1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
3 years ago
15

How is an image represented

Computers and Technology
2 answers:
jeka943 years ago
8 0
To store images in a computer we have to sample and quantize (digitize) the image function. ... And quantization refers to the representation of the gray level value at the sampling point using finite number of bits. Each image sample is called a pixel.
Sonja [21]3 years ago
4 0
With a sertain address.
You might be interested in
A relational database can best be described as a collection of related _____ designed to minimize redundant data.
blondinia [14]

A relational database can best be described as a collection of related tables designed to minimize redundant data.

<h3>What is a relational database?</h3>

A relational database is known to be a type of database that keeps and gives people room or access to data points that are known to be linked to each other.

Conclusively,  Relational databases are known to have relational model, an good and specific way of showing data through the use of tables.

Learn more about relational database from

brainly.com/question/13262352

7 0
3 years ago
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
Davingould1115...................answer 3​
FrozenT [24]

Answer:

yo thx bro let me know if u need any more help

Explanation:

4 0
3 years ago
Assume that the "read/write file to hard disk" library is part of the kernel. Assume that this library uses 1MB of RAM. Assume t
scZoUnD [109]

Answer:

The Answer is 1 MB.

Explanation:

In order to replace the library it must write 0 MB to hard drive then only it can be replaced. Therefore 1 MB is the correct answer.

5 0
4 years ago
PLS HELP MEE!!!
kramer

Answer:

starting with lowercase letters, using uppercase letters for the first letter in a new word

Explanation:

starting with a dollar sign, using lowercase for the remaining parts of each word

4 0
3 years ago
Other questions:
  • Both IT and organizational strategies are static and can be harmed when people resist change because IS success depends on the s
    5·1 answer
  • Which of the following will you select as X in the following series of clicks to lay the title over a chart: Chart Title box &gt
    14·1 answer
  • First, launch NetBeans and close any previous projects that may be open (at the top menu go to File ==&gt; Close All Projects).
    6·1 answer
  • When it comes to having certain sales skills as a hotel manager, being able to really hear, learn about, and show customers that
    10·1 answer
  • Consider we have n pointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we sw
    11·1 answer
  • _____ is confirming the significance of what another person is feeling.
    9·2 answers
  • when you sent email your email can be set to automatically keep a copy where do you find these copies​
    13·1 answer
  • A(n) ___ is a set of CPUs which work in parallel in an attempt to simulate the way the human brain works, although in greatly si
    5·1 answer
  • Computer science is a blank process
    6·2 answers
  • // This pseudocode segment is intended to compute the number
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!