An online museum is creating a site hosting hundreds of thousands of digital representations of art from around the world. The w
ant to use a lossless compression, so that members of the museum can download and decompress the image and have an identical copy of the original file. Which of the following are true? Select two answers. A. the museum can choose a heuristic approach which will achieve a lossless compression, but they cannot be sure that it is the most efficient compression for each image.
B. the museum can choose a heuristic approach which will achieve lossless compression for most digital representations
C. algorithms for lossless compression exist, so the museum can use those to compress the image
D. the museum should not compress digital representations of art, as there is always a danger that the compression is actual lossy
A. the museum can choose a heuristic approach which will achieve a lossless compression, but they cannot be sure that it is the most efficient compression for each image
C. algorithms for lossless compression exist, so the museum can use those to compress the image
A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.
When referring to Cloud Servers this capability is known as Elasticity. It basically describes how able and efficient a server is to automatically implement resources and remove resources in order meet the specific amount of demand at any given moment. Many times a server will not have much demand but will still have all the resources being used by the server. Being able to remove these unused resources so that they are available for other usage is what makes the servers elastic.