Which of the following is not a lossy compression technique ? (A) JPEG (B) MPEG (C) FFT (D) Arithmetic coding

1 Answer

Answer :

(D) Arithmetic coding

Related questions

Description : Huffman coding is an encoding algorithm used for A. lossless data compression B. files greater than 1 Mbit C. broadband systems D. lossy data compression

Last Answer : A. lossless data compression

Description : Huffman coding is an encoding algorithm used for a. lossless data compression b. files greater than 1 Mbit c. broadband systems d. lossy data compression

Last Answer : a. lossless data compression

Description : In ____________ is used to compress images. A. MPEG B. JPEG C. either a or b D. none of the above

Last Answer : B. JPEG

Description : Sliding windowing technique is used in which dictionary compression a. LZW b. LZ77 c. LZ78 d. Diagram coding

Last Answer : b. LZ77

Description : Data compression which guarantees that all original data can be restored exactly A. Lossless compression B. Lossy compression C. File compression D. Raster compression

Last Answer : B. Lossy compression

Description : How does lossy compression reduce the size of files? A. Through removing redundancies by grouping repeated data together. B. By removing some precision in data that humans would have difficulty to ... the amount of storage needed. D. By replacing blocks of data with more compact representations.

Last Answer : D. By replacing blocks of data with more compact representations.

Description : Which of the following is a benefit of lossy compression over lossless? A. File sizes will always be reduced, even when compressed multiple times. B. File quality is not harmed, e.g. ... can be decompressed back to their original uncompressed form. D. File sizes are usually significantly smaller.

Last Answer : C. Files can be decompressed back to their original uncompressed form.

Description : What type of compression actually deletes data and cannot be decompressed? A. File Compression B. Lossless Compression C. Lossy Compression D. Archive Compression

Last Answer : D. Archive Compression

Description : To save file space lossy compression... A. Temporarily removes data B. Permanently removes data

Last Answer : A. Temporarily removes data

Description : Dennis has saved a photograph and has lost data during compression. What type of compression has occurred? A. LOSSY B. LOSSLESS C. RESOLUTION D. COLOR MODE

Last Answer : A. LOSSY

Description : Which of the following is a true statement about data compression? A. Data compression techniques can be used to reduce the size of a file for storage or transmission. B. Data compression techniques can ... used if there may be a need to recover all of the original data from the compressed file.

Last Answer : A. Data compression techniques can be used to reduce the size of a file for storage or transmission.

Description : Lossy or lossless? This type of compression makes the file smaller A. Lossy B. Lossless

Last Answer : A. Lossy

Description : Lossy or lossless? This type of compression does not get rid of any data A. Lossy B. Lossless

Last Answer : B. Lossless

Description : Without losing quality, JPEG-2000 can achieve compression ratios of A. 20:1 B. 2000:1 C. 2:1 D. 200:1

Last Answer : D. 200:1

Description : FFT analyzer can be used to find the ___________. (A) natural frequencies (B) mode shapes(C) both natural frequencies and mode shapes (D) none of the above

Last Answer : (C) both natural frequencies and mode shapes

Description : In FFT Spectrum Analyzer, FFT stands for _______. (A) Frequency Fourier Transform (B) Fast Fourier Transmission (C) Frequency Fourier Transmission (D) Fast Fourier Transform

Last Answer : (D) Fast Fourier Transform

Description : Give the advantages and applications of FFT algorithm.

Last Answer : Advantages: i) Computation of DFT with reduced no. of calculations. ii)As the computations are performed in phase, the number of memory locations required is 2N.

Description : State true or false. i) comparisons precede logical operations in java ii) assignment operations succeed increment operations iii) arithmetic operations succeed comparisons iv) x precede + A) i-true, ii-true, iii-false, ... false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true

Last Answer : A) i-true, ii-true, iii-false, iv-true

Description : Which of the following is allowed in a C Arithmetic Instruction? A) [ ] B) { } C) ( ) D) None of the above

Last Answer : C) ( )

Description : Which is/are the application(s) of stack A) Function calls B) Large number Arithmetic C) Evaluation of arithmetic expressions D) All of the above

Last Answer : D) All of the above

Description : What arithmetic operators cannot be used with strings ? a) + b) * c) – d) All of the mentioned

Last Answer : c) –

Description : Refer the points as listed below: (a) What are the operator precedence rules ? (b) What are the operator associativity rules ? (c) What is the order of operand evaluation ? (d) Are there restrictions on operand evaluation side effects ? ... (d) (C) (a), (b) and (d) (D) (a), (b), (c) and (d)

Last Answer : (D) (a), (b), (c) and (d)

Description : Bresenham line drawing algorithm is attractive because it uses (A) Real arithmetic only (B) Integer arithmetic only (C) Floating point arithmetic (D) Real and integer arithmetic

Last Answer : (B) Integer arithmetic only

Description : Let A and B be two fuzzy integers defined as: A={(1,0.3), (2,0.6), (3,1), (4,0.7), (5,0.2)} B={(10,0.5), (11,1), (12,0.5)} Using fuzzy arithmetic operation given by (A) {(11,0.8), (13,1), (15,1)} ( ... ,0.2)} (D) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,0.7), (16,0.5), (17,0.2)}

Last Answer : (D) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,0.7), (16,0.5), (17,0.2)}

Description : Which of the following is the most efficient to perform arithmetic operations on the numbers? (A) Sign-magnitude (B) 1’s complement (C) 2’s complement (D) 9’s complement

Last Answer : (C) 2’s complement

Description : Which of the following is used for the boundary representation of an image object? (A) Quad Tree (B) Projections (C) Run length coding (D) Chain codes

Last Answer : (D) Chain codes

Description : Which of the following is not included in waterfall model ? (A) Requirement analysis (B) Risk analysis (C) Design (D) Coding

Last Answer : (B) Risk analysis

Description : From the given data below: a b b a a b b a a b which one of the following is not a word in the dictionary created by LZ-coding (the initial words are a, b)? (1) a b (2) b b (3) b a (4) b a a b 

Last Answer : (4) b a a b 

Description : For minimum work input in a two stage compression process the intermediated pressure is the A. Arithmetic process of suction and discharge pressure B. Logarithmic mean of suction and discharge pressure C. Geometric mean of suction and discharge pressure D. Hyperbolic mean of suction and discharge

Last Answer : ANSWER : C

Description : Involves compression in the transmitter after the input sample has been converted to a linear PCM code and then expansion in the receiver prior to PCM coding:

Last Answer : Digital companding

Description : Consider the formula in image processing RD = 1 - (1/CR) Where CR = n1/n2 CR is called as compression ratio n1 and n2 denotes the number of information carrying units in two datasets that represent ... . (A) Data Compression (B) Data Redundancy (C) Data Relation (D) Data Representation

Last Answer : (B) Data Redundancy

Description : What are the conversion ratio for MP4, Mpeg, AVI, 3gp, WMV, Divx and MOV converted to FLV? ex:100mb AVI =FLV?

Last Answer : answer:

Description : What's the best (free) software to convert a DVD into a set of mpeg files?

Last Answer : answer:There are several, but the one I like best is Freemake www.freemake.com Download the Video Converter. Very easy. Freeware.

Description : How can I safely convert mpeg-4 to mp3?

Last Answer : I always use Switch Audio File Converter Software

Description : Changing m4v video format to flv, mpeg, avi, wmv or mp4, which free website actually works?

Last Answer : Handbrake will transcode from m4v to mp4.

Description : Vob to mpeg for the mac?

Last Answer : VLC will play them back PunyVid will convert them to mp4.

Description : What is the best way to convert .mpeg to .avi?

Last Answer : I don’t have a Mac, but this list might help you find a product that suits your needs.

Description : How can I convert a video file to MPEG-4?

Last Answer : There are many programs on the internet that can be used to convert any video format to MPEG-4. In my opinion, the best converter is the one found at video.online-convert.com.

Description : Which file type is typically used for videos GIF MPEG MP3 PDF?

Last Answer : mpeg

Description : What is the full form of M3U ? a) MPEG user sound reference file b) MPEG Universal Sound reference file c) MPEG unified sound reference file d) MPEG URL sound reference file

Last Answer : d) MPEG URL sound reference file

Description : A static dictionary technique that is less specific to a single application is: a. LZ77 b. Diagram Coding c. Initial dictionary d. LZW

Last Answer : b. Diagram Coding

Description : …………… can be defined as most recent and perhaps the most comprehensive technique for solving computer problems. A) System Analysis B) System Data C) System Procedure D) System Record

Last Answer : A) System Analysis

Description : In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : Which of the following algorithm design technique is used in the quick sort algorithm? a) Dynamic programming b) Backtracking c) Divide-and-conquer d) Greedy method

Last Answer : Which of the following algorithm design technique is used in the quick sort algorithm? a) Dynamic programming b) Backtracking c) Divide-and-conquer d) Greedy method

Description : Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation? (A) Semantic network (B) Frames (C) Scripts (D) Conceptual Dependency

Last Answer : (C) Scripts 

Description : The map colouring problem can be solved using which of the following technique? (A) Means-end analysis (B) Constraint satisfaction (C) AO* search (D) Breadth first search

Last Answer : (B) Constraint satisfaction

Description : Which one of the following is not an informed search technique? (A) Hill climbing search (B) Best first search (C) A* search (D) Depth first search

Last Answer : (D) Depth first search

Description : Manager's salary details are to be hidden from Employee Table. This Technique is called as (A) Conceptual level Datahiding (B) Physical level Datahiding (C) External level Datahiding (D) Logical level Datahiding

Last Answer : (C) External level Datahiding

Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process 

Last Answer : (C) It is a chip to map virtual address to physical address

Description : Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching

Last Answer : (D) Circuit Switching