1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tester [92]
3 years ago
5

An online museum is creating a site hosting hundreds of thousands of digital representations of art from around the world. The w

ant to use a lossless compression, so that members of the museum can download and decompress the image and have an identical copy of the original file. Which of the following are true? Select two answers.
A. the museum can choose a heuristic approach which will achieve a lossless compression, but they cannot be sure that it is the most efficient compression for each image.
B. the museum can choose a heuristic approach which will achieve lossless compression for most digital representations
C. algorithms for lossless compression exist, so the museum can use those to compress the image
D. the museum should not compress digital representations of art, as there is always a danger that the compression is actual lossy
Computers and Technology
1 answer:
Firdavs [7]3 years ago
4 0

Answer:

A. the museum can choose a heuristic approach which will achieve a lossless compression, but they cannot be sure that it is the most efficient compression for each image

C. algorithms for lossless compression exist, so the museum can use those to compress the image

Explanation:

You might be interested in
How do I convince my mom to buy a gaming computer for me? She says we already have 3 other computers/laptops in the house to use
Natalka [10]

Answer: ??

Explanation: explain to her that you don't have your own. keep asking and convince her you're doing good in school, (if u are) and that you listen and you should be responsible to have your own

4 0
3 years ago
Memory is a _____________ that includes the organization and shaping of information by processing, storage, and retrieval of inf
vaieri [72.5K]

Answer:

A. <em>Encoding Process </em>

Explanation:

Memory is an <em>encoding process </em>that includes the organization and shaping of information by processing, storage, and retrieval of information.

There are two types of memory in computing, <em>RAM </em>and <em>ROM</em>. <em>RAM </em>stands for <em>Random Access Memory</em>. It I the core memory of the computer and it is especially faster regarding reading and writing process. As an analogy, RAM memory is like the “<em>Short-term</em>” memory of the computer. <em>ROM </em>stands for <em>Read-Only Memory</em>, this is the type of memory in charge of permanently storing data in the computer. It contains the necessary information to run the computer. As an analogy, <em>ROM </em>memory is like the “<em>long-term</em>” memory of the computer.

3 0
3 years ago
Please answer fast as soon as possible.
zhenek [66]

Answer:

1. Scripts area is the main working area in Scratch.

2. Sensing blocks are color-coded light blue.

3. Adware is a malware which pops up a window, informing the user that the system is infected and asks for a fee to clean it.

4. Amaya is a WYSIWYG.

8 0
2 years ago
Java Eclipse homework. I need help coding this
olganol [36]

Answer:

I can't just do your project but use this as a head start.

Explanation:

public class TableOfBases

{

   public static void main(String[] args)

   {

       // print out "Decimal    Binary   Octal   Hex    Character";

       //  write a for loop from 65 to 90

       for (int i ...  ) {

         // get a string for integer i with base 2

           String binary = Integer.toString (i,2);

         // get a string for integer i with base 8

           String octal = Integer.toString( ...   );

         // get a string for integer i with base 16

           String hex =  ...

        // get a char for a chararater that has ASCII code i

           char ch = (char) i ;

         // print out binary, octal and hex, and ch

       }

   }

}

/*

Project... Basically Speaking

Create a project called TableOfBases with class Tester.

The main method should have a for loop that cycles through the integer values

65 <= j <= 90 (These are the ASCII codes for characters A – Z).

Use the methods learned in this lesson to produce a line of this table on each pass

through the loop. Display the equivalent of the decimal number in the various bases

just learned (binary, octal, and hex) as well as the character itself:

Decimal Binary Octal Hex Character

65 1000001 101 41 A

66 1000010 102 42 B

67 1000011 103 43 C

68 1000100 104 44 D

69 1000101 105 45 E

70 1000110 106 46 F

....

71 1000111 107 47 G 72 1001000 110 48 H 73 1001001 111 49 I 74 1001010 112 4a J 75 1001011 113 4b K 76 1001100 114 4c L 77 1001101 115 4d M 78 1001110 116 4e N 79 1001111 117 4f O 80 1010000 120 50 P 81 1010001 121 51 Q 82 1010010 122 52 R 83 1010011 123 53 S 84 1010100 124 54 T 85 1010101 125 55 U 86 1010110 126 56 V 87 1010111 127 57 W 88 1011000 130 58 X 89 1011001 131 59 Y 90 1011010 132 5a Z

*/

7 0
3 years ago
In a penetration test, the ________ team comprises testers who are given no knowledge of the infrastructure and are attacking a
just olya [345]

Answer:

TIGER TEAM

Explanation:

Penetration testing is the act of simulating an attack on an organization's resources to assess an infrastructure's true vulnerabilities. A penetration test simulates an actual attack. Penetration testers use a variety of methods including social engineering, software hacking and physical intrusion.

There are different types of penetration testing teams which are: red team, blue team and purple team.

Red team also known as the tiger team simulates real types of cyber attacks in order to discover any unknown security vulnerabilities or weaknesses.

In penetration testing, tiger (red) team are the attackers and are usually outside contractors, with a lot of knowledge of how to break in but NO KNOWLEDGE OF WHAT SECURITY IS IN PLACE.

Therefore, In a penetration test, the TIGER TEAM comprises testers who are given no knowledge of the infrastructure and are attacking a target that is unaware of their existence until the attack is made.

3 0
3 years ago
Other questions:
  • Find the Mechanical Advantage and the maximum separation load for a wedge (length = 6 inches and height = 3 inches) used to spli
    12·1 answer
  • You have a large dataset that will print on several pages. You want to ensure that related records print on the same page with c
    11·1 answer
  • In which career does the level of education vary the most?
    13·2 answers
  • When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
    12·1 answer
  • You are the IT administrator for a small corporate network. You have installed the Windows Server 2016 operating system on a ser
    12·1 answer
  • Linux is: Select one: a. primarily concerned with the tasks of end users. b. designed for specific machines and specific micropr
    10·1 answer
  • Reasons for the growth of decision-making systems include:
    13·1 answer
  • Which word processing tool can help you find synonyms to improve your word choice?
    7·2 answers
  • By limiting the number of times a person can use a type of software before registering as the authorized owner of that software,
    15·1 answer
  • Only about 10 percent of the world’s population uses the internet.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!