Description : Entropy of a source is a. Self information of the source b. Average self information c. Average number of bits d. Both (a) and (b)
Last Answer : b. Average self information
Description : Information per source is called a. A. sampling b. B. quantization c. C. entropy d. D. normalization
Last Answer : c. C. entropy
Description : Which of the following is a secondary source of sport/event information: A. Accounting records B. Demographic reports C. Computerized surveys D. Personal interviews
Last Answer : B. Demographic reports
Description : Quantization with one word memory is also called ______. A. Uniform quantizer B. non uniform quantizer C. Jayant Quantizer D. Midrise Quantizer
Last Answer : C. Jayant Quantizer
Description : Which Quantizer has zero as one of its output levels? A. Uniform B. Midrise C. Midtread D. All of above
Last Answer : C. Midtread
Description : An ________is encoded and the algorithm attempts to use the next smaller context. a. One length context b. Zero context c. Escape symbol d. None
Last Answer : c. Escape symbol
Description : The basic algorithm initially attempts to use the _________context. a. Small b. Shortest c. Longest d. Zero
Last Answer : c. Longest
Description : What are the main reasons to compress data? A. To reduce secondary storage space B. To maximise the available RAM memory C. To speed up network transmission times D. To optimise the data
Last Answer : A. To reduce secondary storage space
Description : By using data compression technique, what can be done in the data storage place of memory and disk ? a) increment b) Reduction c) Transfer d) Repetition
Last Answer : b) Reduction
Description : A simple quantization scheme would be to represent each output of the source with the ____value closest to it. a. Codeword b. Integer c. Binary sequence d. Coordinates
Last Answer : b. Integer
Description : The rate for a discrete source is simply the______. a. Entropy b. Loss c. Noise d. Distortion
Last Answer : a. Entropy
Description : To convert multimedia information coming from hardware devices into computer data can be compared with which process ? a) Coding b) Decoding c) (a) and (b) both d) None of these
Last Answer : a) Coding
Description : From the following, which option shows an issue faced with multimedia contents ? a) Converting multimedia information coming from hardware devices into computer data b) converting the computer data back into audio/ ... for playing on the hardware device c) a and b both d) None of these
Last Answer : c) a and b both
Description : Which best describes Lossless Compression? A. No information is lost but file size is increased B. There is no loss in information at all after compression C. Files which have the exact same data after compression D. Compression that involves an algorithm
Last Answer : B. There is no loss in information at all after compression
Description : To divide information among cells A. Wrap B. Split C. Lock D. Column
Last Answer : B. Split
Description : A particular way of coding information for storage in a computer file A. Raster graphic B. Vector graphic C. File format D. Layer
Last Answer : A. Raster graphic
Description : A sport/event organization that wants to obtain information about the population in a certain geographic location might use A. Government sources B. Primary Databases C. Personal Questionaires D. telephone surveys
Last Answer : B. Primary Databases
Description : A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the ... of the information for analysis. D. The frequency of a particular item occurring in a data set.
Last Answer : D. The frequency of a particular item occurring in a data set.
Description : Which technique identify and eliminate less important information to conserve space ? a) Data compression b) Data repetition c) Data extension d) Data conservation
Last Answer : a) Data compression
Description : Information ignored the human eye is the a. A. coding redundancy b. B. spatial redundancy c. C. temporal redundancy d. D. irrelevant info
Last Answer : d. D. irrelevant info
Description : In the multimedia contents, which process is done by a software ? a) Conversion (coding) b) Reverse conversion c) (A) and (B) both d) None of these
Last Answer : c) (A) and (B) both
Description : Extended Huffman method is used due to a. Large alphabet b. Skewed probability c. Equal probability d. Both (a) and(b)
Last Answer : b. Skewed probability
Description : The design of the _____has a significant impact on the amount of compression. a. Cluster b. Quantizer c. Codebook d. Both (b) and (a)
Last Answer : b. Quantizer
Description : At any given time, the output of an encoder depends on ______ a. Past input b. Present input c. Both a and b d. None of the above
Last Answer : b. Present input
Description : ___________has become quite popular for encoding all kinds of images, both computer-generated and “natural” images. a. GIF b. PNG c. TIFF d. JPEG
Last Answer : a. GIF
Description : The CALIC scheme actually functions on : a. bi-level images. b. gray-scale images c. RBG images d. Both (a) and (b)
Last Answer : d. Both (a) and (b)
Description : How many character an encoder reads and searches the dictionary to see if this input exists in the dictionary. a. 2 character b. 1 character c. 3 character d. Both (a) and (b)
Last Answer : a. 2 character
Description : Dictionary order is sometimes used as a synonym for: a. Alphabetical order b. Lexicographical order c. Alphanumerical order d. Both (a) and (c)
Last Answer : b. Lexicographical order
Description : In dictionary techniques for data compaction, which approach of building dictionary is used for the prior knowledge of probability of the frequently occurring patterns? a. Static Dictionary b. Adaptive Dictionary c. both a and b d. None of the above
Last Answer : a. Static Dictionary
Description : In Huffman encoding, both the sender and receiver must have a copy of the code a. Same b. Different c. Generate on Demand d. Both (a) and (b)
Last Answer : a. Same
Description : Huffman trees use the _______________ of each character to work out their encoding. a. Frequency b. Order in ASCII c. Number value d. Both (a) and (b)
Last Answer : a. Frequency
Description : Compression is done for saving a. A. storage b. B. bandwidth c. C. money d. D. Both A and B
Last Answer : d. D. Both A and B
Description : In the encoded file, which type of changes are made in sysmbols ? a) They are compressed b) They are changed to a letter or symbol c) They are represented in the graphical form d) No changes are made
Last Answer : d) No changes are made
Description : In the encoded file, which type of changes are made in sysmbols ? a. They are compressed b. They are changed to a letter or symbol c. They are represented in the graphical form d. No changes are made
Last Answer : d. No changes are made
Description : If the P(E) = 1, it means event a. does not occur b. always occur c. no probability d. Normalization
Last Answer : b. always occur
Description : Where does the Hidden Markov Model is used? a) Speech recognition b) Understanding of real world c) Both Speech recognition & Understanding of real world d) None of the mentioned
Last Answer : a) Speech recognition
Description : In polar vector quantization r is called ________. a. Quantum b. Phase c. Magnitude d. None of above
Last Answer : c. Magnitude
Description : Set of L-dimensional blocks called the _______of the vector quantizer. a. Group b. Codebook c. Coding d. Index
Last Answer : b. Codebook
Description : Quantization techniques that operate on blocks of data are called a. Adaptive quantization b. Non uniform Quantization c. Scalar Quantization d. None of the Above
Last Answer : d. None of the Above
Description : The process of representing Infinite set of values with a much smaller set is called a. Mapping b. clustering c. Quantization d. Sampling
Last Answer : c. Quantization
Description : The distance of the pointer from the look-ahead buffer is called : a. Length b. Offset c. Triplet d. Code
Last Answer : b. Offset
Description : Sequence of code assigned is called a. A. code word b. B. word c. C. byte d. D. nibble
Last Answer : a. A. code word
Description : In an all weld tensile test, the original specimen gauge length was 50mm, and after the test the increased gauge length was 65mm, what is the elongation percentage? a) % A is 40 b) % A is 60 c) % A is 30 d) % A is 36
Last Answer : c) % A is 30
Description : To change the font size in order to display more text or other data A. Border B. Shading C. Shrink to fit D. Printing area
Last Answer : A. Border
Description : To make lines of text appear on multiple lines of a cell A. Wrap B. Split C. Lock D. Column
Last Answer : D. Column
Description : A webpage is an example of an ........... electronic document A. Comp B. DTP C. On screen D. Online
Last Answer : C. On screen
Description : This document is designed to be viewed ........ on your tablet A. Comp B. DTP C. On screen D. Online
Last Answer : A. Comp
Description : A ........ is an initial document that shows where all text and graphic elements will be placed A. Comp B. DTP C. On screen D. Online
Description : What does 'WYSIWYG' stand for? A. Why you see is why you get B. When you see is when you get C. What you see is what you get D. Where you see is where you get
Last Answer : D. Where you see is where you get
Description : .............. means that a printed document will appear exactly as it does on-screen A. Layout B. Publish C. Clip art D. WYSIWYG
Last Answer : C. Clip art