MCQOPTIONS
Saved Bookmarks
This section includes 97 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
A compression technique consists of two basic components such as |
| A. | Coding, Decoding |
| B. | Encoding , Coding |
| C. | Encoding , Decoding |
| D. | None of Above. |
| Answer» D. None of Above. | |
| 52. |
Data compression consists of taking a stream of symbols and transforming them into_______. |
| A. | Bits |
| B. | Codes |
| C. | Error |
| D. | Image |
| Answer» C. Error | |
| 53. |
Advantages of data compression |
| A. | The user can experience rich quality signals for data representation |
| B. | Reliability of the records gets reduced by Data compression. |
| C. | Disorder of data properties of a compressed data will result in compressed data different from the original data. |
| Answer» B. Reliability of the records gets reduced by Data compression. | |
| 54. |
Disadvantages of data compression |
| A. | The rate of input output operations in a computing device can be greatly increased due to shorter presentation of data. |
| B. | Compressed, sensitive data transmitted through a noisy communication channel is risky because the burst errors introduced by the noisy channel can destroy the transmitted data. |
| Answer» C. | |
| 55. |
Lossy compression algorithm is applied to.. |
| A. | Images And Sound |
| B. | Sound And Text |
| C. | Image And Text |
| Answer» B. Sound And Text | |
| 56. |
Lossless compression algorithm is applied to.. |
| A. | Image |
| B. | Sound |
| C. | Scientific Data |
| Answer» D. | |
| 57. |
Example of entropy based compression is |
| A. | RLE , Arithmetic , Huffman |
| B. | Lempel-Ziv , Arithmetic |
| Answer» B. Lempel-Ziv , Arithmetic | |
| 58. |
Example of dictionary based compression is |
| A. | RLE , Arithmetic , Huffman |
| B. | Lempel-Ziv |
| Answer» C. | |
| 59. |
Which of the following programs support xml or xml applications? |
| A. | Internet Explorer 5.5 |
| B. | Netscape D.7 |
| C. | Realplayer. |
| D. | Both A And B |
| Answer» E. | |
| 60. |
The idea with wavelets is to represent a complicated function by |
| A. | Sinus Functions |
| B. | Simple Basic Functions |
| C. | Lines |
| D. | Square Functions |
| Answer» C. Lines | |
| 61. |
Information lost when expressed mathematically is called |
| A. | Markov |
| B. | Finite Memory Source |
| C. | Fidelity Criteria |
| D. | Noiseless Theorem |
| Answer» D. Noiseless Theorem | |
| 62. |
Sequence of code assigned is called |
| A. | Code Word |
| B. | Word |
| C. | Byte |
| D. | Nibble |
| Answer» B. Word | |
| 63. |
Well formed xml document means |
| A. | It Contains A Root Element |
| B. | It Contain An Element |
| C. | It Contains One Or More Elements |
| D. | Must Contain One Or More Elements And Root Element Must Contain All Other Elements |
| Answer» E. | |
| 64. |
What is the correct syntax of the declaration which defines the xml version? |
| A. | <Xml Version="A.0" /> |
| B. | <?Xml Version="A.0"?> |
| C. | <?Xml Version="A.0" /> |
| D. | None Of The Above |
| Answer» C. <?Xml Version="A.0" /> | |
| 65. |
Comment in xml document is given by |
| A. | <?-- --> |
| B. | <!-- --!> |
| C. | <!-- --> |
| D. | </-- -- > |
| Answer» D. </-- -- > | |
| 66. |
Xml document can be viewed in |
| A. | IE C.0 |
| B. | IE B.0 |
| C. | IE 6.0 |
| D. | IE X.0 |
| Answer» D. IE X.0 | |
| 67. |
The Attribute Used To Define A New Namespace Is |
| A. | XMLNS |
| B. | Xmlnamespace |
| C. | Xmlns |
| D. | Xmlns |
| Answer» D. Xmlns | |
| 68. |
Attribute standalone="no" should be included in xml declaration if a document |
| A. | Is linked to an external xsl stylesheet |
| B. | Has external general references |
| C. | Has processing instructions |
| D. | Has an external dtd |
| Answer» E. | |
| 69. |
What does xml stand for? |
| A. | Extra Modern Link |
| B. | Extensible Markup Language |
| C. | Example Markup Language |
| D. | X-Markup Language |
| Answer» C. Example Markup Language | |
| 70. |
Whats so great about xml? |
| A. | Easy data exchange |
| B. | High speed on network |
| C. | Only b.is correct |
| D. | Both A. & B. |
| Answer» E. | |
| 71. |
The xml dom object is |
| A. | Entity |
| B. | Entity Reference |
| C. | Comment Reference |
| D. | Comment Data |
| Answer» C. Comment Reference | |
| 72. |
Entropy coding can be used for |
| A. | Sequence of digital data values |
| B. | Random of digital data values |
| C. | Regular of digital data values |
| Answer» B. Random of digital data values | |
| 73. |
Entropy coding can be used for compression of any type of data in a |
| A. | Media system |
| B. | File system. |
| C. | Bit system |
| Answer» C. Bit system | |
| 74. |
Huffman coding is to find a way to compress the storage of data using |
| A. | Data Length Codes. |
| B. | Variable Length Codes. |
| Answer» C. | |
| 75. |
RLE Is Designed Especially For Data With |
| A. | Image of repeated symbols |
| B. | Sound of repeated symbols |
| C. | Strings of repeated symbols |
| Answer» D. | |
| 76. |
System of symbols to represent event is called |
| A. | Storage |
| B. | Word |
| C. | Code |
| D. | Nibble |
| Answer» D. Nibble | |
| 77. |
Huffman coding is constructed in such a way that no ___constructed code are prefixes to each other. |
| A. | Three |
| B. | One |
| C. | Two |
| Answer» D. | |
| 78. |
Limitations of huffman coding is |
| A. | Each symbol is encoded with integer number of bits |
| B. | Each symbol is encoded with integer number of value |
| C. | Each symbol is encoded with integer number of level |
| Answer» B. Each symbol is encoded with integer number of value | |
| 79. |
Every run length pair introduce new |
| A. | Pixels |
| B. | Matrix |
| C. | Frames |
| D. | Intensity |
| Answer» E. | |
| 80. |
Arithmetic coding completely bypass the idea of replacing every input symbol with a |
| A. | Bits |
| B. | String |
| C. | Codeword |
| Answer» D. | |
| 81. |
The main aim of arithmetic coding is to assign the _____to each symbol. |
| A. | Interval |
| B. | Image |
| C. | Symbol |
| Answer» B. Image | |
| 82. |
Variations on lz77 scheme, like |
| A. | LZS, LZ And LZB |
| B. | LZSS, LZH And LB |
| C. | LZSS, LZH And LZB |
| Answer» D. | |
| 83. |
Limitations of arithmetic coding |
| A. | The precision required to represent the intervals grows with length of the message. |
| B. | The precision required to represent the intervals grows with bit of the message. |
| C. | The precision required to represent the random grows with length of the message. |
| Answer» B. The precision required to represent the intervals grows with bit of the message. | |
| 84. |
Arithmetic algorithms as well as huffman algorithms are based on |
| A. | Statistical model |
| B. | String model |
| C. | Probability model |
| Answer» B. String model | |
| 85. |
The lempel ziv algorithm is an algorithm for |
| A. | Lossless data compression |
| B. | Lossy data compression |
| Answer» B. Lossy data compression | |
| 86. |
In the coding redundancy technique we use |
| A. | Fixed Length Code |
| B. | Variable Length Code |
| C. | Byte |
| D. | Both A And B |
| Answer» E. | |
| 87. |
In LZ77 encoding process one reference (a triple) is transmitted for several input symbols and hence it is |
| A. | Less Quick. |
| B. | Quick. |
| C. | Very Quick. |
| Answer» D. | |
| 88. |
Lz77 exploits the fact that words and phrases within a ____would be repeated. |
| A. | Video File |
| B. | Text File |
| C. | Image File |
| Answer» C. Image File | |
| 89. |
LZH is performed in ___ phases |
| A. | Two |
| B. | Four |
| C. | One |
| Answer» B. Four | |
| 90. |
Regardless of the length of the phrase, every LZSS pointer is of |
| A. | Different Size |
| B. | Same Size |
| Answer» C. | |
| 91. |
Markov models are more widely known |
| A. | Finite context models |
| B. | Text context models |
| Answer» B. Text context models | |
| 92. |
Coding redundancy works on |
| A. | Pixels |
| B. | Matrix |
| C. | Intensity |
| D. | Coordinates |
| Answer» D. Coordinates | |
| 93. |
The basic idea behind huffman coding is to |
| A. | Compress data by using more bits to encode more frequently occurring characters |
| B. | Compress data by using fewer bits to encode more frequently occurring characters |
| C. | Expand data by using fewer bits to encode more frequently occurring characters |
| D. | Compress data by using fewer bits to encode fewer frequently occurring characters |
| Answer» C. Expand data by using fewer bits to encode more frequently occurring characters | |
| 94. |
An Alphabet Consist Of The Letters A, B, C And D. The probability of occurrence isp(a) = 0.4,p(b) = 0.1,p(c) = 0.2and p(d) = 0.3.The huffman code is |
| A. | A = 0 , B = 11 , C = 10 , D = 111 |
| B. | A = 0 , B = 111 , C = 110 , D = 10 |
| C. | A = 01 , B = 111 , C = 110 , D = 10 |
| D. | A = 0 , B = 111 , C = 11 , D = 101 |
| Answer» C. A = 01 , B = 111 , C = 110 , D = 10 | |
| 95. |
A huffman encoder takes a set of characters with fixed length and produces a set of characters of |
| A. | Constant Length |
| B. | Random Length |
| C. | Fixed Length |
| D. | Variable Length |
| Answer» E. | |
| 96. |
Huffman coding is an encoding algorithm used for |
| A. | Lossy Data Compression |
| B. | Broadband Systems |
| C. | Lossless Data Compression |
| D. | Files Greater Than 1 Mbit |
| Answer» D. Files Greater Than 1 Mbit | |
| 97. |
A Huffman Code: A = 1, B = 000, C = 001, D = 01, P(A) = 0.4, P(B) = 0.1, P(C) = 0.2, P(D) = 0.3 The Average Number Of Bits Per Letter Is |
| A. | 8.0 Bit |
| B. | 2.0 Bit |
| C. | 2.1 Bit |
| D. | 1.9 Bit |
| Answer» E. | |