________ programs scan files for ways to reduce the amount of required storage.

A. File decompression
B. File compression
C. Data caching
D. Disk caching


Answer: B

Computer Science & Information Technology

You might also like to view...

When you close a solution, only the files contained in that solution are closed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is Strong element?

What will be an ideal response?

Computer Science & Information Technology

A smurf attack is an example of a social engineering attack on a network.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

ISP computers are continually connected to a larger network, called a regional network, which, in turn, is connected to one of the major high-speed networks within a country, called a(n) ____________________ network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology