1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus [21]
2 years ago
13

Define and explain the two different methods by which a file can be compressed. Briefly describe one pro and one con for both ty

pes of compression.
Computers and Technology
1 answer:
Rina8888 [55]2 years ago
4 0

Answer:

The answer to this question can be defined as follows:

Explanation:

In this question, the Lossy compression requires a data merging software program. The benefit would be that compared to lossless compressions, it can create smaller files. One aspect was that every piece of information is usually lost. It is used to analyze their digital information on a computer model, seeking a place to buy it in another form. The pre is also no loss of data. Another thing would be that sound files wouldn't fit properly.

You might be interested in
Which of the following keywords allows a subclass to access a superclass method even when the subclass has overridden the superc
DedPeter [7]

Answer:

ture

Explanation:

ture

6 0
3 years ago
Markaplier nand jackceptieye are the best YT ever who agrees
Naddik [55]

Answer:

i dont

Explanation:

6 0
3 years ago
Read 2 more answers
Write a program to output a big A like the one below
Gelneren [198K]

hope this helps, i'm a beginner so this might not be the most concise method

3 0
3 years ago
Do you agree that digital signatures are the best way to protect the data in question?
lutik1710 [3]

Answer:

Explained

Explanation:

Yes, I agree that digital signatures are the best way to protect the data in the date in question. A digital signature is mathematical technique used to validate the authenticity and integrity of a massage. Digital signature is far more inherent security. It is built to solve problems of tempering and impersonation of digital documents. It allows the authorized user to have authentic right, and the unauthorized person is denied access.

3 0
3 years ago
Definition of laptop
zaharov [31]
A device that sucks bc mien broke
7 0
2 years ago
Read 2 more answers
Other questions:
  • You are in charge of designing a menu tree for navigating 1,250 books in a digital library. Present an argument of whether the m
    12·1 answer
  • The domain name service (dns is a distributed database that allows users to communicate with each other computers by:
    7·1 answer
  • In the writing and language test of the SAT, questions ask students to do which of the following? A. Write an essay B. Define a
    14·2 answers
  • A(n) ____ string contacts the data source and establishes a connection with the database using the Data Source Configuration Wiz
    5·1 answer
  • How many bytes are there in 256 Kbytes?
    6·1 answer
  • What type of network would be suitable for linking all computers in a building
    6·1 answer
  • Which is the following should be selected in the paragraph dialogue box to prevent page break from occurring within a paragraph
    12·1 answer
  • For a direct-mapped cache design with a 64-bit address, the following bits of the address are used to access the cache
    7·1 answer
  • [80 points] Fill in the missing word.
    14·1 answer
  • A user may enter some text and the number of times (up to a maximum of 10) to repeat it. Display the text repeated that many tim
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!