prewitt and Sobel b) Sobel and Gaussian
c) Prewitt and Laplacian d) Sobel and Laplacian
66)Transforming the pixel values of an image using the log ( ) transformation is an
example of contrast compression of the dark pixels
a) True b) False
67)To map a narrow range of low gray-level input image into a wider range of output
levels , we use
a) Log Intensity Transformation Function
b) Power-law Intensity Transformation Function
c) Inverse Log Intensity Transformation Function
d) Identity Intensity Transformation Function
68)The sum of all elements in the mask of the smoothing averaging spatial filtering must
be equal to
a) m rows b) n columns c) m * n d d) 1
69)Sharpening the images is commonly accomplished by performing a spatial -------- of
the image field.
a) Min Filter b) Smoothing Filter
c) Integration d) Differentiation
70)One of the following filters is nonlinear
a) Gaussian Filter b) Averaging Filter
c) Laplacian Filter d) Median
71) Which type of enhancement operations are used to modify pixel values according to
the value of the pixel‘s neighbors?
a) point operations b) local operations
c) global operations d) mask operations
72)In which type of progressive coding technique,graycolor is encoded first and then
other colors are encoded?
a) quality progressive b) resolution progressive
c) component progressive d) region progressive
73)If the pixels of an image are shuffled then the parameter that may change is
a) Histogram b) Mean c) Entropy d) Covariance
74) What is the third step in digital image processing?
(A) Image Restoration (B) Segmentation
(C) Image Enhancement (D) Colour Image Processing
75) To convert a continuous image f(x,y) to digital form, we have to sample the function
in _________
a) Coordinates b) Amplitude c) All of the above d) None of the above
76)Which of the following filter(s) attenuates high frequency while passing low
frequencies of an image?
a) Unsharp mask filter b) Lowpass filter
c) Zero-phase-shift filter d) All of the mentioned
77)A spatial domain filter of the corresponding filter in frequency domain can be
obtained by applying which of the following operation(s) on filter in frequency domain?
a) Fourier transform b) Inverse Fourier transform
c) None of the mentioned d) All of the mentioned
80)Filter that replace the pixel value with medians of intensity level is________.
a)Arithmetic mean filter b) Geometric mean filter
c)Median filter d) Sequence mean filter
81)Color transformation is processed between the____________.
a)Singlecolor model b) Dual color model c) Tri color model d) any color model
82)Color transformation technique is used in ____________.
a)Image processing b)Multispectral image processing
c)Multi image processing d)Spectral image processing
83)Closing is represented by_____.
a)B b) A+B c) A-B d) A.B
84) Reflection and translation of the image object are based on _______.
a)Pixels b) Frames c) Structuring elements d) co-ordinates
85)Image compression comprised of____________.
a)Encoder b) Decoder c) Frame d) Both A & B
86)In the coding redundancy we use ______________.
a)Fixed length code b)Variable length code c)Byte d)Both A & B
87)For line detection, we use that mask is__________________.
a)Gaussian b) Laplacian c) Ideal d) Butterworth
88)Image having gradient pixel is called____________.
Sharp image b) gradient Image c) blur image d) Binary image
89)Points exceeding the threshold in output image are marked as_________.
a)0 b)1 c)11 d)x
90)Exampleof discontinuity approach in image segmentation is__________.
a) edge based segmentation b) boundary based segmentation
c) region based segmentation d) Both a and b
91)Image segmentation is also based on ____________.
a)morphology b)set theory c)extraction d)recognition
92)Image whose principle features are edges is called ___________.
a) orthogonal b) isolated c) edge map d) edge normal
93)Vertical lines are angles at__________.
a) 0 b)30 c)45 d)90
94)If R is the entire region of the image then union of all segmented parts should be
equal to_____.
a)R b) R' c) Ri d) Rn
95)Lines in an image can be oriented at angle___________.
a)0 b) 90 c) 30 d)Both a and b
96)Laplacian images need__________.
a)contraction b) expansion c) scaling d) enhancement
97)Thresholding gives the _____________.
a) large image b) gray scale image c) color image d) binary image
98)Marr hildreth method was introduced in_________.
a)1980 b)1981 c)1982 d)1983
99)Segmentation is a process of______.
a)low level processes b)high level processes
c)mid level processes d) edge level processes
100)Image intensities are normally ranged to
a)[0 1] b) [0 2] c) [0 255] d) [0 256]
101)Accuracy of image segmentation can be improved by the type of______.
a) Processes b) images c) divisions d) sensors
102)During segmentation every pixel of an image should be in_______.
a) connected set b) boundaries c) region d) concerned area
103)Dual mode of operating system has_______.
a) 1 mode b) 2 modes c) 3 modes d) 4 modes
104) Multi-processor system gives a_______.
a) small system b) tightly coupled system c) loosely coupled system d) both a andb
105)Logical extension of multiprogramming operating system is_________.
a) time sharing b) multi-tasking c) single programming d) both a and b
106) Multiprocessor systems have advantage of____________.
a) Increased Throughput b) Expensive hardware
c) operating system d) both a and b
107) Scheduling of threads are done by______.
a)input b)output c) operating system d)memory
108) Multiprogramming of the computer system increases_________.
a) memory b) storage c) CPU utilization d)cost
109) Another type of multiple-CPU system is the_____.
a)mini computer b) Super Computer c) Clustered System d)both a and b
110) Interrupt table of pointers having addresses for each interrupt is located at_____.
a)high memory b) low memory c) mid memory d) both a and b
111) Example of open source operating system is____.
a) UNIX b) Linux c) windows d)both a and b
112) Main memory of the computer system is also called_____.
a) non volatile b) volatile c) reserved d) large
113)A large number of disks in a system improves the rate at which data can be read or
written if ____________
a) the disks are operated on sequentially b) the disks are operated on selectively
c) the disks are operated in parallel d) all of the mentioned
114)RAID stands for ____________
a) Redundant Allocation of Inexpensive Disksb) Redundant Array of Important Disks
c)Redundant Allocation of Independent Disksd)Redundant Array of Independent Disks
115)If the mean time to failure of a single disk is 100,000 hours, then the mean time to
failure of some disk in an array of 100 disks will be ____________
a) 100 hours b) 10 days c) 10 hours d) 1000 hours.
116)The solution to the problem of reliability is the introduction of __________
a) aging b) scheduling c) redundancy d) disks
117)The technique of duplicating every disk is known as ____________
a) mirroring b) shadowing c) redundancy d) all of the mentioned
118)The mean time to failure of a mirrored disk depends on ____________
I) the mean time to failure of individual disks
II) the mean time to repair
a) Only I b) Only II c) Both I and II d) Neither I nor II
119) A single parity bit can be used for ____________
a) detection b) multiple error corrections
c) few error corrections d) all of the mentioned
120)What is a mobile operating system?
a)The type of device you have, whether Apple or Samsung.
b)The application where you purchase new games and software.
c)The foundation on which all of your programs and applications run.
d)The programming behind the computer you use
121) Which of these mobile operating systems is considered ''open-source,'' meaning
that software developers have more freedom to design and build applications and
programs?
a)Android b)iOS c)BlackBerry d)Windows
122) __________________ is a service that lets developers send short message data to
their users on Android devices, without needing a proprietary sync solution.
a) SMS b )MMS c)CAM d )GCM
123)____ is the mechanism of removing process from memory, storing on disk, bringing
back in from disk to continue execution.
a)Scheduling b)Synchronizing c)Swapping d)Dispatching
124)Semaphore is _____ variable.
a)integer b)character c) Boolean d)float
125)Distributed systems have ?
a)high security b)better resource sharing
c)better system utilization d)low system overhead
126)Which amongst the following is not an advantage of Distributed systems?
a)Reliabilityb)Incremental growth c)Resource sharing d)None of the above
127)The request and release of resources are ___________.
a)Command line statements b) interrupts c)system calls d) special programs
128)For Mutual exclusion to prevail in the system :
a)at least one resource must be held in a non sharable mode
b)the processor must be a uniprocessor rather than a multiprocessor
c)there must be at least one resource in a sharable mode
d) All of these
129)Deadlock prevention is a set of methods :
a)to ensure that at least one of the necessary conditions cannot hold
b) to ensure that all of the necessary conditions do not hold
c) to decide if the requested resources for a process have to be given or not
d) to recover from a deadlock
130)If several jobs are ready to run at the same time the system must choose among
them. This decision is called ___
a)Job scheduling b) CPU scheduling c) Program scheduling d) Time scheduling
131)A technique that allows the execution of process that isnot completely in memory is
called______
a)Cache memory b)Physical memory c)Both a&b d)Virtual memory
132) In a distributed computing environment, distributed shared memory is used which
is_____
a) Logical combination of virtual memories on the nodes
b) Logical combination of physical memories on the nodes
c) Logical combination of the secondary memories on all the nodes
d) All of the above
133)Whenever the data is found in the cache memory it is called as ______
a) HIT b) MISS c) FOUND d) ERROR
134)When the data at a location in cache is different from the data located in the main
memory, the cache is called _____________
a) Unique b) Inconsistent c) Variable d) Fault
135)Kernel mode is also called____.
a)Supervisor mode b)System mode c)Privileged mode d)All the above
136)What is the equation of IoT?
a)Physical object + controller, sensors , actuators + Internet
b)Physical object + controller
c)Physical object + compiler+ intranet
d)Physical object only
137)Internet_____.
a) Inter connection of local area networkb) A waste collection of different networks
c) A single network d) Intra connection of local area network
138)Which protocol is used by IoT Devices?
a)UDP b) Both UDP and TCP c) TCP d) Neither UDP nor TCP
139)IOT devices should have the characteristic to be calm, ambient and ubiquitous.
Which means?
a) They are not present everywhere but silently working and not seeking attention
b) They are present everywhere but not silently working and seekingattention.
c) They are present everywhere, silently working not seeking attention.
d) They are present everywhere, silently working and seeking attention.
140)The systems which allow only one process execution at a time, are called
_________?
a) uniprogramming systems b) uniprocessing systems
c) unitasking systems d)all of the above
141)_______ is the ready state of a process?
a) when process is scheduled to run after some execution b) unable to run
c) when process is using the CPU d) none of the mentioned
142) When the operating system selects jobs from the job pool, it loads that job into
––––––––– for execution.
(a) memory (b) interface (c) controller (d) resource
143) ––––––––– and the registers built into the processor itself are the only storage that
the CPU can access directly.
(a) Main Memory (b) Secondary memory (c) Virtual memory (d) Buffer
144) For a deadlock to arise, which of the following conditions must hold
simultaneously?
a) Mutual exclusion b) No pre-emption c) Hold and waitd) All of the mentioned
145)The request and release of resources are ___________
a) command line statements b) interrupts
c) system calls d) special programs
146) In real time operating system ____________
a) all processes have the same priority b)a task must be serviced by its deadline period
c) process scheduling can be done only once d) kernel is not required
147) Which one of the following is a real time operating system?
a) RTLinux b) VxWorks c) Windows CE d) All of the mentioned
148) Which binary format is supported by linux?
a) a.out b) elf c) both a.out and ELF d) none of the mentioned
149) Which one of the following bootloader is not used by linux?
a) GRUB b) LILO c) NTLDR d) None of the mentioned
150) What is Linux?
a) single user, single tasking b) single user, multitasking
c) multi user, single tasking d) multi user, multitasking
151) Data scrubbing is which of the following?
a) A process to reject data from the data warehouse and to create the necessary indexes
b) A process to load the data in the data warehouse and to create the necessary indexes
c) A process to upgrade the quality of data after it is moved into a data warehouse
d) A process to upgrade the quality of data before it is moved into a data warehouse
152)Which of the following features usually applies to data in a data warehouse?
a)Data are often deleted
b)Most applications consist of transactions
c)Data are rarely deleted
d)Relatively few records are processed by applications
153)Which of the following statement is true?
a)The data warehouse consists of data marts and operational data
b)The data warehouse is used as a source for the operational data
c)The operational data are used as a source for the data warehouse
d)All of the above
154)The following is true of three-tier data warehouses:
a)Once created, the data marts will keep on being updated from the data warehouse at
periodic times
b)Once created, the data marts will directly receive their new data from the operational
databases
c)The data marts are different groups of tables in the data warehouse
d)A data mart becomes a data warehouse when it reaches a critical size
155)The following technology is not well-suited for data mining:
a)Expert system technology
b)Data visualization
c)Technology limited to specific data types such as numeric data types
d)Parallel architecture
156)What is true of the multidimensional model?
a)It typically requires less disk storage
b)It typically requires more disk storage
c)Typical business queries requiring aggregate functions take more time
d)Increasing the size of a dimension is difficult
157)The most common source of change data in refreshing a data warehouse is:
a)Querytable change data
b)Cooperative change data
c)Logged change data
d)Snapshot change data
158)Which of the following statements is not true about refreshing a data warehouse:
a)It is a process of managing timing differences between the updating of data sources and the
related data warehouse objects
b)Updates to dimension tables may occur at different times than the fact table
c)The data warehouse administrator has more control over the load time lag than the valid
time lag
d)None of the above
159)A data warehouse is which of the following?
a)Can be updated by end users.
b)Contains numerous naming conventions and formats.
c)Organized around important subject areas.
d)Contains only current data.
160)An operational system is which of the following?
a)A system that is used to run the business in real time and is based on historicaldata.
b) A system that is used to run the business in real time and is based on current data.
c)A system that is used to support decision making and is based on current data.
d)A system that is used to support decision making and is based on historical data.
161)The generic two-level data warehouse architecture includes which of the following?
a)At least one data mart
b)Data that can extracted from numerous internal and external sources
c)Near real-time updates
d)All of the above.
162)The @active data warehouse architecture includes which of the following?
a) at least one data mart
b) data that can extracted from numerous internal and external sources
c) near real-time updates
d)All of the above.
163)Reconciled data is which of the following?
a) Data stored in the various operational systems throughout the organization.
b) Current data intended to be the single source for all decision support systems.
c) Data stored in one operational system in the organization.
d) Data that has been selected and formatted for end-user support applications.
164)Transient data is which of the following?
a) Data in which changes to existing records cause the previous version of the records to be
eliminated
b)Data in which changes to existing records do not cause the previous version of the records
to be eliminated
c)Data that are never altered or deleted once they have been added
d)Data that are never deleted once they have been added
165)The extract process is which of the following?
a)Capturing all of the data contained in various operational systems
b)Capturing a subset of the data contained in various operational systems
c)Capturing all of the data contained in various decision support systems
d)Capturing a subset of the data contained in various decision support systems
166)Data scrubbing is which of the following?
a)A process to reject data from the data warehouse and to create the necessary indexes
b)A process to load the data in the data warehouse and to create the necessary indexes
c)A process to upgrade the quality of data after it is moved into a data warehouse
d)A process to upgrade the quality of data before it is moved into a data warehouse
167)The load and index are which of the following?
A. A process to reject data from the data warehouse and to create the necessary indexes
B. A process to load the data in the data warehouse and to create the necessary indexes
C. A process to upgrade the quality of data after it is moved into a data warehouse
D. A process to upgrade the quality of data before it is moved into a data warehouse
168)Data transformation includes which of the following?
a)A process to change data from a detailed level to a summary level
b)A process to change data from a summary level to a detailed level
c)Joining data from one source into various sources of data
d)Separating data from one source into various sources of data
169)A multifield transformation does which of the following?
a)Converts data from one field into multiple fields
b)Converts data from multiple fields into one field
c)Converts data from multiple fields into multiple fields
d)All of the above
170)A star schema has what type of relationship between a dimension and fact table?
a)Many-to-many b)One-to-one
c)One-to-many d)All of the above
171)Fact tables are which of the following?
a)Completely demoralized b)Partially demoralized
c)Completely normalized d)Partially normalized
172)A snowflake schema is which of the following types of tables?
a)Fact b)Dimension
c)Helper d)All of the above
173)A goal of data mining includes which of the following?
a)To explain some observed event or condition
b)To confirm that data exists
c)To analysed data for expected relationships
d)To create a new data warehouse
174)Which of the following statements does not apply to relational databases?
a)Relational databases are simple to understand
b)Tables are one of the basic components of relational databases
c)Relational databases have a strong procedural orientation
d)Relational databases have a strong mathematical foundation
175)In the relational database terminology, a table is synonymous with:
a)A column b)A row c)An attribute d)A relation
176)A null value indicates:
a)A numeric value with value 0
b)The absence of a value
c)A very small value
d)An erroneous value
177)When the referential integrity rule is enforced, which one is usually not a valid
action in response to the deletion of a row that contains a primary key value referenced
elsewhere?
a)Do not allow the deletion
b)Accept the deletion without any other action
c)Delete the related rows
d)Set the foreign keys of related rows to null
178)When an equi-join is performed on a table of N rows and a table of M rows, the
resulting table has the following number of rows:
a)M b)N c)The smaller of M or N d)A number in the range 0 to M*N
179)What is true about data mining?
a)Data Mining is defined as the procedure of extracting information from huge sets of data
b)Data mining also involves other processes such as Data Cleaning, Data Integration, Data
Transformation
c)Data mining is the procedure of mining knowledge from data.
d)All of the above
180)How many categories of functions involved in Data Mining?
a) 2 b) 3 c) 4 d)5
181)The mapping or classification of a class with some predefined group or class is
known as?
a)Data characterization `b)Data discrimination
c)Data set d)Data Sub Structure
182)The analysis performed to uncover interesting statistical correlations between
associated-attribute-value pairs is called?
a)mining of association b)mining of clusters
c) mining of correlations d) none of the above
183) __________ may be defined as the data objects that do not comply with the general
behaviour or model of the data available.
a)outlier analysis b)evolution analysis
c)prediction d)classification
184) "Efficiency and scalability of data mining algorithms" issues comes under?
a) mining methodology and user interaction issues b)performance issues
c)diverse data types issues d)none of the above
185)To integrate heterogeneous databases, how many approaches are there in Data
Warehousing?
a)2 b)3 c)4 `d) 5
186)Which of the following is correct advantage of Update-Driven Approach in Data
Warehousing?
a)This approach provides high performance.
b) The data can be copied, processed, integrated, annotated, summarized and restructured in
the semantic data store in advance.
c)Both A and B d)None Of the above
187) What is the use of data cleaning?
a)to remove the noisy data b)correct the inconsistencies in data
c) transformations to correct the wrong data. d)all of the above
188)Data Mining System Classification consists of?
a) Database Technology b)Machine Learning
c) Information Science d) All of the above
189)Which of the following is correct application of data mining?
a) Market Analysis and Management
b) Corporate Analysis & Risk Management
c) Fraud Detection
d) All of the above
190) In Data Characterization, class under study is called as?
a) Study Class
b)Intial Class
c) Target Class
d) Final Class
191) A sequence of patterns that occur frequently is known as?
a) Frequent Item Set
b) Frequent Subsequence
c) Frequent Sub Structure
d) All of the above
192) __________ refers to the description and model regularities or trends for objects
whose behaviour changes over time.
a) Outlier Analysis
b) Evolution Analysis
c) Prediction
d) Classification
193) Pattern evaluation issue comes under?
a) Mining Methodology and User Interaction Issues
b) Performance Issues
c) Diverse Data Types Issues
d) None of the above
194)"Handling of relational and complex types of data" issue comes under?
a) Mining Methodology and User Interaction Issues
b) Performance Issues
c) Diverse Data Types Issues
d) None of the above
195)Which of the following is correct disadvantage of Query-Driven Approach in Data
Warehousing?
a) The Query Driven Approach needs complex integration and filtering processes.
b) It is very inefficient and very expensive for frequent queries.
c) This approach is expensive for queries that require aggregations.
d) All of the above
196)The first steps involved in the knowledge discovery is?
a) Data Integration
b) Data Selection
c) Data Transformation
d) Data Cleaning
197)In which step of Knowledge Discovery, multiple data sources are combined?
a)Data Cleaning
b)Data Integration
c)Data Selection
d)Data Transformation
198)DMQL stands for?
a) Data Mining Query Language
b)Dataset Mining Query Language
c)DBMiner Query Language
d) Data Marts Query Language
199)Which of the following features usually applies to data in a data warehouse?
a)Data are often deleted
b)Most applications consist of transactions
c)Data are rarely deleted
d)Relatively few records are processed by applications
200)A star schema has what type of relationship between a dimension and fact table?
a)Many-to-many
b)One-to-one
c)One-to-many
d)All of the above.
201) Which of the following is not an operating system?
a) Windows
b) Linux
c) Oracle
d) DOS
202) What is the maximum length of the filename in DOS?
a)4
b)5
c)8
d)12
203) when was the first operating system developed?
a)1948
b)1949
c)1950
d)1951
204) when were MS windows operating systems proposed?
a)1994
b) 1990
c) 1992
d)1985
205) Which of the following is the extension of Notepad?
a).txt
b).xls
c).ppt
d).bmp
206) What else is a command interpreter called?
a) prompt
b) kernel
c) shell
d) command
207) what is the full name of FAT?
a) File attribute table
b) File allocation table
c) Font attribute table
d) Format allocation table
208) BIOS is used?
a) By operating system
b) By compiler
c) By interpreter
d) By application software
209) what is the mean of the Booting in the operating system?
a) Restarting computer
b) Install the program
c) To scan
d) To turn off
210) when does page fault occur?
a) The page is present in memory.
b) The deadlock occurs.
c) The page does not present in memory.
d) The buffering occurs.
211) Banker's algorithm is used?
a) To prevent deadlock
b) To deadlock recovery
c) To solve the deadlock
d) None of these
212) When you delete a file in your computer, where does it go?
a) Recycle bin
b) Hard disk
c) Taskbar
d) None of these
213) Which is the Linux operating system?
a)Private operating system
b) Windows operating system
c) Open-source operating system
d) None of these
214) What is the full name of the DSM?
a)Direct system module
b)Direct system memory
c)Demoralized system memory
d)Distributed shared memory
215) What is the full name of the IDL?
a) Interface definition language
b) Interface direct language
c) Interface data library
d) None of these
216) What is bootstrapping called?
a)Cold boot
b)Cold hot boot
c)Cold hot strap
d)Hot boot
217) What is the fence register used for?
a)To disk protection
b)To CPU protection
c)To memory protection
d)None of these
218) If the page size increases, the internal fragmentation is also?..?
a)Decreases
b)Increases
c)Remains constant
d)None of these
219) Which of the following is a single-user operating system?
a)Windows
b)MAC
c)Ms-Dos
d)None of these
220) The size of virtual memory is based on which of the following?
a)CPU
b)RAM
c)Address bus
d)Data bus
221) If a page number is not found in the translation lookaside buffer, then it is known
as a?
a)Translation Lookaside Buffer miss
b)Buffer miss
c)Translation Lookaside Buffer hit
d)All of the mentioned
222) Which of the following is not application software?
a)Windows 7
b)WordPad
c)Photoshop
d)MS-excel
223) Which of the following supports Windows 64 bit?
a)Window XP b)Window 2000
c)Window 1998 d)None of these
224) Which of the following windows does not have a start button?
a)Windows 7
b)Windows 8
c)Windows XP
d)None of these
225) Which of the following operating systems does not support more than one program
at a time?
a)Linux b)Windows c)MAC d)DOS
226) Which of the following is a condition that causes deadlock?
a)Mutual exclusion b)Hold and wait
c)Circular wait d)No pre-emption e)All of these
227) Who provides the interface to access the services of the operating system?
a)API
b)System call
c)Library
d)Assembly instruction
228) Where are placed the list of processes that are prepared to be executed and
waiting?
a)Job queue
b)Ready queue
c)Execution queue
d)Process queue
229) Who among the following can block the running process?
a)Fork b)Read c)Down d)All of these
230) Which of the following does not interrupt the running process?
a)Timer interrupt b)Device
c)Power failure d)Scheduler process
231) What is Microsoft window?
a)Operating system b)Graphics program
c)Word Processing d)Database program
232) Which of the following is group of programs?
a)Accessories
b)Paint
c)Word
d)All of above
233) Which of the following is an example of a Real Time Operating System?
a)MAC
b)MS-DOS
c)Windows 10
d)Process Control
234) Which of the following operating systems do you use for a client-server network?
a)MAC
b)Linux
c)Windows XP
d)Windows 2000
235) Which windows was introduced to My Computer?
Windows 10
Windows XP
Windows 95
Windows 98
236) What type of commands are required to perform various tasks in DOS?
a)Internal commands
b)External commands
c)Valuable commands
d)Primary commands
237) What is the number of characters contained in the primary name of the file of MS-
DOS?
a)Up to 8 characters
b)3 characters
c)Up to 10 characters
d)None of the above
238) Which command is used to fetch a group (.doc) of files that have just been deleted?
a)Undelete
b)Undelete/all
c)Undelete *.doc
d)All of above
239) Which of the following is system software?
a)Operating system
b)Compiler
c)Utilities
d)All of the above
240) Which program runs first after booting the computer and loading the GUI?
a)Desktop Manager
b)File Manager
c)Windows Explorer
d)Authentication
241) What is the use of directory structure in the operating system?
a)The directory structure is used to solve the problem of the network connection in OS.
b)It is used to store folders and files hierarchically.
c)It is used to store the program in file format.
d)All of the these
242) What type of scheduling is round-robin scheduling?
a)Linear data scheduling
b)Non-linear data scheduling
c)Preemptive scheduling
d)Non-preemptive scheduling
243) Which conditions must be satisfied to solve a critical section problem?
a)Bounded Waiting
b)Progress
c)Mutual Exclusion
d)All of these.
244) Which of the following options is correct about the windows operating system?
a)Windows is a CUI operating system.
b)Windows is based on CUI.
c)Windows is a GUI operating system.
d)None of the these
245) Which of the following file systems is supported by the windows OS?
a)NTFS
b)FAT32
c)exFAT
d)All of the these
246) Which of the following keys does the user use to switch between applications
running simultaneously in the Windows operating system?
a)FN + TAB
b)ALT + TAB
c)CTRL + TAB
d)SHIFT + TAB
247) Which of the following commands creates an emergency repair disk for Windows
NT 4.0?
a)BAT
b)EXE
c)EXE/S
d)ADD/REMOVE program
248) Which of the following scheduling algorithms is preemptive scheduling?
a)FCFS Scheduling
b)SJF Scheduling
c)Network Scheduling
d)SRTF Scheduling
249) How can you get a printout of the system configuration on windows 9x OS?
a)Open the CMD window, type "MSDN", and press <printscrn>
b)From the device manager, click the print button
c)Open the CMD window, type "SYS", and press <printscrn>
d)None of the these
250) Which of the following operating system runs on the server?
a)Batch OS
b)Distributed OS
c)Real-time OS
d)Network OS
251) What type of memory stores data in a swap file on a hard drive?
a)Secondary memory
b)Virtual memory
c)Low memory
d)RAM
252)What is Digital Image Processing?
a) It’s an application that alters digital videos
b) It’s a software that allows altering digital picture
c) It’s a system that manipulates digital medias
d) It’s a machine that allows altering digital images
253) Which of the following process helps in Image enhancement?
a) Digital Image Processing
b) Analog Image Processing
c) Both a and b
d) None of the above
254)Among the following, functions that can be performed by digital image processing is?
a) Fast image storage and retrieval
b) Controlled viewing
c) Image reformatting
d) All of the above
255) Which of the following is an example of Digital Image Processing?
a) Computer Graphics
b) Pixels
c) Camera Mechanism
d) All of the mentioned
256) What are the categories of digital image processing?
a) Image Enhancement
b) Image Classification and Analysis
c) Image Transformation
d) All of the mentioned
257) How does picture formation in the eye vary from image formation in a camera?
a) Fixed focal length
b) Varying distance between lens and imaging plane
c) No difference
d) Variable focal length
258) What are the names of the various colour image processing categories?
a) Pseudo-color and Multi-color processing
b) Half-color and pseudo-color processing
c) Full-color and pseudo-color processing
d) Half-color and full-color processing
259) Which characteristics are taken together in chromaticity?
a) Hue and Saturation
b) Hue and Brightness
c) Saturation, Hue, and Brightness
d) Saturation and Brightness
260) Which of the following statement describe the term pixel depth?
a) It is the number of units used to represent each pixel in RGB space
b) It is the number of mm used to represent each pixel in RGB space
c) It is the number of bytes used to represent each pixel in RGB space
d) It is the number of bits used to represent each pixel in RGB space
261) The aliasing effect on an image can be reduced using which of the following methods?
a) By reducing the high-frequency components of image by clarifying the image
b) By increasing the high-frequency components of image by clarifying the image
c) By increasing the high-frequency components of image by blurring the image
d) By reducing the high-frequency components of image by blurring the image
262)Which of the following is the first and foremost step in Image Processing?
a) Image acquisition
b) Segmentation
c) Image enhancement
d) Image restoration
263)Which of the following image processing approaches is the fastest, most accurate, and
flexible?
a) Photographic
b) Electronic
c) Digital
d) Optical
264) Which of the following is the next step in image processing after compression?
a) Representation and description
b) Morphological processing
c) Segmentation
d) Wavelets
265)___________ determines the quality of a digital image.
a) The discrete gray levels
b) The number of samples
c) discrete gray levels & number of samples
d) None of the mentioned
266) Image processing involves how many steps?
a) 7
b) 8
c) 13
d) 10
267)Which of the following is the abbreviation of JPEG?
a) Joint Photographic Experts Group
b) Joint Photographs Expansion Group
c) Joint Photographic Expanded Group
d) Joint Photographic Expansion Group
268)Which of the following is the role played by segmentation in image processing?
a) Deals with property in which images are subdivided successively into smaller regions
b) Deals with partitioning an image into its constituent parts or objects
c) Deals with extracting attributes that result in some quantitative information of interest
d) Deals with techniques for reducing the storage required saving an image, or the bandwidth
required transmitting it
269) The digitization process, in which the digital image comprises M rows and N columns,
necessitates choices for M, N, and the number of grey levels per pixel, L. M and N must have
which of the following values?
a) M have to be positive and N have to be negative integer
b) M have to be negative and N have to be positive integer
c) M and N have to be negative integer
d) M and N have to be positive integer
270) Which of the following tool is used in tasks such as zooming, shrinking, rotating, etc.?
a) Filters
b) Sampling
c) Interpolation
d) None of the Mentioned
271)The effect caused by the use of an insufficient number of intensity levels in smooth areas
of a digital image _____________
a) False Contouring
b) Interpolation
c) Gaussian smooth
d) Contouring
272) What is the procedure done on a digital image to alter the values of its individual pixels
known as?
a) Geometric Spacial Transformation
b) Single Pixel Operation
c) Image Registration
d) Neighbourhood Operations
273) Points whose locations are known exactly in the input and reference images are used in
Geometric Spacial Transformation.
a) Known points
b) Key-points
c) Réseau points
d) Tie points
274) ___________ is a commercial use of Image Subtraction.
a) MRI scan
b) CT scan
c) Mask mode radiography
d) None of the Mentioned
275) Approaches to image processing that work directly on the pixels of incoming image
work in ____________
a) Spatial domain
b) Inverse transformation
c) Transform domain
d) None of the Mentioned
276) Which of the following in an image can be removed by using a smoothing filter?
a) Sharp transitions of brightness levels
b) Sharp transitions of gray levels
c) Smooth transitions of gray levels
d) Smooth transitions of brightness levels
277) Region of Interest (ROI) operations is generally known as _______
a) Masking
b) Dilation
c) Shading correction
d) None of the Mentioned
278) Which of the following comes under the application of image blurring?
a) Image segmentation
b) Object motion
c) Object detection
d) Gross representation
279)Which of the following filter’s responses is based on the pixels ranking?
a) Sharpening filters
b) Nonlinear smoothing filters
c) Geometric mean filter
d) Linear smoothing filters
280) Which of the following illustrates three main types of image enhancing functions?
a) Linear, logarithmic and power law
b) Linear, logarithmic and inverse law
c) Linear, exponential and inverse law
d) Power law, logarithmic and inverse law
281) Which of the following is the primary objective of sharpening of an image?
a) Decrease the brightness of the image
b) Increase the brightness of the image
c) Highlight fine details in the image
d) Blurring the image
282) Which of the following operation is done on the pixels in sharpening the image, in the
spatial domain?
a) Differentiation
b) Median
c) Integration
d) Average
283) ________ is the principle objective of Sharpening, to highlight transitions.
a) Brightness
b) Pixel density
c) Composure
d) Intensity
284) _________ enhance Image Differentiation?
a) Pixel Density
b) Contours
c) Edges
d) None of the mentioned
285) Which of the following fact is correct for an image?
a) An image is the multiplication of illumination and reflectance component
b) An image is the subtraction of reflectance component from illumination component
c) An image is the subtraction of illumination component from reflectance component
d) An image is the addition of illumination and reflectance component
286) Which of the following occurs in Unsharp Masking?
a) Subtracting blurred image from original
b) Blurring the original image
c) Adding a mask to the original image
d) All of the mentioned
287) Which of the following makes an image difficult to enhance?
a) Dynamic range of intensity levels
b) High noise
c) Narrow range of intensity levels
d) All of the mentioned
288) _________ is the process of moving a filter mask over the image and computing the
sum of products at each location.
a) Nonlinear spatial filtering
b) Convolution
c) Correlation
d) Linear spatial filtering
289)Which side of the greyscale is the components of the histogram concentrated in a dark
image?
a) Medium
b) Low
c) Evenly distributed
d) High
290) Which of the following is the application of Histogram Equalisation?
a) Blurring
b) Contrast adjustment
c) Image enhancement
d) None of the Mentioned
291)Which of the following is the expansion of PDF, in uniform PDF?
a) Probability Density Function
b) Previously Derived Function
c) Post Derivation Function
d) Portable Document Format
292) ____________ filter is known as averaging filters.
a) Bandpass
b) Low pass
c) High pass
d) None of the Mentioned
293)What is/are the resultant image of a smoothing filter?
a) Image with reduced sharp transitions in gray levels
b) Image with high sharp transitions in gray levels
c) None of the mentioned
d) All of the mentioned
294)The response for linear spatial filtering is given by the relationship __________
a) Difference of filter coefficient’s product and corresponding image pixel under filter mask
b) Product of filter coefficient’s product and corresponding image pixel under filter mask
c) Sum of filter coefficient’s product and corresponding image pixel under filter mask
d) None of the mentioned
295) ___________ is/are the feature(s) of a highpass filtered image.
a) An overall sharper image
b) Have less gray-level variation in smooth areas
c) Emphasized transitional gray-level details
d) All of the mentioned
296) The filter order of a Butterworth lowpass filter determines whether it is a very sharp or
extremely smooth filter function, or an intermediate filter function. Which of the following
filters does the filter approach if the parameter value is very high?
a) Gaussian lowpass filter
b) Ideal lowpass filter
c) Gaussian & Ideal lowpass filters
d) None of the mentioned
297) Which of the following image component is characterized by a slow spatial variation?
a) Reflectance and Illumination components
b) Reflectance component
c) Illumination component
d) None of the mentioned
298) Gamma Correction is defined as __________
a) Light brightness variation
b) A Power-law response phenomenon
c) Inverted Intensity curve
d) None of the Mentioned
299) ____________________ is known as the highlighting the contribution made to total
image by specific bits instead of highlighting intensity-level changes.
a) Bit-plane slicing
b) Intensity Highlighting
c) Byte-Slicing
d) None of the Mentioned
300) Which gray-level transformation increases the dynamic range of gray-level in the
image?
a) Negative transformations
b) Contrast stretching
c) Power-law transformations
d) None of the mentioned