Use ____ files for photographic images and complicated graphics that contain color gradients and shadowing.
A. GIF
B. TIFF
C. PNG
D. JPEG
Answer: D
Computer Science & Information Technology
You might also like to view...
A(n) ________ can eliminate the geographical limitations of a LAN
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of these characteristics might be included in a class called “BankAcct?”
A. Account Number B. Credit card C. Shoe Size D. ATM location
Computer Science & Information Technology
Give an example of a query you might want to convert to a parameter query
What will be an ideal response?
Computer Science & Information Technology
Eve has bet Bob that she can figure out the AES secret key he shares with Alice if he will simply encrypt 20 messages for Eve using that key. For some unknown reason, Bob agrees. Eve gives him 20 messages, which he then encrypts and emails back to Eve. What kind of attack is Eve using here?
What will be an ideal response?
Computer Science & Information Technology