1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balu736 [363]
3 years ago
11

The following images show an image before and after being compressed. Which of the following statements correctly identifies the

compressed image and the type of compression used (lossy or lossless)?
A. The image on the left is compressed and the compression is lossless.

B. The image on the right is compressed and the compression is lossy.

C. The image on the right is compressed and the compression is lossless.

D. The image on the left is compressed and the compression is lossy.

Computers and Technology
1 answer:
Whitepunk [10]3 years ago
7 0

Answer:

B. The image on the right is compressed and the compression is lossy.

Explanation:

The image on the right is a little distorted as compared to the left one. And you will find some black spots all around. However, A, B, and C are mentioned, and hence you will find that the right image is compressed, and since A, B and C are represented in full but a little lossy, we can assume that it is lossy compression. You should know that lossless compression is a type of compression in which there is no loss of the data, and in the case of lossy, there is the loss of the original data.

You might be interested in
​which type of cryptography provides the most security?
Doss [256]

Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.

About the other answers:

A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.

C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.

D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).



4 0
3 years ago
paula needs to ensure that an animation she has created is repeated. which option should she use to achieve this ?
Masteriza [31]

Answer:

transitions tab

Explanation:

please mark brainliest

4 0
3 years ago
The Gas-N-Clean Service Station sells gasoline and has a car wash. Fees for the car wash are $1.25 with a gasoline purchase of $
Vesnalui [34]

Answer:

Amount Gasoline purchases                       9.7 Gallons

Price pre gallons                             $          2.89

Total gasoline cost                          $          28.03

Car wash cost                                  $          1.25

Total due                                         $          29.28

Explanation:

hope this helps

5 0
3 years ago
PLZ ANSWER ASAP WILL GIVE BRAINLYEST
malfutka [58]

Answer: Navigation

Explanation:

the Navigation pane

3 0
2 years ago
A secret information for using email is ____________
babymother [125]

wekipedia \:

6 0
3 years ago
Read 2 more answers
Other questions:
  • On Brainly, how can I change my username? from halfsidepancake​
    6·2 answers
  • Which step comes between identifying i need and generating ideas in a technological design process
    10·1 answer
  • If an occupation is projected to decline by 7% over the next 10 years, how would you rate the job outlook?
    12·1 answer
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • How do computers benefit individuals' health care?
    10·1 answer
  • PLEASE HELP ASAP!!
    6·2 answers
  • Fill in the blanks using A to J below.
    9·1 answer
  • How can you continue learning about computer science and improve your coding abilities?
    5·1 answer
  • What is the difference between MAC address and IP address?<br> Thanks in advance
    6·1 answer
  • 25 points select 3 options!!!!!!!!!!!!!!!!!!!!!!!!!
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!