What is compression?
a. a VPN used to grant outside entities access into a perimeter network; used to hose resources designated as accessible to a limited group of external entities, such as business partners or suppliers, but not the general public
b. a subset of asymmetric cryptography based on the use of key pair sets
c. the art and science of hiding information from unauthorized third parties
d. the removal of redundant or superfluous data or space to reduce the size of a data set
Ans: d. the removal of redundant or superfluous data or space to reduce the size of a data set
You might also like to view...
The binary numbering system uses ________
A) 0s and 1s B) digits 0 to 9 C) 1s and 2s D) 64 bits
____ refers to the way page content, such as paragraph, text, or list items, can be coded to emphasize their meaning to users.
A. Smart web B. Semantic web C. Smart search D. Contextual web
Which of the following statements is NOT true of cloud storage?
A. storage is available through Web applications B. you connect to cloud storage using a local SAN C. most cloud storage provides fault tolerance D. you can access storage through the Internet
A ___________ field can potentially contain two or more distinct values.
a. Multi part b. Multi valued c. Redundant d. Key