1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tester [92]
3 years ago
5

An online museum is creating a site hosting hundreds of thousands of digital representations of art from around the world. The w

ant to use a lossless compression, so that members of the museum can download and decompress the image and have an identical copy of the original file. Which of the following are true? Select two answers.
A. the museum can choose a heuristic approach which will achieve a lossless compression, but they cannot be sure that it is the most efficient compression for each image.
B. the museum can choose a heuristic approach which will achieve lossless compression for most digital representations
C. algorithms for lossless compression exist, so the museum can use those to compress the image
D. the museum should not compress digital representations of art, as there is always a danger that the compression is actual lossy
Computers and Technology
1 answer:
Firdavs [7]3 years ago
4 0

Answer:

A. the museum can choose a heuristic approach which will achieve a lossless compression, but they cannot be sure that it is the most efficient compression for each image

C. algorithms for lossless compression exist, so the museum can use those to compress the image

Explanation:

You might be interested in
I can create spreadsheets in Google Draw. False True
Over [174]
False, it's usually only in google sheets.
5 0
3 years ago
Read 2 more answers
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
Wanda manages an application that fluctuates in usage quite a bit. Sometimes it uses quite a few servers with lots of memory and
TEA [102]

Answer:

c. Elasticity

Explanation:

When referring to Cloud Servers this capability is known as Elasticity. It basically describes how able and efficient a server is to automatically implement resources and remove resources in order meet the specific amount of demand at any given moment. Many times a server will not have much demand but will still have all the resources being used by the server. Being able to remove these unused resources so that they are available for other usage is what makes the servers elastic.

8 0
3 years ago
Write common ICT tools​
Naddika [18.5K]
  • computers
  • laptops
  • printers
  • scanners
  • software programs
  • data projectors
  • and interactive teaching box.

4 0
2 years ago
Which of the following has likely attended vocational school?
JulsSmile [24]

C- A graphic designer is the awnser

7 0
3 years ago
Other questions:
  • What operator is used to create a validation rule? A. – B. / C. < or > D. +
    12·1 answer
  • To find temporary windows files begin by typing in the search box
    6·1 answer
  • What cable should i be using to connect my android tablet to the pc?
    13·2 answers
  • An automated search feature used by search engines to find results that match your search terms is called a spider or ?
    5·1 answer
  • You would like to conduct a survey and ask your web page visitors to indicate the computer operating systems that they use. Each
    10·1 answer
  • To open the dialog box for modifying styles, which step must you first complete in the Navigation pane?
    11·2 answers
  • This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection.
    11·1 answer
  • Create a variable in php to store your university information and parse using jQuery Ajax and print your name. The variable must
    12·1 answer
  • Write short notes about monitor printer and speaker​
    14·2 answers
  • You are an IT technician for your company. One of your employees has a computer that continually reboots when it is powered on.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!