1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
3 years ago
13

Which file extension takes less storage space?

Computers and Technology
2 answers:
Marizza181 [45]3 years ago
7 0

Answer:

PNG file extension

He should use the PNG file extension

Explanation:

PNG file extension is similar to other forms of file extensions like JPEG,GIF TIF and JPG file extension, the PNG file extension uses a LZW file compression to compress images and the compression of graphics or pictures is lossless meaning that using a PNG file extension helps to retain the picture quality of the image. it is better of as well because its ability to handle complex images

using LZW compression makes it possible for images in PNG to be smaller, maintain its original quality and as well consume less storage space. although LZW compression are used in other file extensions like TIF AND GIF the effect in size of pictures is more in  PNG

anyanavicka [17]3 years ago
4 0

I believe the answer would be the JPEG file extension.

You might be interested in
What is contrast (in Photography)?
kozerog [31]

Answer:

Contrast is a tool that photographers use to direct viewers' attention to their subject. There are two types: Tonal Contrast and Color Contrast. TC refers to the difference in tones from the lightest tone to the darkest tone, in other words, the difference in tones from white to gray to black.

Explanation:

heheh there you go

3 0
3 years ago
Fordham3 Hardware is known for its consensus buying center culture. Recognizing this corporate culture, someone attempting to se
balandron [24]

Answer: (c) focus exclusively on the head of the buying center.

Explanation:

As Fordham3 Hardware is known for its consensus buying center culture, so someone attempting to sell to Fordham3 should focus exclusively on the head of the buying center.

8 0
3 years ago
7.12 LAB: Even/odd values in a list
Korvikt [17]

The odd values in a list can be calculated by knowing the first and last number, whereas even numbers can be divided by two and the remainder is zero (0).

<h3>What are even numbers and odd numbers?</h3>

The even numbers can be found in a list because they are divisible by two and the remainder of this equation is always zero (0).

Conversely, odd numbers are those that cannot be divided exactly into exact entire numbers (e.g., 3, 5, etc).

The odd numbers in a list can be calculated by the equation ON (odd numbers): n/2 × [f + g], where 'f' is the first number and 'g' is the last number.

In conclusion, the odd values in a list can be calculated by knowing the first and last number, whereas even numbers can be divided by two and the remainder is 0.

Learn more about odd numbers here:

brainly.com/question/2263958

#SPJ1

4 0
2 years ago
A consumer purchases an exploit from the dark web. The exploit targets the online shopping cart on a popular website, allowing t
Bond [772]

Answer:

Script Kiddie

Explanation:

According to my research on Black Hat Hackers, I can say that based on the information provided within the question the term that best describes this type of user is called a Script Kiddie. This is known as a person who uses already created computer scripts to hack into computers since they do not have the skills to write the scripts themselves.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
3 years ago
PLEASE PLEASE PLEASE PLEASE PLEASE help brainliest goes to correct answer and 50 points You do not have to get all four but plea
DENIUS [597]

Explanation:

1. A.make a list of all the websites the sources from

2. C. profile

7 0
2 years ago
Read 2 more answers
Other questions:
  • What does xhtml stand for?
    5·2 answers
  • HELP! Identify the parts of the table. <br>A) Primary Key<br>B) Field<br>C) Record<br>D) Table<br>​
    15·2 answers
  • In ssl/tls, a specific set of protocols that a particular cryptographic system will use to provide protection is called a ______
    5·1 answer
  • When you set the position property for a block element to fixed, the element
    5·1 answer
  • While you are working on your computer, it shuts down unexpectedly, and you detect a burning smell. When you remove the case cov
    9·1 answer
  • Write a Java program that generates GUI (Graphical User Interface). Your program should provide labels and textfields to a user
    9·1 answer
  • A 9-year old male castrated Westie presents on emergency after being rescued from a house fire. On presentation, the dog has a r
    9·1 answer
  • A disk takes 1 ms per track seek time, and the head is currently on track 70. Assume it takes 5 ms to service a request once the
    10·1 answer
  • Select the correct answer from the drop-down menu.
    15·2 answers
  • The notes added to slides can be seen during the presentation. TRUE OR FALSE​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!