1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tester [92]
4 years ago
5

Imagine that you are preparing a series of bitmap graphics for a Website. To decrease the download time for each graphic, you ca

n use a compressed format such as GIF, PNG, TIFF, or?
Computers and Technology
1 answer:
Yakvenalex [24]4 years ago
4 0
The answer t this question is .bmp
You might be interested in
Your program will demonstrate use of arrays, searching an array, using methods, passing parameters by reference, returning value
Contact [7]

woahhhhhhhhhhhhhhhhhh dude

4 0
4 years ago
What type of computer processing system is characterized by data that are assembled from more than one location and records that
ikadub [295]

Answer:

d) Online, real-time systems.

Explanation:

The options are:

a) Batch processing systems.

b) Personal computer systems.

c) Data compression systems.

d) Online, real-time systems.

And the correct option is D. Online, a real-time system. And this is because it is this which is characterized by the data which is assembled from more than one location as it is online, and various clients from various locations enter the data, and it's updated immediately, as it is a real-time system, which is updated in real-time. And hence D. is the correct option. The data compression system takes the data from one location at a time. The batch processing system is made up of different programs for input, output, and process. and hence is different from real-time, which requires continual all the three. And a PC is not made to a specific function, and it does different activities. Hence, its also not the right option here.

5 0
4 years ago
What is one task of a system optimization tool?
8_murik_8 [283]

Answer: Identifies what apps start on boot

Explanation: sys opt tools find things that are slowing down your device so anything within that lens will work cleaning sys storage could also work as an answer

6 0
4 years ago
Read 2 more answers
Which of the following is a sample IPv4 address?
const2013 [10]

Answer:

The first one, 99.14.242.51 is the only valid IPv4 address listed.

Explanation:

An IPv4 address is formatted as four eight-bit numbers separated by decimals. This means that a valid one will have four numbers from 0 to 255, with decimals in between.

The first one, 99.14.242.51 is a valid IPv4 address.

The second one has the number 342, which is greater than eight bits.

The third one has five octets.

The fourth one is in the wrong format altogether, using what appear to be 32-bit numbers

7 0
3 years ago
Write a function safeOpen() that takes one parameter, filename — a string giving the pathname of the file to be opened for readi
timurjin [86]
My bad my friend was like that I don’t got it to go home I don’t want him texting him or whatever I don’t gotta is like I gotta do it
3 0
4 years ago
Other questions:
  • Which sector provides scope for multimedia designers?
    10·1 answer
  • A usability study compares the number of page visits on a web site. Half of the participants saw Version A of the home page. The
    13·1 answer
  • An email address is made up of all of the following parts except
    13·2 answers
  • What width would you choose for the pdf?
    12·1 answer
  • An AM index between 0 and 1 indicates what? a. the AM signal is very small and will not be detected by the receiver b. distortio
    12·1 answer
  • Why is the GPS so important today?
    9·1 answer
  • Martha wants to create an image for her Web site. Martha should use _____.
    15·2 answers
  • Electronic age,what format/equipment people use to communicate with each other?​
    7·2 answers
  • When using the text command, what needs to be around the word or words you<br> want to appear?
    10·1 answer
  • In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!