Use ____ files for photographic images and complicated graphics that contain color gradients and shadowing.

A. GIF
B. TIFF
C. PNG
D. JPEG


Answer: D

Computer Science & Information Technology

You might also like to view...

A(n) ________ can eliminate the geographical limitations of a LAN

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of these characteristics might be included in a class called “BankAcct?”

A. Account Number B. Credit card C. Shoe Size D. ATM location

Computer Science & Information Technology

Give an example of a query you might want to convert to a parameter query

What will be an ideal response?

Computer Science & Information Technology

Eve has bet Bob that she can figure out the AES secret key he shares with Alice if he will simply encrypt 20 messages for Eve using that key. For some unknown reason, Bob agrees. Eve gives him 20 messages, which he then encrypts and emails back to Eve. What kind of attack is Eve using here?

What will be an ideal response?

Computer Science & Information Technology