1. | Makes the file smaller by deleting parts of the file permanently (forever) |
A. | Lossy Compression |
B. | Lossless Compression |
Answer» A. Lossy Compression |
2. | Which of these is an advantage for Lossy compression? |
A. | The file size becomes significantly (much) smaller |
B. | The file size does not become much smaller than 50% |
Answer» A. The file size becomes significantly (much) smaller |
3. | Which of the following would not be suitable for Lossy Compression? |
A. | Images |
B. | Sounds |
C. | Videos |
D. | Text |
Answer» D. Text |
4. | Lossy or lossless? This type of compression does not get rid of any data |
A. | Lossy |
B. | Lossless |
C. | Both |
Answer» B. Lossless |
5. | Lossy or lossless? Used for web images as it gives the smallest file size – this makes images easier to upload/download/share. |
A. | Lossy |
B. | Lossless |
C. | Both |
Answer» A. Lossy |
6. | What type of compression allows you to reconstruct the original data? |
A. | Lossless compression |
B. | Lossy compression |
Answer» A. Lossless compression |
7. | What are the key reasons for compressing data? |
A. | Less space needed for storage |
B. | Less time to transmit |
C. | Reduced amount of processing power |
D. | A and b |
Answer» D. A and b |
8. | Lossless compression… |
A. | Is used when not all the information is needed |
B. | Would be a sensible choice for a music download site |
C. | Can fully regenerate the original file |
D. | a and c |
Answer» D. a and c |
9. | Lossy compression… |
A. | Permanently removes data from a file |
B. | Aims to remove redundant data |
C. | Would be a sensible choice for a music download site. |
D. | all of the above |
Answer» D. all of the above |
10. | Dictionary based compression… |
A. | Is a lossless compression format |
B. | Doesn’t need to send the dictionary with the data |
C. | Is a lossless compression format |
D. | all of the above |
Answer» D. all of the above |
11. | Run-length encoding.. |
A. | Is Lossless |
B. | Records the number of repeats of an individual element |
C. | Can be used for a wide variety of file types |
D. | all of the above |
Answer» D. all of the above |
12. | Hashing gives each item |
A. | A sequential address |
B. | A logarithmic address |
C. | No address |
D. | A unique address |
Answer» D. A unique address |
13. | When is Run Length Encoding used? |
A. | When we want to compress patterns of data |
B. | When we want to decompress patterns of data |
C. | When we want to encode running videos |
D. | Option. |
Answer» A. When we want to compress patterns of data |
14. | What is the correct Run-length encoding for the data: cccmmmmmsssssdcccccc |
A. | 3c5m5s1d6c |
B. | C3m5s5d1c6 |
C. | Cmsdc35516 |
D. | Cccmmmmmsssssdcccccc |
Answer» A. 3c5m5s1d6c |
15. | Which of the following are not in a compressed format? |
A. | JPEG |
B. | Bitmap |
C. | MPEG |
D. | MP3 |
Answer» B. Bitmap |
16. | Identify types of lossless compression |
A. | Run length encoding |
B. | Dictionary encoding |
C. | Transform Coding |
D. | a and b |
Answer» D. a and b |
17. | Digitizing the image intensity amplitude is called |
A. | Sampling |
B. | Quantization |
C. | Framing |
D. | Both A And B |
Answer» B. Quantization |
18. | Compressed image can be recovered back by |
A. | Image Enhancement |
B. | Image Decompression |
C. | Image Contrast |
D. | Image Equalization |
Answer» B. Image Decompression |
19. | Digital video is sequence of |
A. | Pixels |
B. | Matrix |
C. | Frames |
D. | Coordinates |
Answer» C. Frames |
20. | Coding redundancy works on |
A. | Pixels |
B. | Matrix |
C. | Intensity |
D. | Coordinates |
Answer» C. Intensity |
21. | An Alphabet Consist Of The Letters A, B, C And D. The probability of occurrence is p(a) = 0.4, p(b) = 0.1, p(c) = 0.2 and p(d) = 0.3. The huffman code is |
A. | A = 0 , B = 11 , C = 10 , D = 111 |
B. | A = 0 , B = 111 , C = 110 , D = 10 |
C. | A = 01 , B = 111 , C = 110 , D = 10 |
D. | A = 0 , B = 111 , C = 11 , D = 101 |
Answer» B. A = 0 , B = 111 , C = 110 , D = 10 |
22. | The basic idea behind huffman coding is to |
A. | Compress data by using more bits to encode more frequently occurring characters |
B. | Compress data by using fewer bits to encode more frequently occurring characters |
C. | Expand data by using fewer bits to encode more frequently occurring characters |
D. | Compress data by using fewer bits to encode fewer frequently occurring characters |
Answer» B. Compress data by using fewer bits to encode more frequently occurring characters |
23. | Huffman coding is an encoding algorithm used for |
A. | Lossy Data Compression |
B. | Broadband Systems |
C. | Lossless Data Compression |
D. | Files Greater Than 1 Mbit |
Answer» C. Lossless Data Compression |
24. | A huffman encoder takes a set of characters with fixed length and produces a set of characters of |
A. | Constant Length |
B. | Random Length |
C. | Fixed Length |
D. | Variable Length |
Answer» D. Variable Length |
26. | The idea with wavelets is to represent a complicated function by |
A. | Sinus Functions |
B. | Simple Basic Functions |
C. | Lines |
D. | Square Functions |
Answer» B. Simple Basic Functions |
27. | Down sampling is to make a digital image file smaller by |
A. | Removing noise |
B. | Adding noise |
C. | Removing pixels |
D. | Adding pixels |
Answer» C. Removing pixels |
28. | In a typical picture, most pixels will be |
A. | Very similar to their neighbors |
B. | Very different to their neighbors |
C. | Bright |
D. | Equal |
Answer» A. Very similar to their neighbors |
29. | Without losing quality, JPEG-2000 can achieve compression ratios of |
A. | 2000:1 |
B. | 20:1 |
C. | 200:1 |
D. | 2:1 |
Answer» C. 200:1 |
30. | The best visual compression quality is achieved using |
A. | Dolby |
B. | Wavelets |
C. | Fourier transform |
D. | DCT |
Answer» B. Wavelets |
31. | Sequence of code assigned is called |
A. | Code Word |
B. | Word |
C. | Byte |
D. | Nibble |
Answer» A. Code Word |
32. | Every run length pair introduce new |
A. | Pixels |
B. | Matrix |
C. | Frames |
D. | Intensity |
Answer» D. Intensity |
33. | In the coding redundancy technique we use |
A. | Fixed Length Code |
B. | Variable Length Code |
C. | Byte |
D. | Both A And B |
Answer» D. Both A And B |
34. | Compression is done for saving |
A. | Storage |
B. | Bandwidth |
C. | Money |
D. | Both A And B |
Answer» D. Both A And B |
35. | System of symbols to represent event is called |
A. | Storage |
B. | Word |
C. | Code |
D. | Nibble |
Answer» C. Code |
36. | Information lost when expressed mathematically is called |
A. | Markov |
B. | Finite Memory Source |
C. | Fidelity Criteria |
D. | Noiseless Theorem |
Answer» C. Fidelity Criteria |
37. | What does xml stand for? |
A. | Extra Modern Link |
B. | Extensible Markup Language |
C. | Example Markup Language |
D. | X-Markup Language |
Answer» B. Extensible Markup Language |
38. | What is the correct syntax of the declaration which defines the xml version? |
A. | <Xml Version=”A.0″ /> |
B. | <?Xml Version=”A.0″?> |
C. | <?Xml Version=”A.0″ /> |
D. | None Of The Above |
Answer» B. <?Xml Version=”A.0″?> |
39. | Which of the following programs support xml or xml applications? |
A. | Internet Explorer 5.5 |
B. | Netscape D.7 |
C. | Realplayer. |
D. | Both A And B |
Answer» D. Both A And B |
40. | Well formed xml document means |
A. | It Contains A Root Element |
B. | It Contain An Element |
C. | It Contains One Or More Elements |
D. | Must Contain One Or More Elements And Root Element Must Contain All Other Elements |
Answer» D. Must Contain One Or More Elements And Root Element Must Contain All Other Elements |
41. | Comment in xml document is given by |
A. | <?– –> |
B. | <!– –!> |
C. | <!– –> |
D. | </– — > |
Answer» C. <!– –> |
42. | Xml document can be viewed in |
A. | IE C.0 |
B. | IE B.0 |
C. | IE 6.0 |
D. | IE X.0 |
Answer» C. IE 6.0 |
43. | How can we make attributes have multiple values |
A. | <Myelement myattribute=”value1 value2″/> |
B. | <Myelement myattribute=”value1″ myattribute=”value2″/> |
C. | <Myelement myattribute=”value1, value2″/> |
D. | Attributes cannot have multiple values |
Answer» D. Attributes cannot have multiple values |
44. | Attribute standalone=”no” should be included in xml declaration if a document |
A. | Is linked to an external xsl stylesheet |
B. | Has external general references |
C. | Has processing instructions |
D. | Has an external dtd |
Answer» D. Has an external dtd |
45. | The xml dom object is |
A. | Entity |
B. | Entity Reference |
C. | Comment Reference |
D. | Comment Data |
Answer» B. Entity Reference |
46. | Whats so great about xml? |
A. | Easy data exchange |
B. | High speed on network |
C. | Only b.is correct |
D. | Both A. & B. |
Answer» D. Both A. & B. |
47. | The Attribute Used To Define A New Namespace Is |
A. | XMLNS |
B. | Xmlnamespace |
C. | Xmlns |
D. | Xmlns |
Answer» C. Xmlns |
48. | With XML: |
A. | Views are not limited to one multi-valued path only. |
B. | Documents can automatically be generated from database data only. |
C. | Database data can automatically be extracted from xml documents only. |
D. | With xml, all of the above are true. |
Answer» D. With xml, all of the above are true. |
49. | An xml component that defines the structure of a document is known as a(n): |
A. | DOCTYPE. |
B. | DTD |
C. | #PCDATA. |
D. | HTML Stylesheet. |
Answer» B. DTD |
51. | Data compression consists of taking a stream of symbols and transforming them into_______. |
A. | Bits |
B. | Codes |
C. | Error |
D. | Image |
Answer» B. Codes |
52. | In Huffman coding, the actual output of the encoder is determined by a set of |
A. | Probabilities |
B. | Function |
C. | Codes |
D. | Model |
Answer» A. Probabilities |
53. | A compression technique consists of two basic components such as |
A. | Coding, Decoding |
B. | Encoding , Coding |
C. | Encoding , Decoding |
D. | None of Above. |
Answer» C. Encoding , Decoding |
54. | Advantages of data compression |
A. | The user can experience rich quality signals for data representation |
B. | Reliability of the records gets reduced by Data compression. |
C. | Disorder of data properties of a compressed data will result in compressed data different from the original data. |
Answer» A. The user can experience rich quality signals for data representation |
55. | Disadvantages of data compression |
A. | The rate of input – output operations in a computing device can be greatly increased due to shorter presentation of data. |
B. | Compressed, sensitive data transmitted through a noisy communication channel is risky because the burst errors introduced by the noisy channel can destroy the transmitted data. |
Answer» B. Compressed, sensitive data transmitted through a noisy communication channel is risky because the burst errors introduced by the noisy channel can destroy the transmitted data. |
56. | Lossy compression algorithm is applied to.. |
A. | Images And Sound |
B. | Sound And Text |
C. | Image And Text |
Answer» A. Images And Sound |
57. | Lossless compression algorithm is applied to.. |
A. | Image |
B. | Sound |
C. | Scientific Data |
Answer» C. Scientific Data |
58. | Example of entropy based compression is |
A. | RLE , Arithmetic , Huffman |
B. | Lempel-Ziv , Arithmetic |
Answer» A. RLE , Arithmetic , Huffman |
59. | Example of dictionary based compression is |
A. | RLE , Arithmetic , Huffman |
B. | Lempel-Ziv |
Answer» B. Lempel-Ziv |
60. | Entropy coding can be used for |
A. | Sequence of digital data values |
B. | Random of digital data values |
C. | Regular of digital data values |
Answer» A. Sequence of digital data values |
61. | Entropy coding can be used for compression of any type of data in a |
A. | Media system |
B. | File system. |
C. | Bit system |
Answer» B. File system. |
62. | RLE Is Designed Especially For Data With |
A. | Image of repeated symbols |
B. | Sound of repeated symbols |
C. | Strings of repeated symbols |
Answer» C. Strings of repeated symbols |
63. | Huffman coding is to find a way to compress the storage of data using |
A. | Data Length Codes. |
B. | Variable Length Codes. |
Answer» B. Variable Length Codes. |
64. | Huffman coding is constructed in such a way that no ___constructed code are prefixes to each other. |
A. | Three |
B. | One |
C. | Two |
Answer» C. Two |
65. | Limitations of huffman coding is |
A. | Each symbol is encoded with integer number of bits |
B. | Each symbol is encoded with integer number of value |
C. | Each symbol is encoded with integer number of level |
Answer» A. Each symbol is encoded with integer number of bits |
66. | Arithmetic coding completely bypass the idea of replacing every input symbol with a |
A. | Bits |
B. | String |
C. | Codeword |
Answer» C. Codeword |
67. | The main aim of arithmetic coding is to assign the _____to each symbol. |
A. | Interval |
B. | Image |
C. | Symbol |
Answer» A. Interval |
68. | Limitations of arithmetic coding |
A. | The precision required to represent the intervals grows with length of the message. |
B. | The precision required to represent the intervals grows with bit of the message. |
C. | The precision required to represent the random grows with length of the message. |
Answer» A. The precision required to represent the intervals grows with length of the message. |
69. | Arithmetic algorithms as well as huffman algorithms are based on |
A. | Statistical model |
B. | String model |
C. | Probability model |
Answer» A. Statistical model |
70. | The lempel ziv algorithm is an algorithm for |
A. | Lossless data compression |
B. | Lossy data compression |
Answer» A. Lossless data compression |
71. | Variations on lz77 scheme, like |
A. | LZS, LZ And LZB |
B. | LZSS, LZH And LB |
C. | LZSS, LZH And LZB |
Answer» C. LZSS, LZH And LZB |
72. | Lz77 exploits the fact that words and phrases within a ____would be repeated. |
A. | Video File |
B. | Text File |
C. | Image File |
Answer» B. Text File |
73. | In LZ77 encoding process one reference (a triple) is transmitted for several input symbols and hence it is |
A. | Less Quick. |
B. | Quick. |
C. | Very Quick. |
Answer» C. Very Quick. |
74. | LZH is performed in ___ phases |
A. | Two |
B. | Four |
C. | One |
Answer» A. Two |
76. | LZB achieves a better compression than |
A. | LZH |
B. | LZB |
C. | LZSS |
Answer» C. LZSS |
77. | The decompression in LZ78 Is __compared to the process of compression. |
A. | Slower |
B. | Faster |
Answer» B. Faster |
78. | LZW would only send the _____to the dictionary |
A. | Image |
B. | Index |
C. | File |
Answer» B. Index |
79. | In arithmetic coding a ___identifier or tag is generated for the sequence to be encoded. |
A. | Unique |
B. | Different |
Answer» A. Unique |
80. | The use of the cumulative distribution function to generate a binary code for _____has a rather interesting history. |
A. | A Sequence |
B. | A Bit |
C. | A Image |
Answer» A. A Sequence |
81. | Once we have started decoding, all we have to do is ___the encoder algorithm. |
A. | Mimic |
B. | Long |
C. | Static |
Answer» A. Mimic |
82. | Advantage of arithmetic coding is that |
A. | It is easy to implement a system with multiple arithmetic codes |
B. | It is hard to implement a system with multiple arithmetic codes |
C. | It is easy to implement a system with single arithmetic codes |
Answer» A. It is easy to implement a system with multiple arithmetic codes |
83. | In file compression—unix once the dictionary has filled up, the size of the dictionary is ____to 1024 entries. |
A. | Single |
B. | Doubled |
Answer» B. Doubled |
84. | GIF is another implementation of the ___ algorithm |
A. | LZW |
B. | LZSS |
C. | LZH |
Answer» A. LZW |
85. | GIF has become quite popular for encoding all kinds of images, both computergenerated and “___” images. |
A. | Distorted |
B. | Natural |
Answer» B. Natural |
86. | The PNG standard is one of the first standards to be collaboratively developed over the |
A. | Image |
B. | Internet |
C. | File |
Answer» B. Internet |
87. | PNG is based on |
A. | LZSS |
B. | LZH |
C. | LZ77 |
Answer» C. LZ77 |
88. | The ITU-T recommendation V.42 bis is a compression standard devised for use over a |
A. | Telephone Network |
B. | Image Network |
C. | Text File Network |
Answer» A. Telephone Network |
89. | Bwt algorithm requires that the entire sequence to be coded be available to the ____before the coding takes place |
A. | Decoder. |
B. | Encoder |
Answer» B. Encoder |
90. | Shannon Defined A Quantity Called |
A. | Self-Information |
B. | Information |
Answer» A. Self-Information |
91. | Models for certain telemetry data can also be obtained through ____of the underlying process. |
A. | Knowledge |
B. | Text |
C. | Data |
Answer» A. Knowledge |
92. | Probability Models Know As.. |
A. | Knowledge model |
B. | Statistical model |
C. | Ignorance model |
Answer» C. Ignorance model |
93. | Markov process called |
A. | Discrete time markov chain |
B. | Random time markov chain |
Answer» A. Discrete time markov chain |
94. | Markov models are more widely known |
A. | Finite context models |
B. | Text context models |
Answer» A. Finite context models |
95. | The ppm algorithms first attempt to find if the symbol to be encoded has a _____probability with respect to the maximum context length. |
A. | Zero |
B. | Nonzero |
Answer» B. Nonzero |
96. | Composite source model, which can be viewed as a |
A. | Single Model To Describe The Source |
B. | Combination Or Composition Of Several Sources |
Answer» B. Combination Or Composition Of Several Sources |
97. | The set of binary sequences is called a |
A. | Code |
B. | Unit |
C. | Digit |
Answer» A. Code |
98. | The set of binary sequences is called a code, and the individual members of the set are called |
A. | Sequence Model |
B. | Unit Model |
C. | Codewords. |
Answer» C. Codewords. |
99. | The ASCII code uses the same number of bits to represent each symbol. Such a code is called |
A. | Random Length Code. |
B. | Fixed-Length Code. |
Answer» B. Fixed-Length Code. |
100. | Unique decodability from the code; that is, any given sequence of codewords can be decoded in |
A. | One, And Two, Way. |
B. | One, And Only One, Way. |
Answer» B. One, And Only One, Way. |