Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 97 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

51.

A compression technique consists of two basic components such as

A. Coding, Decoding
B. Encoding , Coding
C. Encoding , Decoding
D. None of Above.
Answer» D. None of Above.
52.

Data compression consists of taking a stream of symbols and transforming them into_______.

A. Bits
B. Codes
C. Error
D. Image
Answer» C. Error
53.

Advantages of data compression

A. The user can experience rich quality signals for data representation
B. Reliability of the records gets reduced by Data compression.
C. Disorder of data properties of a compressed data will result in compressed data different from the original data.
Answer» B. Reliability of the records gets reduced by Data compression.
54.

Disadvantages of data compression

A. The rate of input output operations in a computing device can be greatly increased due to shorter presentation of data.
B. Compressed, sensitive data transmitted through a noisy communication channel is risky because the burst errors introduced by the noisy channel can destroy the transmitted data.
Answer» C.
55.

Lossy compression algorithm is applied to..

A. Images And Sound
B. Sound And Text
C. Image And Text
Answer» B. Sound And Text
56.

Lossless compression algorithm is applied to..

A. Image
B. Sound
C. Scientific Data
Answer» D.
57.

Example of entropy based compression is

A. RLE , Arithmetic , Huffman
B. Lempel-Ziv , Arithmetic
Answer» B. Lempel-Ziv , Arithmetic
58.

Example of dictionary based compression is

A. RLE , Arithmetic , Huffman
B. Lempel-Ziv
Answer» C.
59.

Which of the following programs support xml or xml applications?

A. Internet Explorer 5.5
B. Netscape D.7
C. Realplayer.
D. Both A And B
Answer» E.
60.

The idea with wavelets is to represent a complicated function by

A. Sinus Functions
B. Simple Basic Functions
C. Lines
D. Square Functions
Answer» C. Lines
61.

Information lost when expressed mathematically is called

A. Markov
B. Finite Memory Source
C. Fidelity Criteria
D. Noiseless Theorem
Answer» D. Noiseless Theorem
62.

Sequence of code assigned is called

A. Code Word
B. Word
C. Byte
D. Nibble
Answer» B. Word
63.

Well formed xml document means

A. It Contains A Root Element
B. It Contain An Element
C. It Contains One Or More Elements
D. Must Contain One Or More Elements And Root Element Must Contain All Other Elements
Answer» E.
64.

What is the correct syntax of the declaration which defines the xml version?

A. <Xml Version="A.0" />
B. <?Xml Version="A.0"?>
C. <?Xml Version="A.0" />
D. None Of The Above
Answer» C. <?Xml Version="A.0" />
65.

Comment in xml document is given by

A. <?-- -->
B. <!-- --!>
C. <!-- -->
D. </-- -- >
Answer» D. </-- -- >
66.

Xml document can be viewed in

A. IE C.0
B. IE B.0
C. IE 6.0
D. IE X.0
Answer» D. IE X.0
67.

The Attribute Used To Define A New Namespace Is

A. XMLNS
B. Xmlnamespace
C. Xmlns
D. Xmlns
Answer» D. Xmlns
68.

Attribute standalone="no" should be included in xml declaration if a document

A. Is linked to an external xsl stylesheet
B. Has external general references
C. Has processing instructions
D. Has an external dtd
Answer» E.
69.

What does xml stand for?

A. Extra Modern Link
B. Extensible Markup Language
C. Example Markup Language
D. X-Markup Language
Answer» C. Example Markup Language
70.

Whats so great about xml?

A. Easy data exchange
B. High speed on network
C. Only b.is correct
D. Both A. & B.
Answer» E.
71.

The xml dom object is

A. Entity
B. Entity Reference
C. Comment Reference
D. Comment Data
Answer» C. Comment Reference
72.

Entropy coding can be used for

A. Sequence of digital data values
B. Random of digital data values
C. Regular of digital data values
Answer» B. Random of digital data values
73.

Entropy coding can be used for compression of any type of data in a

A. Media system
B. File system.
C. Bit system
Answer» C. Bit system
74.

Huffman coding is to find a way to compress the storage of data using

A. Data Length Codes.
B. Variable Length Codes.
Answer» C.
75.

RLE Is Designed Especially For Data With

A. Image of repeated symbols
B. Sound of repeated symbols
C. Strings of repeated symbols
Answer» D.
76.

System of symbols to represent event is called

A. Storage
B. Word
C. Code
D. Nibble
Answer» D. Nibble
77.

Huffman coding is constructed in such a way that no ___constructed code are prefixes to each other.

A. Three
B. One
C. Two
Answer» D.
78.

Limitations of huffman coding is

A. Each symbol is encoded with integer number of bits
B. Each symbol is encoded with integer number of value
C. Each symbol is encoded with integer number of level
Answer» B. Each symbol is encoded with integer number of value
79.

Every run length pair introduce new

A. Pixels
B. Matrix
C. Frames
D. Intensity
Answer» E.
80.

Arithmetic coding completely bypass the idea of replacing every input symbol with a

A. Bits
B. String
C. Codeword
Answer» D.
81.

The main aim of arithmetic coding is to assign the _____to each symbol.

A. Interval
B. Image
C. Symbol
Answer» B. Image
82.

Variations on lz77 scheme, like

A. LZS, LZ And LZB
B. LZSS, LZH And LB
C. LZSS, LZH And LZB
Answer» D.
83.

Limitations of arithmetic coding

A. The precision required to represent the intervals grows with length of the message.
B. The precision required to represent the intervals grows with bit of the message.
C. The precision required to represent the random grows with length of the message.
Answer» B. The precision required to represent the intervals grows with bit of the message.
84.

Arithmetic algorithms as well as huffman algorithms are based on

A. Statistical model
B. String model
C. Probability model
Answer» B. String model
85.

The lempel ziv algorithm is an algorithm for

A. Lossless data compression
B. Lossy data compression
Answer» B. Lossy data compression
86.

In the coding redundancy technique we use

A. Fixed Length Code
B. Variable Length Code
C. Byte
D. Both A And B
Answer» E.
87.

In LZ77 encoding process one reference (a triple) is transmitted for several input symbols and hence it is

A. Less Quick.
B. Quick.
C. Very Quick.
Answer» D.
88.

Lz77 exploits the fact that words and phrases within a ____would be repeated.

A. Video File
B. Text File
C. Image File
Answer» C. Image File
89.

LZH is performed in ___ phases

A. Two
B. Four
C. One
Answer» B. Four
90.

Regardless of the length of the phrase, every LZSS pointer is of

A. Different Size
B. Same Size
Answer» C.
91.

Markov models are more widely known

A. Finite context models
B. Text context models
Answer» B. Text context models
92.

Coding redundancy works on

A. Pixels
B. Matrix
C. Intensity
D. Coordinates
Answer» D. Coordinates
93.

The basic idea behind huffman coding is to

A. Compress data by using more bits to encode more frequently occurring characters
B. Compress data by using fewer bits to encode more frequently occurring characters
C. Expand data by using fewer bits to encode more frequently occurring characters
D. Compress data by using fewer bits to encode fewer frequently occurring characters
Answer» C. Expand data by using fewer bits to encode more frequently occurring characters
94.

An Alphabet Consist Of The Letters A, B, C And D. The probability of occurrence isp(a) = 0.4,p(b) = 0.1,p(c) = 0.2and p(d) = 0.3.The huffman code is

A. A = 0 , B = 11 , C = 10 , D = 111
B. A = 0 , B = 111 , C = 110 , D = 10
C. A = 01 , B = 111 , C = 110 , D = 10
D. A = 0 , B = 111 , C = 11 , D = 101
Answer» C. A = 01 , B = 111 , C = 110 , D = 10
95.

A huffman encoder takes a set of characters with fixed length and produces a set of characters of

A. Constant Length
B. Random Length
C. Fixed Length
D. Variable Length
Answer» E.
96.

Huffman coding is an encoding algorithm used for

A. Lossy Data Compression
B. Broadband Systems
C. Lossless Data Compression
D. Files Greater Than 1 Mbit
Answer» D. Files Greater Than 1 Mbit
97.

A Huffman Code: A = 1, B = 000, C = 001, D = 01, P(A) = 0.4, P(B) = 0.1, P(C) = 0.2, P(D) = 0.3 The Average Number Of Bits Per Letter Is

A. 8.0 Bit
B. 2.0 Bit
C. 2.1 Bit
D. 1.9 Bit
Answer» E.