1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reika [66]
4 years ago
8

A compression scheme for long strings of bits called run-length encoding is described as follows: Rather than record each 0 and

1 individually, instead record "runs" of bits by storing the number of consecutive 1s and 0s that appear. Since it's binary, any run of 0s must be followed by a run of 1s (even if the run is only 1-bit long) and vice versa. Thus, you can store a list of small numbers that represents the alternating runs of 0s and 1s. Here is an example: To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what type of compression?
(a) Lossy compression
(b) Lossless compression
(c)Fast Fourier Transform compression
(d)Tailored compression
Computers and Technology
1 answer:
Musya8 [376]4 years ago
3 0

Answer: (B) Lossless compression

Explanation:

 According to the question, the given technique is the example of the lossless compression. The lossless compression is one of the technique that decompress the data into the original data form without any type of losses.

The lossless compression is the technique that usually compress the data, text and the databases. This technique also improve the compression rate helps in reconstruct the original data. It is used in various types of encoding methods, GNU tool and zip file.

You might be interested in
C++ question:
gogolik [260]
There's no "using namespace std;" statement. I see no reason for COLOR to be two dimensional or have a length of 5 with only four elements. The inside of the for loop with variable 'J' makes no sense.
3 0
3 years ago
Read 2 more answers
What is Least effective at preventing a computer virus
Nina [5.8K]
Anti-virus software that just scans your computer is the least effective.
 
5 0
3 years ago
To annotate a document with a remark for another reviewer to address, select the _____ feature.
Gala2k [10]
<span>To annotate a document with a remark for another reviewer to address, select the Comments feature. 

In both Excel and Word, you can go to the toolbar and select review and you will see "New Comment." Select the word (in Microsoft Word) or the cell (in Microsoft Excel) add click on the "New Comment". </span>
3 0
3 years ago
What do the blocks in the looks category do?
mart [117]

Answer:

if u have a question can I see it

Explanation:

so I can know the answer choose

6 0
3 years ago
Choose the parts of the browser window.
8_murik_8 [283]

Answer:

The answer is "Title bar".

Explanation:

The title bar is located on top of the screen, its color blue, which is used in browsers. It has the function, that shows the title of the web page, that you currently viewing, and other choices were wrong, which can be described as follows:

  • Enter bar is the wrong option because it is not a part of the browser.
  • The back button is also known as a backspace key which is used to delete so thing, which is written by keyboard, that's why it is wrong.
  • The forward bar is used in pipe in a module that's why it's incorrect.

4 0
3 years ago
Other questions:
  • . Why should we favor programming to interfaces over implementations?
    6·1 answer
  • What is VoIP?
    5·1 answer
  • Which color reflects more light red blue black or white
    6·1 answer
  • The activities that gather information about the organization and its network activities and assets is called fingerprinting. __
    14·1 answer
  • Which function works best when you need to remove an element at a pacific index and a list
    15·1 answer
  • Most hard drives are divided into sectors of 512 bytes each. Our disk has a size of 16 GB. Fill in the blank to calculate how ma
    9·1 answer
  • A customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft P
    9·1 answer
  • Different between client server architecture and peer to peer architecture​
    11·1 answer
  • What is the purpose of the GETPIVOTDATA function?
    13·2 answers
  • X333: countElements Given an array of integers and an integer target, return a count of the number of times the target value occ
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!