answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
2 years ago
9

What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?

Computers and Technology
2 answers:
maw [93]2 years ago
7 0

Answer:

4A5M3H2V

Explanation:

Compression techniques deal with removing <em>redundancy</em> in data to save memory space in computers.

In this case, there are <em>runs</em> of four A's, five M's, three H's and two V's, which is clear that each letter is repeated by some value. That is, there is redundancy in data: some values appear more than once.

Well, to save memory space in a computer, instead of having 4 + 5 + 3 +2 = 14 characters, we can reorder that by having only eight characters (4A5M3H2V), <em>saving the same information</em> using less memory space in a computer.

The former technique has a name. It is called <em>Run-length encoding</em>, and it is one of the most rudimentary compression techniques (Shotts, 2019) and also a <em>lossless</em> <em>compression technique</em>, that is, no data information is lost after the compression process.

stiks02 [169]2 years ago
3 0

I think AAAAMMMMMHHVVV

i think suppose to be 3 v's

You might be interested in
Sarah works in a coffee house where she is responsible for keying in customer orders. A customer orders snacks and coffee, but l
Maru [420]

Answer:

Stack

Explanation:

Stack is a linear data structure that follows a particular order in the way an operation is done or sequence a job is completed.

It uses either LIFO ( Last In, First Out) which is also known as first come first served sequence or FILO (First In, Last Out) sequence.

There are several real life examples of which we can use the example of replacing the snack items Sarah brought for the customer.

If Sarah used the LIFO method, it means she replaced the snack items first ontop of the already existing snack items that's why there is a mismatch.

5 0
2 years ago
Read 2 more answers
Kayle is building a web form. He has included space where users can input their phone numbers and email addresses. However, he w
Digiron [165]

Answer:

D. javascript

Explanation:

use form validation method bro

8 0
2 years ago
Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
lara [203]
Hello <span>Pouerietzach


Question: </span><span>Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
</span><span>
Answer: A, B, D, E, G

Hope That Helps
-Chris</span>
5 0
2 years ago
Read 2 more answers
To keep from overwriting existing fields with your Lookup you can use the ____________ clause.
Radda [10]
I believe the answer is <span>outputnew
</span>The main difference between the output new and the output is that outputnew won't overrite the alredy existing description field.
If you don't put this clause, <span>Splunk would adds all the field names and values to your events by through the lookup.</span>
3 0
2 years ago
Read 2 more answers
A technician is trying to use the tablet to control the iot device digital lamp. the technician tries to login to the registrati
Rom4ik [11]
<span>In the scenario in which a technician is trying to use the tablet to control the IoT device digital lamp, but </span><span>the access is not successful the two problems are:
</span>The registration service on the server is off.
The digital lamp is using the wrong credential to connect to the registration server.
3 0
2 years ago
Other questions:
  • In three to five sentences, explain how you would insert graphics using your word-processing software.
    7·2 answers
  • When you examine a computer chip under a microscope, what will you see?
    6·1 answer
  • 1. Do you consider Facebook, MySpace, and LinkedIn forms of disruptive or sustaining technology? Why?
    15·1 answer
  • Witch printer covers a large range of colors than any other printer does
    15·2 answers
  • What three requirements are defined by the protocols used in network communications to allow message transmission across a netwo
    11·1 answer
  • You are describing the boot process to a friend and get to the step where the device loads the operating files into RAM, includi
    7·1 answer
  • Multiply each element in origList with the corresponding value in offsetAmount. Print each product followed by a semicolon (no s
    14·1 answer
  • #Write a function called fancy_find. fancy_find should have #two parameters: search_within and search_for. # #fancy_find should
    9·1 answer
  • Two devices are connected to the Internet and communicating with one another. A squirrel chews through one of the wires in the n
    6·1 answer
  • A police department wants to maintain a database of up to 1800 license-plate numbers of people who receive frequent tickets so t
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!