What is compression?

a. a VPN used to grant outside entities access into a perimeter network; used to hose resources designated as accessible to a limited group of external entities, such as business partners or suppliers, but not the general public
b. a subset of asymmetric cryptography based on the use of key pair sets
c. the art and science of hiding information from unauthorized third parties
d. the removal of redundant or superfluous data or space to reduce the size of a data set


Ans: d. the removal of redundant or superfluous data or space to reduce the size of a data set

Computer Science & Information Technology

You might also like to view...

The binary numbering system uses ________

A) 0s and 1s B) digits 0 to 9 C) 1s and 2s D) 64 bits

Computer Science & Information Technology

____ refers to the way page content, such as paragraph, text, or list items, can be coded to emphasize their meaning to users.

A. Smart web B. Semantic web C. Smart search D. Contextual web

Computer Science & Information Technology

Which of the following statements is NOT true of cloud storage?

A. storage is available through Web applications B. you connect to cloud storage using a local SAN C. most cloud storage provides fault tolerance D. you can access storage through the Internet

Computer Science & Information Technology

A ___________ field can potentially contain two or more distinct values.

a. Multi part b. Multi valued c. Redundant d. Key

Computer Science & Information Technology