1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
3 years ago
15

How is an image represented

Computers and Technology
2 answers:
jeka943 years ago
8 0
To store images in a computer we have to sample and quantize (digitize) the image function. ... And quantization refers to the representation of the gray level value at the sampling point using finite number of bits. Each image sample is called a pixel.
Sonja [21]3 years ago
4 0
With a sertain address.
You might be interested in
Instructions:Select the correct answer.
Alex
Presentation skills. 

Presentation skills benefit the owner tremendously as it is easy for his/her ideas to be understood. 
3 0
3 years ago
Read 2 more answers
What can detect 8 colors?
Semmy [17]
The color sensor if i’m correct
8 0
3 years ago
Read 2 more answers
You are driving in the right lane of a municipal road the road has three lanes in your direction ahead of you in the lane to you
Mrrafil [7]
Pull Over. Do NOT Try to push the brake or try swerving with the steering wheel. Slowly pull to the side
7 0
3 years ago
Read 2 more answers
Describe at least three virus scanning techniques
Natasha_Volkova [10]

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

4 0
3 years ago
What can be done to reduce the occurrence of policy
natali 33 [55]
What can be done to reduce the occurence of policy?


5 0
3 years ago
Other questions:
  • What is the average reading rate for middle school students?
    12·1 answer
  • On the 80x86 CPU, the ESP register keeps track of the value on the top of the runtime stack.
    11·1 answer
  • The local city youth league needs a database system to help track children that sign up to play soccer. Data needs to be kept on
    10·2 answers
  • 2. What is software conflict?<br>​
    11·1 answer
  • What intangible benefits might an organization obtain from the development of an
    5·2 answers
  • 5. Compare the telephone network and the internet. What are the similarities? What are the differences?
    12·1 answer
  • Use the drop-down menus to match each description to its corresponding term.
    7·1 answer
  • Create five circles like the Olympic Rings. fill them with the colors given below
    8·1 answer
  • Which Internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram
    6·1 answer
  • Execute and explain this program using // in Layman's language. Thank you!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!