1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lubasha [3.4K]
3 years ago
12

Which file formats have relatively small file size and are therefore the most widely used formats for sharing and

Computers and Technology
2 answers:
Sholpan [36]3 years ago
5 0
I do a lot of photography and I am a photographer and I recommend jpeg to gif(1) if its a small file size.
Neko [114]3 years ago
3 0
JPEG and GIF are the correct answers, although GIF is an animated photo the most common still framed photos are used in PNG and JPEG files
You might be interested in
Suppose I create a new kind of Java object, called "Kangaroo". Further suppose that at any given time, all instances of this new
OLEGan [10]

Answer:

Attributes.

Explanation:

When the java object is created called "Kangaroo" and it has some properties or facts associated  with it that includes the stomach capacity,current attitude towards the pea soup and the kangaroo's location.The another name of these facts is Attributes.

Attributes are the qualities,features or properties that an entity possesses.

4 0
3 years ago
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
Zepler [3.9K]

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

3 0
3 years ago
Read 2 more answers
Which of the following is as result of division of Labour​
neonofarm [45]

Answer:

Specialization

Explanation:

6 0
3 years ago
Where ....................... the books that you borrowed? *
zzz [600]

Where ARE the books that you borrowed?

3 0
3 years ago
Is there such a thing as an ethical reason for unauthorized access into a computer system?
Anastaziya [24]
Of course there is. On a simple level, consider a parent trying to locate their missing child. Someone might break into their social media accounts to see if there are messages that might help determine their whereabouts.

Consider a website hosting inappropriate pictures of children. Breaking into the server hosting the files and removing them is 100% ethical. 

I'm sure you can think of more examples. 
7 0
3 years ago
Other questions:
  • Which of the following cannot be performed from the windows task manager?
    15·2 answers
  • ​PeroxyChem's IT staff was able to free its IT staff to spend less time on routine maintenance and more time on strategic tasks
    11·1 answer
  • If you've been a victim of identity theft, what should you do after contacting the company that reported the suspicious charge a
    9·1 answer
  • Analyze the following code. Number[] numberArray = new Integer[2]; numberArray[0] = new Double(1.5); Question 9 options: A) Sinc
    13·1 answer
  • Which part(s) of CAIN is realized through the use of message digest functions and hashes?
    14·1 answer
  • 6. Python indexes lists beginning with the number 1.<br> True<br><br> False
    15·1 answer
  • On start up, which of these windows is not displayed ?
    15·2 answers
  • Hi I got a new phone and my photos are taking so long to download, on Friday it was at 13000 what do I do it’s taking so long
    14·1 answer
  • What are the three algorithm constructs?
    7·1 answer
  • What is referential integrity
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!