Revising and editing because it makes the report look sharp and business like.
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
Answer:
D. The image will require fewer bits in order to be represented.
Explanation:
Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.
I think its ' D ' ,You can use both A and B