1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentina_108 [34]
3 years ago
7

Differentiate among a color display, gray scale display, and a black-and-white display​

Computers and Technology
1 answer:
kotykmax [81]3 years ago
4 0

<u>Answer:</u>

<em>Black and white</em>:

It has only two values namely black or white. The white colour in the image will be represented as “white” and other colour part will be displayed as black.

<em>Grey-scale: </em>

Again the white part does not have a change, the black and other coloured items will be displayed in grey.

<em>Coloured image: </em>

It would display the actual colour of the image. The number of colours and shades depends on the original image from where actually it has been shooted and it also depends on the quality of the camera.

You might be interested in
Based on these statements:
Mekhanik [1.2K]

Answer

False

Because, we are only given the color of two flowers, the garden probably has a lot more flowers that aren't mentioned

Explanation:

4 0
3 years ago
Read 2 more answers
Write a letter to your friend explaining about the geographical confitions of Nepal's hilly region​
cricket20 [7]
I don’t know your friend so you should be able to answer
3 0
3 years ago
Read 2 more answers
An administrator is helping a user connect a smartphone to a tablet via Bluetooth. What should the administrator do first?
Inga [223]

Answer:

Make Sure Bluetooth Is Enabled On Both Devices

Explanation:

All of the other steps come afterward

7 0
3 years ago
What steps are involved in the ssl record protocol transmission?
HACTEHA [7]
Below are the steps involved:

1. Fragmentation:<span> Every upper layer message  is fragmented into 2^14 equivalent to </span>16384 bytes or less blocks.
2. Compression: This one is optionally applied and must be lossless. It may not increase content length by more than 1024 bytes.
3. Compute a MAC (Message Authentication Code): For this purpose, a shared secret key has to be used.
4. Encryption: Inclusive of the MAC, the compressed message is encrypted using symmetric encryption. It must not increase the length by 1024 bytes or more.
5. Preparing a heading in the following fields: Major Version (8 bits); Compression Length (16 bits); Minor Version (8 bits); and Content Type (8 bits).








4 0
3 years ago
What is a collection of information in a<br> row representing one object called?
Pie
Record in terms of ict
8 0
2 years ago
Other questions:
  • What's the risk or effect of software piracy?
    12·2 answers
  • What tab must you click on to view any previously read messages from instructors in the message center?
    14·2 answers
  • What is the subnet mask ?
    9·2 answers
  • Today's Apple Mac computers run with the same I-Ternal hardware as the Windows based PC true or false
    5·1 answer
  • If a printer is not Wi-Fi capable, how can it be set up to provide the most reliable wireless printing
    7·2 answers
  • This is a while loop question for Information technology.
    11·1 answer
  • Shane is working on a new project for the sales department. The company wants a way to allow the sales force to print orders at
    5·1 answer
  • Write method reverseString, which takes a string str and returns a new string with the characters in str in reverse order. For e
    8·1 answer
  • How to enter date in a Date/Time field?​
    8·1 answer
  • Rocks created from compaction and cementation of sediments are called:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!