____ typically creates larger file sizes than GIF, but the quality of the transparency is much higher.

a. TIFF
b. PNG
c. JPG
d. BMP


b. PNG

Computer Science & Information Technology

You might also like to view...

MC The code in a finally suite executes if an exception__________ .

a) occurs in the try suite. b) does not occur in the try suite. c) Both a and b. d) None of the above.

Computer Science & Information Technology

Which of the following is NOT a criteria typically used by stateless packet filters to determine whether or not to block packets.

A. IP address B. ports C. data patterns D. TCP flags

Computer Science & Information Technology

Write statements that assign random integers to the variable n in the following ranges:

a) 1 £ n £ 2 b) 1 £ n £ 100 c) 0 £ n £ 9 d) 1000 £ n £ 1112 e) –1 £ n £ 1 f) –3 £ n £ 11

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service. 2. DoS attacks cause damage or destruction of IT infrastructures. 3. A DoS attack targeting application resources typically aims to overload or crash its network handling software. 4. The SYN spoofing attack targets the table of TCP connections on the server. 5. A cyberslam is an application attack that consumes significant resources, limiting the server’s ability to respond to valid requests from other users.

Computer Science & Information Technology