1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inna [77]
2 years ago
6

Which file format would be appropriate for web graphics​

Computers and Technology
1 answer:
Eddi Din [679]2 years ago
4 0

Answer:

PNG

Explanation:

PNG files can shrink to incredibly small sizes - especially images that are simple colours, shapes, or text. This makes it the ideal image file type for Web graphics.

You might be interested in
Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a
vova2212 [387]

Answer:

A dictonary attack.

Explanation:

Dictionaries hold many words that can be downloaded and used. Word or name passwords are usually just one word or maybe two. In other words, predefined words being used as a password? Not safe. When someone attempts to crack it, they use brute force attacks. Among these are dictionary attacks, which focus on the actual words rather than numbers.

3 0
2 years ago
Look at the following structure declaration.
myrzilka [38]

Answer:

B. a tag

Explanation:

In the structure definition given below:

struct Employee

{

string name;

int idNum;  

};

Employee corresponds to the tag of the structure. The tag is used to create additional instances of the structure. For example:

struct Employee e1;

struct Employee e2;

name and idNum are members of the Employee structure and are referenced using the dot notation. e.g.,

struct Employee e1;

e1.idNum=1;

7 0
3 years ago
For a new version of processor, suppose the capacitive load remains, how much more energy will the processor consume if we incre
erastovalidia [21]

Answer:

The answer is below

Explanation:

The amount of power dissipated by a processor is given by the formula:

P = fCV²

Where f = clock rate, C = capacitance and V = Voltage

For the old version of processor with a clock rate of f, capacitance C and voltage of V, the power dissipated is:

P(old) = fCV²

For the new version of processor with a clock rate of 20% increase = (100% + 20%)f = 1.2f, capacitance is the same = C and voltage of 20% increase = 1.2V, the power dissipated is:

P(new) = 1.2f × C × (1.2V)² = 1.2f × C × 1.44V² =1.728fCV² = 1.728 × Power dissipated by old processor

Hence, the new processor is 1.728 times (72.8% more) the power of the old processor

4 0
3 years ago
David Rosen is credited with the development of which of these games?
nikklg [1K]
David Rosen is the CEO and lead programmer of Wolfire games. some of their games include Overgrowth, Desperate Gods, and Receiver.
4 0
4 years ago
Select the characteristics of a Base Transceiver Station:
Andru [333]

Answer:

The correct answer to the following question is options A, B, and D.

Explanation:

Base Transceiver Station (BTS) is an apparatus that works wireless communication between the network and user equipment (UE - Mobile phones (handset), wireless network computers). Wireless technologies like wi-fi, GSM, CDMA, etc.

Some elements of BTS :

  • Radio base station
  • Tower/Mast
  • Duplexer
  • Transceiver unit (TRU)
  • Microwave

So the above are the elements of the BSA, then it also having the characteristics related to these elements like it definitely connects to a cell network, sends phone or mobile phone and microwave signals to cellular providers but it isn't able to send the signals to the recepients.

8 0
3 years ago
Other questions:
  • Which is an example of intrinsic motivation?
    13·2 answers
  • Describe Mr. Digby, the principal. ​
    10·1 answer
  • How can I sent a message?
    13·1 answer
  • What is the most recognized and widely used database of published nursing practice literature?
    15·1 answer
  • Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs
    13·1 answer
  • How do you remove management from your chrome book [administrator]
    12·1 answer
  • Question 1
    8·1 answer
  • Give three general reasons for the importance of computer networking.
    9·1 answer
  • ________ technologies are technologies that enable the incremental improvement of products and services.
    10·2 answers
  • which endpoint application runs on an endpoint device that only detects an attack in an endpoint device? chqgg
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!