1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
2 years ago
12

What command utilizes the limpel-ziv (lz77) compression algorithm and achieves a compression ratio of 60-70 percent?

Computers and Technology
1 answer:
AURORKA [14]2 years ago
4 0

The limpel-ziv (lz77) compression technique is used by the GNU zip (gzip) tool to produce a compression ratio of 60–70%.

<h3>How do methods for data compression function? Describe the LZW algorithm.</h3>

Compression methods lower the amount of memory needed to hold pictures and the number of bytes needed to represent data. Compression improves the amount of data that can be delivered over the internet and enables the storage of more photos on a given media.

Abraham Lempel, Jacob Ziv, and Terry Welch developed the table-based lookup technique known as LZW compression to compress a file into a smaller file. The TIFF image format and the GIF image format are two frequently used file formats that employ LZW compression.

To know more about limpel-ziv (lz77) compression algorithm, Visit:

<u>brainly.com/question/19878993</u>

#SPJ4

You might be interested in
One part of a development team has completed an algorithm. Why is it important to share it with others on the team? Choose all t
Nadusha1986 [10]

Answer: B,C,D

Explanation:

5 0
3 years ago
Evaluate how suitable the hardware would be for:
almond37 [142]

Answer:

What hardware and software support might be used to develop the system and operate?

von-Neumann architecture of the computer. Von-Neumann computer consists of two main components: memory and CPU. ...

Application Software. An application software is a computer program designed to perform a group of coordinated functions, tasks, or activities. ...

Operating System. ...

CPU. ...

Storing device. ...

RAM. ...

Motherboard. ...

Bits and bytes.

Explanation:

4 0
3 years ago
Imagine that you work for a company directly related to your major. Your company is preparing for expansion and your boss, Ms. S
shutvik [7]

Answer:

start with what you know

Explanation:

6 0
3 years ago
Which activity should be part of a long-term plan to positively affect your
STatiana [176]
D that is the answer but I need 20 words to send this text
5 0
3 years ago
Consider the following environment with a local dns caching resolver and a set of authoritative dns name servers
Schach [20]

Answer:

Normally in a DNS server, There are no packet losses•All processing delays are 0 ms

Explanation:

If any packet lost in DNS then lost in the connection information will be displayed in prompt. Once the packet is lost then data is lost. So if the packet is lost then data communications are lost or the receiver will receive data packet in a lost manner, it is useless.

To connect in windows normally it will take 90 ms for re-establish connection it normally delays the time in windows. So that end-user he or she for best performance ping the host or gateway in dos mode so that connection or communication will not be lost. If any packet is dropped DNS will get sent the packet from sender to receiver and the ping rate will more in the network traffics.

7 0
4 years ago
Other questions:
  • ​_____ describes the process of using computer software to extract large amounts of data from websites. A. Sentiment analysis B.
    10·1 answer
  • What tool do you use to secure remote access by users who utilize the internet??
    7·1 answer
  • ____ assigns a risk rating or score to each information asset. Although this number does not mean anything in absolute terms, it
    8·1 answer
  • In Microsoft Word you can access _ the command to the mini toolbar
    14·2 answers
  • RFID tagging is an IoT technology that allows assets to be tracked using electromagnetic fields to automatically identify tagged
    10·1 answer
  • Write a python program to print numbers from 100 to 50 using for loop.<br> I NEED THIS URGENT PLEASE
    9·1 answer
  • If the middle number is lesser than the candidates then u eliminate the ___ half of the data​
    5·1 answer
  • 1. Give one reason why data is represented in binary in a computer [1]
    10·1 answer
  • How does one of the algorithms in your program function?
    13·1 answer
  • Computer are most wonderful creation of 21st century how ?​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!