You are on page 1of 6

University of Mumbai

Examination 2020 under cluster 8 (PHCET)


These are sample MCQs to indicate pattern, may or may not
appear in examination
G.M. VEDAK INSTITUTE OF TECHNOLOGY
Program: BE_____EXTC________ Engineering
Curriculum Scheme: Rev2016/2012
Examination: Third Year Semester V/VI
Course Code: _ETE701____and Course Name: DCE____
Time: 1 hour Max. Marks: 50
=====================================================================

Note to the students:- All the Questions are compulsory and carry equal marks .
Q1. In minimum Huffman coding ,no codeword is ............of another codeword

Option A: prefix

Option B: suffix

Option C: middle

Option D: final

Q2. Tag generation is part of which coding method

Option A: Dictionary

Option B: Arithmetic

Option C: Shannon Fano

Option D: Huffman

Q3. Data integrity is protected in which type of compression

Option A: digital

Option B: Lossy

Option C: Lossless

Option D: analog

Q4. Compressed image can be recovered back by

1|Page
University of Mumbai
Examination 2020 under cluster 8 (PHCET)
Option A: image equalization

Option B: image contrast

Option C: image enhancement

Option D: image decompression

Q5. image compression comprised of

Option A: encoder,decoder

Option B: encoder,sampler

Option C: decoder,sampler

Option D: quantizer

Q6. sequence of code assigned is called

Option A: word

Option B: codeword

Option C: byte

Option D: nibble

Q7. What is sampling rate for MP3 audio compression is

Option A: 22.1 KHz

Option B: 88.2KHz

Option C: 44.1KHz

Option D: 20KHz

Q8. In which type of masking principle perceptual coding is used.

Option A: Statical

Option B: Temporal

Option C: spacial

Option D: Frequency

2|Page
University of Mumbai
Examination 2020 under cluster 8 (PHCET)

Q9. A video consists of a sequence of

Option A: frames

Option B: signals

Option C: packets

Option D: slots

Q10. The characteristics of compressor in μ-law companding are

Option A: Logarithmic in nature

Option B: Continuous in nature

Option C: Linear in nature

Option D: Discrete in nature

Q11. MPEG is used to compress

Option A: images

Option B: frames

Option C: video

Option D: audio

Q12. High compression is achieved in which following standard.

Option A: JPEG-LS

Option B: CALIC

Option C: JPEG

Option D: JPEG2000

Q13. The first phase of JPEG image compression is called

Option A: DCT tranformation

Option B: Quantization

3|Page
University of Mumbai
Examination 2020 under cluster 8 (PHCET)
Option C: Data regression

Option D: Data compression

Q14. An encryption technique with 2 keys is ______________

Option A: Cryptography

Option B: Public key cryptography

Option C: Monoalphabetic Cipher

Option D: Private key cryptography

Q15. Symmetric key cryptography is also called as ...........key cryptography

Option A: Known

Option B: Unknown

Option C: Secret

Option D: Public

Q16. what is ϕ(1)

Option A: 1
Option B: 2
Option C: 3
Option D: 0

Q17. Perform encryption on the following PT using RSA and find the CT.p = 3; q = 11; M = 5

Option A: 26
Option B: 28
Option C: 18
Option D: 12

Q18. Which algorithm is prone to Brute-Force attack.

Option A: HASH

Option B: RSA

Option C: MAC

Option D: Diffie-Hellman

4|Page
University of Mumbai
Examination 2020 under cluster 8 (PHCET)

Q19. Which theorem is ued to find a mod of large numbers

Option A: Euclid theorem

Option B: Euler's theorem

Option C: Fermat theorem

Option D: Chinese remainder theorem

Q20. Which of these is a part of network identification?

Option A: fingerprint

Option B: OTP

Option C: Password

Option D: UserID

Q21. The DSS signature uses which hash algorithm?

Option A: SHA-1

Option B: MD5

Option C: SHA-2

Option D: Does not use hash algorithm

Q22. Which standard is used to send and recieve secure mail

Option A: IDEA

Option B: S-MIME

Option C: SHA-1

Option D: RSA

Q23. Handshake Protocol is part of which layer in OSI

Option A: Transport layer

Option B: Application layer

Option C: SSL layer

5|Page
University of Mumbai
Examination 2020 under cluster 8 (PHCET)

Option D: Physical layer

Q24. Which detection system observe and check the deviation of normal network

Option A: Signature based detection

Option B: Threshold detection

Option C: Stateful based analysis

Option D: Anomaly based detection

Q25. what is lossless compression?

Option A: files which have the exact same data after compression

Option B: no information is lost but file size is increased

Option C: there is no loss in information at all after compression

Option D: compression that involves an algorithm

6|Page

You might also like