For photographs, you should use ____ file compression.
A. lossy
B. squeezy
C. resizing
D. lossless
Answer: D
Computer Science & Information Technology
You might also like to view...
Explain why a multi-threaded server might not qualify as a state machine.
What will be an ideal response?
Computer Science & Information Technology
A(n) ____ diagram identifies the required object and lists its relevant attributes and behaviors.
A. class B. object description C. software design D. UML
Computer Science & Information Technology
?
In the figure above, item ____ points to an attribute value.
A. 1 B. 2 C. 3 D. 4
Computer Science & Information Technology
One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
A. hacktivist B. phreak C. hackcyber D. cyberhack
Computer Science & Information Technology