1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
1 year ago
12

What command utilizes the limpel-ziv (lz77) compression algorithm and achieves a compression ratio of 60-70 percent?

Computers and Technology
1 answer:
AURORKA [14]1 year ago
4 0

The limpel-ziv (lz77) compression technique is used by the GNU zip (gzip) tool to produce a compression ratio of 60–70%.

<h3>How do methods for data compression function? Describe the LZW algorithm.</h3>

Compression methods lower the amount of memory needed to hold pictures and the number of bytes needed to represent data. Compression improves the amount of data that can be delivered over the internet and enables the storage of more photos on a given media.

Abraham Lempel, Jacob Ziv, and Terry Welch developed the table-based lookup technique known as LZW compression to compress a file into a smaller file. The TIFF image format and the GIF image format are two frequently used file formats that employ LZW compression.

To know more about limpel-ziv (lz77) compression algorithm, Visit:

<u>brainly.com/question/19878993</u>

#SPJ4

You might be interested in
__________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.
vitfil [10]

Answer:

Cryptography

is the correct answer.

Explanation:

<h2><u>Cryptography</u> offers a mechanism to accomplish four security goals.</h2><h2 />

Cryptography can be defined as technique to format data in such a way that it is Protected. It can be achieved by following goals:

  • Confidentiality is a term that ensures that the data is protected in such a way that it can not be accessed by any unauthorized member. In simpler words any kind of sensitive data is only under the access of people who have authorization key to retrieve or use it.
  • Integrity ensures that the data is real and authenticated. It basically safeguards the actual data.
  • Authentication is a process of verifying an identity by different means. Mostly it includes the the verification by username/password entrance
  • Non-repudiation is basically an surety that the data can't be denied by anyone. Non-repudiation provides the proof that the data is from origin and integrated.

<h3>I hope it will help you!</h3>
5 0
3 years ago
Identify and explain five areas where computers are used to process <br> data
Zigmanuir [339]

Answer:

Explanation:

They are used in homes, businesses, educational institutions, research organizations, the medical field, government offices, entertainment, etc.

Home. ...

Medical Field. ...

Entertainment. ...

Industry. ...

Education. ...

Government. ...

Banking. ...

Business.

6 0
2 years ago
What are some causes of the number of bytes on the wire exceeding the number of bytes being captured?
Aneli [31]
<span>Some causes of the number of bytes on the wire exceeding the number of bytes being captured is that </span>not everything is being captured or that partial packets may be captured which could lead to incorrect analysis. If there are regularly more bytes on the wire than captured, then, it is possible that the computer on which Wireshark is running is not able to keep up with the interface.
7 0
3 years ago
Read 2 more answers
1. The running configuration is also known as the _____________ (Select Two) a. Startup config b. Working configuration c. Curre
Shtirlitz [24]

Answer:

1. The running configuration is also known as the <u><em>b. working configuration</em></u>

<u><em>c. current configuration</em></u>

Explanation:

hopes this help (:

6 0
2 years ago
Pls help me!!!!!!!!!!!!!!!!!!!
kompoz [17]
T is text, thats all I know lol oh and 17 is blur / sharpen
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is the rarest and most valuable mineral ore among the native elements?
    13·1 answer
  • In what year did commercial use of the Internet become available? 1991 1996 1999 2001
    9·1 answer
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • When you use the fill handle to copy a formula to adjacent cells, this creates what kind of cell reference?
    5·1 answer
  • 14. Convert 11110111 from binary to denary<br> (1 Point)
    12·2 answers
  • What is the name of the file manager in Microsoft Windows. The file manager used in Microsoft Windows is?
    12·2 answers
  • How can the function anotherFunc2 change the contents of the second element of t?
    5·1 answer
  • What are the purposes of a good web page design?
    9·2 answers
  • Knowing the meaning of the acronym WAS I WHY can be most helpful to you when you?
    14·1 answer
  • Which of the following is the key business objective behind the technologies implemented by PCL Construction, as discussed in th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!