Which of the following statement(s) is/are correct with reference to curve generation? I. Hermite curves are generated using the concepts of interpolation. II. Bezier curves are generated using the concepts of approximation. III. The Bezier curves lies entirely within the convex hull of its control points. IV. The degree of Bezier curve does not depend on the number of control points. (A) I, II and IV only (B) II and III only (C) I and II only (D) I, II and III only

1 Answer

Answer :

(D) I, II and III only

Related questions

Description : The degree of the curve is independent of the number of control points in _____ a.Hermite cubic spline curve b.Bezier curve c.B-spline curve d.Hyperbola

Last Answer : c.B-spline curve

Description : The degree of the curve is independent of the number of control points in . a.Hermite cubic spline curve b.Bezier curve c.B-spline curve d.Hyperbola

Last Answer : c.B-spline curve

Description : The curve that follows a convex hull property is: a.Cubic spline b.B-spline c.Bezier curve d.Both (b) and (c)

Last Answer : b.B-spline

Description : The Bezier curve is smoother than the Hermite cubic spline because it has _________ orderderivatives. a.lower b.higher c.lower and higher both d.none of the above

Last Answer : b.higher

Description : curves allow local control of the curve a.Analytical b.Hermite cubic spline c.Beizer d.B-Spline

Last Answer : d.B-Spline

Description : The degree of the Bezier curve with n control points is a.n + 1 b.n - 1 c.n d.2n

Last Answer : a.n + 1

Description : The number of control points can be added orsubtracted in . a.Bezier curve b.B-spline curve c.Cubic spline curve d.all of the above

Last Answer : b.B-spline curve

Description : The shape of Bezier curve is controlled by a.Control points b.Knots c.End points d.All the above

Last Answer : a.Control points

Description : To determine the coefficients of the equation – two end-points and the two tangentvectors. This statement is true for which of the following? a.B-spline curve b.Hermite Cubic Spline Curve c.Beizer curve d.none of the above

Last Answer : b.Hermite Cubic Spline Curve

Description : To determine the coefficients of the equation – two end-points and the two tangentvectors. This statement is true for which of the following a.B-spline curve b.Hermite Cubic Spline Curve c.Beizer curve d.none of the above

Last Answer : b.Hermite Cubic Spline Curve

Description : Which of the following points lies on the same side as the origin, with reference to the line 3x+7y=2 ? (A) (3, 0) (B) (1, 0) (C) (0.5, 0.5) (D) (0.5, 0)

Last Answer : (D) (0.5, 0) Explanation: If (0.5, 0) is substituted in the equation, we get 1.5 which is less than 2, then it lies on the same side as that of the origin. 

Description : Explain interpolation techniques in curve generation.

Last Answer : Specify a spline curve by giving a set of coordinate positions, called control points, which indicates the general shape of the curve These, control points are then fitted with piecewise continuous ... a design application. Straight lines connect the control -point positions above the surface.

Description : What is the great river that lies entirely within the U.S.?

Last Answer : Need answer

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : State true of false. i) Public can only be assigned to class ii) Protected protects a statement iii) Protected method is never accessible outside the package iv) Friendly variable may be accessible outside class A) i- ... -false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true

Last Answer : C) i-false, ii-true, iii-false, iv-false

Description : ________curves allow local control of the curve. a.Analytical b.Hermite cubic spline c.Beizer d.B-Spline

Last Answer : d.B-Spline

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : C) ii, iii and iv only

Description : The point which divides the line segment joining the points (7, –6) and (3, 4) in the ratio 1 : 2 lies in the: (a) I quadrant (b) II quadrant (c) III quadrant (d) IV quadrant

Last Answer : (d) IV quadrant

Description : Find the equation of normals of the following curves at the given points: (i) Curve`y^(2)=4 ax" at point "(at^(2), 2at)`. (ii) Curve `y= e^(x)" at poi

Last Answer : Find the equation of normals of the following curves at the given points: (i) Curve`y^(2)=4 ax" at point "(at^( ... (2)-9y^(2) = 432` at point (6, 4).

Description : Find the equation of tangents of the following curves at the given points: (i) Curve`x^(2) = 25` at point (3, 4) (ii) Curve `y = 2x^(3) + 2x^(2) - 8x+

Last Answer : Find the equation of tangents of the following curves at the given points: (i) Curve`x^(2) = 25` at point (3, 4) ... 2)(x-1) = 4x^(2)` at point (5, 5)

Description : Find the inclination from X-axis of the tangent drawn of the following curves at the given points: (i) Curve`x^(2)-2y^(2)=8` at point (4, 2) (ii) Curv

Last Answer : Find the inclination from X-axis of the tangent drawn of the following curves at the given points: (i) Curve`x^(2)- ... `y^(2)=2x^(3)` at point (2, 4)

Description : Find the slope of tengents drawn of the following curves at the given points: (i) Curve ` y =x^(3)+1` at point (0, 1) (ii) Curve ` x^(2)-y^(2)` = 20 a

Last Answer : Find the slope of tengents drawn of the following curves at the given points: (i) Curve ` y =x^(3)+1` at point ... 4" ax at point "(a/m^(2),(2a)/m)`

Description : Which of the following are the principles tasks of the linker? I. Resolve external references among separately compiled program units. II. Translate assembly language to machine code. III. Relocate code and data relative to the beginning of ... (A) I and II (B) I and III (C) II and III (D) I and IV

Last Answer : (B) I and III

Description : When a smooth curve is approximated through the data points, then the curve is knownas a.approximation curve b.pitch curve c.data curve d.interpolant curve

Last Answer : a.approximation curve

Description : When the curve passes through all the data points, then the curve is known as a.approximation curve b.pitch curve c.data curve d.interpolant curve

Last Answer : d.interpolant curve

Description : When a smooth curve is approximated through the data points, then the curve isknown as a.interpolant curve b.approximation curve c.pitch curve d.data curve

Last Answer : b.approximation curve

Description : Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? (A) Physical (B) Data-link (C) Transport (D) Application

Last Answer : (C) Transport 

Description : Consider the following justifications for commonly using the two-level CPU scheduling : I. It is used when memory is too small to hold all the ready processes. II. Because its performance is same as that of the FIFO. III. Because it ... ? (A) I, III and IV (B) I and II (C) III and IV (D) I and III

Last Answer : (D) I and III

Description : break statement is used to i) get out of method ii) end aprogram iii) get out of a loop iv) get out of the system A) 1 & 2 B) 1,2 & 3 C) 1 & 3 D) 3

Last Answer : D) 3

Description : The total transportation cost in an initial basic feasible solution to the following transportation problem using Vogel’s Approximation method is  (A) 76 (B) 80 (C) 90 (D) 96

Last Answer : (B) 80

Description : Consider the following transportation problem: The initial basic feasible solution of the above transportation problem using Vogel's Approximation Method(VAM) is given below: The solution of the ... degenerate solution (B) is optimum solution (C) needs to improve (D) is infeasible solution

Last Answer : (B) is optimum solution

Description : Consider the following transportation problem :  The transportation cost in the initial basic feasible solution of the above transportation problem using Vogel’s Approximation method is : (A) 1450 (B) 1465 (C) 1480 (D) 1520

Last Answer : (B) 1465

Description : Consider the relations R(A,B) and S(B,C) and the following four relational algebra queries over R and S: I. πA,B(R⋈S) II. R⋈πB(S) III. R∩(πA(R) Χ πB(S)) IV. πA,R.B(R Χ S) where R.B refers to ... IV are the same query. (C) I, II and IV are the same query. (D) I, III and III are the same query.

Last Answer : (D) I, III and III are the same query.

Description : Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase A) i, ii, iii, and iv B) i, iii, ii and iv s D) ii, iii, iv and i

Last Answer : C) ii, i, iv an iii

Description : The figure shows the front view of a convex lens, which originally had only one edge. Five holes of different shapes, namely triangle, square, pentagon, hexagon and circle, were drilled through it at points P ... . What is the total number of edges in the lens after the holes were drilled? 

Last Answer : 57

Description : Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: I: {B} II: {B, C} III: {A, D} IV: {C, D} If ... the database table? (A) I and III only (B) III and IV only (C) II only (D) I only

Last Answer : (C) II only

Description : Which of the following is true about the static member variable in C++. i) It is initialized to zero when the first object of its class is created. Other initialization is also permitted. ii) It is visible only within ... , ii-True B) ii-False, ii-True C) i-True, ii-False D) i-False, iii-False

Last Answer : B) ii-False, ii-True

Description : Java Servlet i) is key component of server side java development ii) is a small pluggable extension to a server that enhances functionality iii) runs only in Windows Operating System iv) allows developers to customize any java ... & iv are true C) ii, iii & iv are true D) i, ii & iv are true

Last Answer : D) i, ii & iv are true

Description : Which of the following operates cannot be overloaded? i) Size of operator (sizeof) ii) Scope resolution Operator iii) Conditional operator (?:) iv) Assignment Operator (=) A) i, ii, iii only B) ii, iii, iv only C) i, iii, iv only D) all i, ii, iii, iv

Last Answer : A) i, ii, iii only

Description : Which of the following characteristics of constructor are true. i) They should be declared in the public section. ii) They are invoked automatically when the objects are created. iii) They do not have return type and void also. ... and v C) Only i, iii, iv and v D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Some of the C++ operators cannot overloaded which are i) Member access operators (. And .*) ii) Conditional operator (? :) iii) Scope resolution operator (: :) iv) Size operator (sizeof) A) only i, ii and iii B) only ii, iii and iv C) only ii and iv D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii) Interception iii) Modification iv) Creation v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v

Last Answer : C) i, ii, iii and v only

Description : File management function of the operating system includes i) File creation and deletion ii) Disk scheduling iii) Directory creation iv) Mapping file in secondary storage. A) i, ii and iii only B) i, iii and iv only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : B) i, iii and iv only

Description : Which of the following are the functions of operating system? i) recovering from errors ii) facilitating input/output iii) facilitating parallel operation iv) sharing hardware among users v) implementing user interface A) i, ii, ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The following conditions of policy must be present for a deadlock to be possible. i) Mutual exclusion ii) Hold and wait iii) No preemption iv) Circular wait A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : The typical elements of process image are ..................... i) User data ii) System Data iii) User program iv) System stack A) i, iii and iv only B) i, ii, and iv only C) ii, iii, and iv only D) All i, ii, iii, and iv

Last Answer : A) i, iii and iv only

Description : Which of the following are the states of a five state process model? i) Running ii) Ready iii) New iv) Exit v) Destroy A) i, ii, iii and v only B) i, ii, iv and v only C) i, ii, iii, and iv only D) All i, ii, iii, iv and v

Last Answer : C) i, ii, iii, and iv only

Description : Which of the following is/are the functions of operating system? i) Sharing hardware among users. ii) Allowing users to share data among themselves. iii) Recovering from errors. iv) Preventing users from interfering with one another. ... only C) i, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v