1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
15

Which image file format is the best format to use for photographs on the Web

Computers and Technology
1 answer:
melamori03 [73]3 years ago
7 0
I think its pdf i could be wrong tho
You might be interested in
For which of the following is a bulleted list more appropriate than a numbered list?
Vedmedyk [2.9K]
THE ANSWER IS A!!!!!!!!!!!!!!!!!!!
5 0
3 years ago
What is a risk or an effect of software piracy?
Butoxors [25]
Piracy is a term used to describe the practice of obtaining or using software in a manner that is illegal or not in keeping with the terms under which the software was distributed. This can range from purchasing or copying the software, to using the software without a license, to selling, renting, or otherwise distributing it without authorization.<span>The Business Software Alliance estimated the losses to software companies in 2005 as a result of piracy at over $30 billion.</span>
5 0
3 years ago
Read 2 more answers
A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that
Reptile [31]

Answer:

  1. with(open("numbers.txt")) as file:
  2.    data = file.readlines()  
  3.    runsum = 0
  4.    largest = 0
  5.    
  6.    for x in data:
  7.        if(int(x) > largest):
  8.            largest = int(x)
  9.            runsum += largest  
  10.    
  11.    print(runsum)

Explanation:

The solution code is written in Python 3.

Firstly, open a filestream for numbers.txt (Line 1) and then use readlines method to get every row of data from the text files (Line 2).

Create a variable runsum to hold the running sum of number bigger than the maximum value read up to that iteration in a for loop (Line 3).

Use a for loop to traverse through the read data and then check if the current row of integer is bigger than the maximum value up to that point, set the current integer to largest variable and then add the largest to runsum (Line 6 - 9).

At last display the runsum to console terminal (Line 11).

8 0
3 years ago
Which IPsec security function provides assurance that the data received via a VPN has not been modified in transit?
Anit [1.1K]

<u>Integrity IPsec security</u> function provides assurance that the data received via a VPN has not been modified in transit.

<u>Explanation:</u>

IPsec utilizes cryptographic security administrations to ensure interchanges over Internet Protocol (IP) systems. It underpins organize level friend validation, information beginning confirmation, information honesty, information classification (encryption), and replay assurance. ESP gives confirmation, respectability, and secrecy, which ensure against information altering and, in particular, give message content security.

Moreover, parcels that are not confirmed are disposed of and not conveyed to the planned recipient. ESP likewise gives all encryption benefits in IPSec. IPsec Authentication Header (AH), IPsec Encapsulating Security Payload (ESP), and the IPsec Internet Key Exchange (IKE). for both IPv4 and IPv6 systems, and activity in the two adaptations is comparative.

3 0
3 years ago
1. Where is the HTML tag display, and why do you think it is important to include on your web page.
katen-ka-za [31]
        A title tag is an HTML element that specifies the title of a web page. They are displayed on a search engines result page. They are important for usability, SEO, and social sharing.

 

Got some of this info from a website.(Link down below)
https://moz.com/learn/seo/title-tag

                               Hope this helps.

 

5 0
3 years ago
Other questions:
  • The standard qwerty keyboard has 47 keys that can place characters on the screen. each of these keys can also display a second c
    13·2 answers
  • A company needs to store its documents in one place, share news and information with all staff, and allow access for employees w
    7·2 answers
  • What happens to an LR if they troll/spam?
    13·1 answer
  • A media scholar is trying to find out whether internet or television political ads are more persuasive. what kind of effects is
    7·1 answer
  • The icon below represents the ____________.
    8·1 answer
  • Why is it important to study in a quiet well lit area
    5·2 answers
  • According to the Center for 21st Century Skills, critical thinking ability includes all of the following skills, EXCEPT ______.
    5·1 answer
  • Assume the system with 256B memory and 64B cache and the block size of 16 bytes. I.e., there are 4 blocks in the cache.
    12·1 answer
  • This is for being Weird!
    15·2 answers
  • What is white light?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!