Ethan is working with desktop video. Ethan knows that all of the following are ways to reduce the file size of the original video EXCEPT ____.

A. reducing the ray tracing
B. decreasing the resolution
C. decreasing the frame rate
D. reducing the frame size


Answer: A

Computer Science & Information Technology

You might also like to view...

List the total number of employees in each department for those departments with more than 10 employees. Create an appropriate heading for the columns of the results table.

What will be an ideal response?

Computer Science & Information Technology

Match each item with a statement below.

A. a route entry learned from within the same area as the computing device B. groups of contiguous networks C. an interdomain routing protocol that replaces Exterior Gateway Protocol (EGP) D. a special connection negotiation protocol that PPP uses to establish point-to-point links between peers for ongoing communications E. a protocol used by many Internet service providers to authenticate and manage broadband subscribers F. a temporary table in memory that consists of recent ARP entries G. the address of the NIC that is typically used as the data link address H. that process that a host undergoes to determine whether a desired destination is local or remote and, if remote, which next-hop router to use I. a routing table entry with a 32-bit subnet mask designed to reach a specific network host

Computer Science & Information Technology

Collecting exculpatory evidence is exclusively the responsibility of the defense counsel

a. True b. False

Computer Science & Information Technology

A security administrator determined that users within the company are installing unapproved software. Company policy dictates that only certain applications may be installed or ran on the user's computers without exception.Which of the following should the administrator do to prevent all unapproved software from running on the user's computer?

A. Deploy antivirus software and configure it to detect and remove pirated software B. Configure the firewall to prevent the downloading of executable files C. Create an application whitelist and use OS controls to enforce it D. Prevent users from running as administrator so they cannot install software.

Computer Science & Information Technology