q1: choose the correct answer - university of technology · q11: choose the correct answer: 1....

14
1 Q1: Choose the correct answer: 1. In AI, a representation of …………………… is a combination of data structures and interpretive procedures that is used in the right way in a program. a. Knowledge b. Power c. Strength d. Intelligence 2. ………….. is an environment in which the search takes place. a. problem place b. problem instance c. problem space d. Non of the above 3. The fundamental ideas about retrieval that have been developed in AI systems might be termed as ……………… and …………………… a. Analogy, reasoning b. Thinking, doing c. Event, domain d. Linking, lumping 4. Robot machine might have cameras and infrared range finders for ………… and various motors of ………. a. Sensors, Agents b. Agents, Actuators c. Actuators, Sensors d. Sensors, Actuators 5. ……………….. are rules of thumb that may solve a given problem, but do not guarantee a solution. a. Strong methods b. Weak methods c. Heuristic d. Probabilistic 6. ………………. are means for transforming the problem from one state to another. a. States b. Operators c. Heuristic d. None of the above

Upload: others

Post on 16-Jul-2020

35 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

1

Q1: Choose the correct answer:

1. In AI, a representation of …………………… is a combination of data

structures and interpretive procedures that is used in the right way in a program.

a. Knowledge

b. Power

c. Strength

d. Intelligence

2. ………….. is an environment in which the search takes place.

a. problem place

b. problem instance

c. problem space

d. Non of the above

3. The fundamental ideas about retrieval that have been developed in AI systems

might be termed as ……………… and ……………………

a. Analogy, reasoning

b. Thinking, doing

c. Event, domain

d. Linking, lumping

4. Robot machine might have cameras and infrared range finders for ………… and

various motors of ……….

a. Sensors, Agents

b. Agents, Actuators

c. Actuators, Sensors

d. Sensors, Actuators

5. ……………….. are rules of thumb that may solve a given problem, but do not

guarantee a solution.

a. Strong methods

b. Weak methods

c. Heuristic

d. Probabilistic

6. ………………. are means for transforming the problem from one state to another.

a. States

b. Operators

c. Heuristic

d. None of the above

Page 2: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

2

7. The area of AI that investigates methods of facilitating communication between

people and computers is:

a. natural language processing

b. symbolic processing

c. decision support

d. robotics

Q2: Explain what are meta-heuristics algorithms, what are motivations for

them, list five and write algorithm for one only.

Page 3: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

3

Q3: Choose the correct answer:

1-If all devices are connected to a central hub, then topology is called

a. Bus Topology

b. Ring Topology

c. Star Topology

d. Tree Topology

2- Which of the following is an application layer service?

a. Network virtual terminal

b. File transfer, access and management

c. Mail service

d. All of the above

3- Which of the following is not the layer of TCP/IP protocol?

a. Application Layer

b. Session Layer

c. Transport Layer

d. Internetwork layer

4- Which of the following is/ are the drawbacks of Ring Topology?

a. Failure of one computer, can affect the whole network

b. Adding or removing the computers disturbs the network activity.

c. If the central hub fails, the whole network fails to operate.

d. Both of a and b

5- A communication device that combines transmissions from several I/O devices into one line is a

a. Concentrator

b. Modifier

c. Multiplexer

d. Full duplex file

6- What is the main difference between DDCMP and SDLC?

a. DDCMP does not need special hardware to final the beginning of a message

b. DDCMP has a message header

c. SDLC has a IP address

d. SDLC does not use CRC

7- The Internet addresses are ______ bits in length in IPV4 addressing scheme

a. 16

b. 64

c. 32

d. 48

Page 4: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

4

8- ____________ is a static algorithm in which every incoming packet is sent out on every outgoing line

except the one it arrives on. This method usually generates vast number of duplicate packets.

a. Flooding

b. Wait and watch

c. Congestion

d. Both a and c

Q4: In network layer and transport layer there are two types of services Connectionless

and Connection –Oriented distinguish between them.

Page 5: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

5

Q5: Choose the correct answer: 1. In cryptography, what is cipher?

a) algorithm for performing encryption and decryption

b) encrypted message

c) both (a) and (b)

d) none of the mentioned

2. IPSec is designed to provide the security at the

a) network layer

b) transport layer

c) application layer

d) session layer

3. An attempt to make a computer resource unavailable to its intended users is called

a) denial-of-service attack

b) virus attack

c) worms attack

d) botnet process

4. Cryptanalysis is used

a) to find some insecurity in a cryptographic scheme

b) to increase the speed

c) to encrypt the data

d) none of the mentioned

5. Which one of the following is a cryptographic protocol used to secure HTTP

connection?

a) transport layer security (TSL)

b) stream control transmission protocol (SCTP)

c) explicit congestion notification (ECN)

d) resource reservation protocol

6. ElGamal encryption system is

a) asymmetric key encryption algorithm

b) symmetric key encryption algorithm

c) not an encryption algorithm

d) none of the mentioned

Page 6: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

6

7. Cryptographic hash function takes an arbitrary block of data and returns

a) fixed size bit string

b) variable size bit string

c) both (a) and (b)

d) none of the mentioned

8. In asymmetric key cryptography, the private key is kept by

a) receiver

b) sender

c) sender and receiver

d) all the connected devices to the network

Q6: What is a security policy?

Page 7: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

7

Q7: Choose the correct answer:

1. All the past attempts by ---- to provide strategic information have been failures.

a. IT

b. IS

c. OS

d. DB

2. The data in the data warehouse comes from several -----.

a. operational systems.

b. integrated systems.

c. collaborative systems.

d. distributed systems.

3. Every data structure in the data warehouse contains the ------ element.

a. space

b. time

c. structure

d. distributed

4. When a user queries the data warehouse for analysis, he or she usually starts by

lookingat -------- data.

a. connected

b. summary

c. whole

d. short

5. Three major functions need to be performed for getting the data ready. You have to

extractthe data, transform the data, and then load the data into the ---------.

a. data base storage.

b. meta data storage.

c. data warehouse storage.

d. OS storage.

6. ------ involves many forms of combining pieces of data from the differentsources.

a. data relational

b. data transparency

c. data transformation

d. data accuracy.

7. -------- in a data warehouse is similar to the data dictionary or the data catalog in

adatabase management system.

a. data b. information c. wisdom d.Metadata

Page 8: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

8

8. Visualizations are no longer-------.

a. dynamic

b. distributed

c. integrated

d. static

Q8: Draw the data warehouse components.

Page 9: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

9

Q9: Choose the correct answer:

1) The distance between pixels p and q, the pixels have a distance less than or equal to

some value of radius r, form a diamond centered at (x,y) is called :

a) Euclidean distance

b) Chessboard distance

c) City-Block distance

d) None of the Mentioned

2) Histogram Equalization is also called:

a) Histogram Matching

b) Image Enhancement

c) Histogram linearization

d) None of the Mentioned

3) In Geometric Spatial Transformation, points whose locations are known precisely

in input and reference images is called:

a) Control points

b) Ambiguous points

c) Known points

d) Key-points

4) The procedure done on a digital image to alter the values of its individual pixels is

a) Neighborhood Operations

b)Image Registration

c) Geometric Spatial Transformation

d) Single Pixel Operation

5) _____________ is the effect caused by the use of an insufficient number of

intensity levels in smooth areas of a digital image.

a) Gaussian smooth

b) Contouring

c) False Contouring

d) Interpolation

6) Image _____________ happens anytime you resize or remap your image from one

pixel grid to another.

a) interpolation

b) smoothing

c)blurring

d) feature extraction

Page 10: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

01

7) _____________ is a fundamental task in image processing used to match two or

more Images.

a) Differencing

b) Segmentation

c) Computer vision

d) Registration

8) _____________ is the technique which turns the patterns of an object in an image

into mathematical space.

a) Registration

b) Segmentation

c) Texture analysis

d) Image differencing

Q10: Draw a block diagram that represent detailed steps for suggested

Medical Computer

Page 11: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

11

Q11: Choose the correct answer:

1. ------------------- gather together multiple CPUs to accomplish computational

work and it differ from multiprocessor systems, in that they are composed of two

or more individual systems coupled together.

a) Clustered systems

b) Von Neumann architecture

c) Tightly coupled systems

d) Symmetric multiprocessing (SMP),

2. At system boot time, the hardware starts in -------------.

a) Kernel mode

b) User mode

c) Dual mode

d) Privileged instructions

3. The operating system is responsible for the following activities in connection

with disk management:

a) Creating and deleting files

b) Creating and deleting directories to organize files

c) Supporting primitives for manipulating files and directories

d) none of the above

4. Each process is represented in the operating system by -----------

a) a process control block (PCB)—also called a task control block

b) process control block

c) Scheduling Queues

d) degree of multiprogramming

5. Mapping of network file system protocol to local file system is done by

a) network file system

b) local file system

c) volume manager

d) remote mirror.

6. Because of virtual memory, the memory can be shared among

a) processes

b) threads

c) instructions

d) none of the mentioned

7. ------------------: some machine instructions that may cause harm can only be

executed in kernel mode.

a) Privileged instructions

b) Instruction register

c) Interrupt Instructions

d) Store Instructions .

Q12: Compare between FCFS and SJF policy in scheduling algorithm?

Page 12: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

12

Q13: Choose the correct answer:

1. SCSI stands fora) Signal Computer System Interface.

b) Small Computer System Interface.

c) Small Coding System Interface.

d) Signal Coding System Interface.

2. The minimum time delay between two successive memory read operations is ______.

a) Cycle time

b) Latency

c) Delay

d) None of the above

3. VLSI stands for

a) Very Large Scale Integration.

b) Very Large Stand-alone Integration.

c) Volatile Layer System Interface.

d) None of the above.

4. A 16 X 8 organisation of memory cells, can store upto _____.

a) 256 bits

b) 1024 bits

c) 512 bits

d) 128 bits

5. The advantage of CMOS SRAM over the transistor one’s is

a) Low cost.

b) High efficiency.

c) High durability.

d) Low power consumption.

6. The time between the recieval of an interrupt and its service is ______

a) Interrupt delay

b) Interrupt latency

c) Cycle time

d) Switching time

7. Interrupts form an important part of _____ systems

a) Batch processing

b) Multitasking

c) Real-time processing

d) Multi-user

Q14: How stack is implemented in a general microprocessor system.

Page 13: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

31

Q15: Choose the correct answer:

1. The …………….. is one of the most important measures which can be

employed in data compression :

a. Energy.

b. Entropy.

c. Correlation Coefficient.

d. None of the above.

2. The idea of compression by reducing redundancy suggest the general law of

data compression, which is to assign …………. To symbols or group of

symbols that appear more frequently in data .

a. Short codes..

b. Long codes.

c. Zero's.

d. One's.

3. In general, the efficiency of the code in variable-length coding is ………….

The efficiency of the code in fixed-length coding.

a. Less than.

b. More than.

c. Equal to.

d. None of the above.

4. Lossy compression methods make sense especially in compressing …….. files.

a. image.

b. Movie.

c. sound.

d. All the above.

5. The concept of …………... is in some sense the opposite of data compression .

a. Data reliability.

b. Data integrity.

c. Code efficiency

d. None of the above.

6. A compression ratio of value greater than "one" imply that the compression is a

………….. compression.

a. good.

b. positive.

c. negative.

d. None of the above.

7. In ………….. , a model for the data has to be constructed before compression

can begin. This model is built by reading the entire input stream, counting the

Page 14: Q1: Choose the correct answer - University of Technology · Q11: Choose the correct answer: 1. ----- gather together multiple CPUs to accomplish computational work and it differ from

31

number of times each symbol appears , the data stream is then input again ,

symbol by symbol, and is compressed using the information in that model.

a. Run length encoding method

b. Statistical method.

c. Dictionary method.

d. Transform method.

Q16: Briefly describe the main steps of Huffman coding.