0% found this document useful (0 votes)
82 views14 pages

MSC-I Comprehension Answers Only

The document provides details about the course structure for the M.Sc. (Information Technology) program offered by the Department of Information Technology at an unnamed institution. It lists one compulsory course - Comprehension in core courses (P20IT1C1) which carries 1 credit. The course aims to assess students' comprehension of core subjects through an online exam.

Uploaded by

Kaleeswari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views14 pages

MSC-I Comprehension Answers Only

The document provides details about the course structure for the M.Sc. (Information Technology) program offered by the Department of Information Technology at an unnamed institution. It lists one compulsory course - Comprehension in core courses (P20IT1C1) which carries 1 credit. The course aims to assess students' comprehension of core subjects through an online exam.

Uploaded by

Kaleeswari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

THE COURSES

OFFERED BY THE DEPARTMENT


Department of Information Technology
Course Structure for M.Sc. (Information Technology)
Under Choice Based Credit System &OBE

Lect
Course Tutorial Practical Credit
Category Course Type Course Title ure
Code (T) (P) (C)
(L)
Comprehension – 1 Comprehensio
PART-III (Online Exam) P20IT1C1 n in core 1 - - 1
courses

1.(c) Abstraction
2)(b) An object is an instance of a class
3) (d) Inheritance.
4)(c) Over-ride all the methods of its parent class
5)(a) “is a kind of” relationship
6)(a) Encapsulation (
7)(b) Refers to the ability of two or more objects belonging to different classes to respond to
exactly the same message in different class-specific ways
8)(a) Student (student s) { }
9)(b) Any package imported in a program and not used is automatically deleted.
10) (c) (II) and (III)
11)(a) To prevent developers from further extending the class
12) (e) Editing tools and interfaces
13)(a) java.lang
14) (c) Math
15)(d) Uniform resource locator
16)(a) init, start, stop, destroy
17)(b) Applets loaded and executing locally have none of the restrictions faced by applets that
get loaded from the network.
18)(a) Int
19)(d) Execution of the run( ) method ends
20)(c) 9
21)(d) The finalize ( ) method can be overloaded
22)(b)void method2()
23(c)A compilation error will occur at (3), since the class does not have a constructor which
takes one argument of type int
24) b) paint
25)b) volatile
26)c)instanceOf
27)a) a simple applet
28) b) Component class
29) a)session identifier
30)c) Panel
31d) All mentioned above
32)b) Abstract Windowing Toolkit
33)b) public abstract void setColor(Color c)
34)a) public void drawRect(int x, int y, int width, int height)
35)c)List
36)c)Frame
37) a)Button,List,MenuItem
38)a)Try
39)a) Runtime
40) c) Throwable
41)a)Start

42) b)Start

43) b)run()
44)a)10

45)a)run()

46)a)start( )

47)a)DriverManager, Driver, Connection, Statement, and ResultSet

48) d)sql and javax.sql

49) c)Type-4 Driver

50) c) Remote Method Invocation

51)b) Brightness

52)b) Digital

53)b) negative and identity transformations

54)c) Histogram Matching

55)a) 4-neighbors of p

56)a) D(p, q) = [(x – s)2 + (y – t)2]1/2

57)b) Closing

58)c)Contour

59)d) Edge detection

60)a)First derivative

61c) Median

62)b) Median Filter

63)c) Differentiation

64) a) Prewitt and Sobel

66)b) False

67)a) Log Intensity Transformation Function


68)d) 1

69)d) Differentiation

70)d) Median

71)b) local operations

72)c) component progressive

73)d) Covariance

74) A) Image Restoration

75)c) All of the above

76)b) Lowpass filter

77)b) Inverse Fourier transform

80)c)Median filter

81)a)Singlecolor model

82)d)Spectral image processing

83)d) A.B

84)c) Structuring elements

85)d) Both A & B

86)d)Both A & B

87)a)Gaussian

88)a)Sharp image

89)b)1

90)d) Both a and b

91)a)morphology
92) c) edge map

93) d)90

94)a)R

95)d)Both a and b

96)c) scaling

97) d) binary image

98)a)1980

99) c)mid level processes

100) c) [0 255]

101) d) sensors

102) c) region

103)a) 1 mode

104) b) tightly coupled system

105)d) both a and b

106) a) Increased Throughput

107) c) operating system

108) c) CPU utilization

109) c) Clustered System

110) b) low memory

111) b) Linux

112) b)Volatile

113)c) the disks are operated in parallel

114)d)Redundant Array of Independent Disks


115)d) 1000 hours.

116)c) redundancy

117) a) mirroring

118)c) Both I and II

119)a) detection

120)c)The foundation on which all of your programs and applications run.

121)a)Android

122) d )GCM

123 c)Swapping

124)a)integer

125)b)better resource sharing

126) a)Reliability

127)c)system calls

128)a)at least one resource must be held in a non sharable mode

129)a)to ensure that at least one of the necessary conditions cannot hold

130)b) CPU scheduling

131)d)Virtual memory

132)b) Logical combination of physical memories on the nodes

133)a) HIT

134) b) Inconsistent

135)d)All the above

136)a)Physical object + controller, sensors , actuators + Internet


137)b) A Vaste collection of different networks

138)b) Both UDP and TCP

139)a) They are not present everywhere but silently working and not seeking attention

140)a) uniprogramming systems

141)a) when process is scheduled to run after some execution

142)(a) memory

143)(a) Main Memory

144)d) All of the mentioned

145)c) system calls

146)b)a task must be serviced by its deadline period

147)d) All of the mentioned

148)b) elf

149)c) NTLDR

150)d) multi user, multitasking

151)d) A process to upgrade the quality of data before it is moved into a data warehouse

152)c)Data are rarely deleted

153)c)The operational data are used as a source for the data warehouse

154)a)Once created, the data marts will keep on being updated from the data warehouse at
periodic times

155)c)Technology limited to specific data types such as numeric data types

156)b)It typically requires more disk storage

157)d)Snapshot change data


158)d)None of the above

159)C)Organized around important subject areas.


160)b) A system that is used to run the business in real time and is based on current data.

161)b)Data that can extracted from numerous internal and external sources

162)d)All of the above

163)b) Current data intended to be the single source for all decision support systems.

164)a) Data in which changes to existing records cause the previous version of the records to be
eliminated

165)b)Capturing a subset of the data contained in various operational systems

166)d)A process to upgrade the quality of data before it is moved into a data warehouse

167)B. A process to load the data in the data warehouse and to create the necessary indexes

168)a)A process to change data from a detailed level to a summary level

169)d)All of the above

170)c)One-to-many

171)c)Completely normalized

172)d)All of the above

173)a)To explain some observed event or condition

174)a)Relational databases are simple to understand

175)a)A column

176)b)The absence of a value

177)a)Do not allow the deletion

178)d)A number in the range 0 to M*N

179)d)All of the above

180)a) 2

181)`b)Data discrimination

182)c) mining of correlations


183)a)outlier analysis

184) b)performance issues

185)a)2

186)c)Both A and B

187)d)all of the above

188)d) All of the above

189)d) All of the above

190)c) Target Class

191)b) Frequent Subsequence

192)b) Evolution Analysis

193)a) Mining Methodology and User Interaction Issues

194)c) Diverse Data Types Issues

195)d) All of the above

196)d) Data Cleaning

197)b)Data Integration

198)a) Data Mining Query Language

199)c)Data are rarely deleted

200)c)One-to-many

201)c) Oracle

202)c)8

203)c)1950

204)d)1985

205)a).txt

206)c) shell
207)b) File allocation table

208)a) By operating system

209)a) Restarting computer

210)c) The page does not present in memory

211)c) The page does not present in memory

212)a) Recycle bin

213)c) Open-source operating system

214)d)Distributed shared memory

215)a) Interface definition language

216)a)Cold boot

217)c)To memory protection

218)b)Increases

219)c)Ms-Dos

220)c)Address bus

221)a)Translation Lookaside Buffer miss

222)a)Windows 7

223)a)Window XP

224)b)Windows 8

225)d)DOS

226)e)All of these

227)b)System call

228)b)Ready queue

229)d)All of these
230)d)Scheduler process

231)a)Operating system

232)a)Accessories

233)d)Process Control

234)d)Windows 2000

235)c)Windows 95

236)b)External commands

237)a)Up to 8 characters

238)c)Undelete *.doc

239)d)All of the above

240)d)Authentication

241)b)It is used to store folders and files hierarchically.

242)c)Preemptive scheduling

243)d)None of the these

244)c)Windows is a GUI operating system.

245)d)All of the these

246)b)ALT + TAB

247)b)EXE

248)d)SRTF Scheduling

249)b)From the device manager, click the print button

250)d)Network OS

251)b)Virtual memory
252) b)It’s a software that allows altering digital pictures
253) c) Both a and b
254) d) All of the above
255) d) All of the mentioned
256) d) All of the mentioned
257) d) Variable focal length
258) c) Full-color and pseudo-color processing
259)  Hue and Saturation
260) d) It is the number of bits used to represent each pixel in RGB space
261) d) By reducing the high-frequency components of image by blurring the image
262) a) Image acquisition
263) c) Digital
264) b) Morphological processing
265) c) discrete gray levels & number of samples
266) d) 10
267) a) Joint Photographic Experts Group
268) b) Deals with partitioning an image into its constituent parts or objects
269) d) M and N have to be positive integer
270) c) Interpolation
271) a) False Contouring
272) b) Single Pixel Operation
273) d) Tie points
274) c) Mask mode radiography
275) a) Spatial domain
276) b) Sharp transitions of gray levels
277) a) Masking
278) d) Gross representation
279) b) Nonlinear smoothing filters
280) d) Power law, logarithmic and inverse law
281) c) Highlight fine details in the image
282) a) Differentiation
283) d) Intensity
284) c) Edges
285) a) An image is the multiplication of illumination and reflectance component
286) d) All of the mentioned
287) d) All of the mentioned
288) c) Correlation
289) b) Low
290) c) Image enhancement
291) a) Probability Density Function
292) b) Low pass
293) a) Image with reduced sharp transitions in gray levels
294) c) Sum of filter coefficient’s product and corresponding image pixel under filter mask
295) d) All of the mentioned
296) b) Ideal lowpass filter
297) c) Illumination component
298) b) A Power-law response phenomenon
299) a) Bit-plane slicing
300) b) Contrast stretching

You might also like