1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
9

What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?

Computers and Technology
2 answers:
maw [93]3 years ago
7 0

Answer:

4A5M3H2V

Explanation:

Compression techniques deal with removing <em>redundancy</em> in data to save memory space in computers.

In this case, there are <em>runs</em> of four A's, five M's, three H's and two V's, which is clear that each letter is repeated by some value. That is, there is redundancy in data: some values appear more than once.

Well, to save memory space in a computer, instead of having 4 + 5 + 3 +2 = 14 characters, we can reorder that by having only eight characters (4A5M3H2V), <em>saving the same information</em> using less memory space in a computer.

The former technique has a name. It is called <em>Run-length encoding</em>, and it is one of the most rudimentary compression techniques (Shotts, 2019) and also a <em>lossless</em> <em>compression technique</em>, that is, no data information is lost after the compression process.

stiks02 [169]3 years ago
3 0

I think AAAAMMMMMHHVVV

i think suppose to be 3 v's

You might be interested in
An IT specialist is consulted about setting up a peer-to-peer network. What would the specialist say about security risk in this
ohaa [14]

I just did this, its A

6 0
3 years ago
Read 2 more answers
ImmuneEarth, a research and development company, has "eradicate all diseases" as its motto. It has numerous departments that res
anastassius [24]

Answer:

Grid computing.

Explanation:

Grid computing is a study utilizing Immune Earth to test AIDS treatment because the following are the reasons that describe the answer is true about the scenario.

  • Grid computing seems to be a scattered network with a vast amount for systems linked to handle a difficult issue.
  • Systems can be linked straightly or through organized systems.

Other options are incorrect.

  • Green computing is not the correct answer according to the scenario because the usage of systems and its energy is socially safe and economically sustainable.
  • Trusted Computing is not the correct answer according to the scenario because it helps a part of information to show which os as well as program to be required to access this.
  • Edge computing is not the correct answer according to the scenario because it optimizes web apps as well as software programs while getting computation back to the information base.
4 0
3 years ago
What is the name and purpose of the star next to a slide in a PowerPoint presentation?
Finger [1]
If you observe closely, you may see that these stars are shown only against some slides and not all of them.

The stars are just an indication that the particular slide has custom animation. That was you can quickly see at a glance if a slide has content that is animated.

The same star symbol is also shown when the slide itself has any slide transition set.
7 0
3 years ago
SOMEBODY HELP ME ASAP PLEASE AND THANK YOU
Paha777 [63]

Answer:

Isnt there another thing that is supposed to be there like some website

Explanation:

7 0
2 years ago
Read 2 more answers
Jose has 3/5 kilogram of peppermints and 2/3 kilogram of candy canes. How many kilograms of candy does he have?
yarga [219]

Answer:

\frac{19}{15}\\

≅ 1.267

Explanation:

\frac{3}{5} +\frac{2}{3} \\\\= \frac{9}{15} + \frac{10}{15} \\\\= \frac{9+10}{15} \\\\= \frac{19}{15} \\\\= 1.267

6 0
2 years ago
Other questions:
  • What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
    6·1 answer
  • A(n) _____ bus enables the central processing unit (CPU) to communicate with a system’s primary storage.
    5·1 answer
  • A bicycle combination lock has four rings with numbers 0 through 9. Given the actual numbers and the combination to unlock, prin
    13·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    6·1 answer
  • A red wavy line under a word means _____. a change has been made in the text a new word was inserted in the document there is a
    11·2 answers
  • How to do this PLEASE HELP 80 points!
    15·1 answer
  • Need help ASAP Examples of utilities that make it possible for people to create and share multimedia files include _____. audio
    9·2 answers
  • A business needs to open at the right ___________ and the right ______________. Choose all correct answers.
    9·1 answer
  • State the functions of the parts of the computer​
    11·2 answers
  • Each JavaScript command line ends with a(n) ____ to separate it from the next command line in the program.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!