answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
2 years ago
9

What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?

Computers and Technology
2 answers:
maw [93]2 years ago
7 0

Answer:

4A5M3H2V

Explanation:

Compression techniques deal with removing <em>redundancy</em> in data to save memory space in computers.

In this case, there are <em>runs</em> of four A's, five M's, three H's and two V's, which is clear that each letter is repeated by some value. That is, there is redundancy in data: some values appear more than once.

Well, to save memory space in a computer, instead of having 4 + 5 + 3 +2 = 14 characters, we can reorder that by having only eight characters (4A5M3H2V), <em>saving the same information</em> using less memory space in a computer.

The former technique has a name. It is called <em>Run-length encoding</em>, and it is one of the most rudimentary compression techniques (Shotts, 2019) and also a <em>lossless</em> <em>compression technique</em>, that is, no data information is lost after the compression process.

stiks02 [169]2 years ago
3 0

I think AAAAMMMMMHHVVV

i think suppose to be 3 v's

You might be interested in
CAPTCHAs can be used as a form of signature to create a valid contract in e-commerce. True False
Len [333]
Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
The statement "CAPTCHAs can be used as a form of signature to create a valid contract in e-commerce. " is true. It is <span>a program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites.</span>
4 0
1 year ago
Read 2 more answers
Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
VikaD [51]

Answer:

I would say that if she is connected to the server and has grained access to the server, Wendy would have to use the command shortkey win+r (to run) or she could just use the "Type here to search" function.

Then you can type the words "cmd" to bring up the command prompt

Lastly, she would need to use the protocol scp to transfer files. Wendy might need to include a destination for the files to be directed to.

7 0
1 year ago
Ming is building an inexpensive computer to use for her online classes, and needs to purchase Windows. What is the most cost-eff
kodGreya [7K]

The correct answer is; She can purchase OEM codes from e-commerce sites such as Amazon or eBay.

Further Explanation:

There are some sites where OEM codes cost around 110$ or higher. it will depend on which edition of Windows she plans on purchasing. The official Microsoft website sells the codes for much higher than other e-commerce sites.

There is some ways to get the older Windows for free online using a software key from a previous purchase from a friend or one you have purchased in the past. There is also a free trial that can be used for 7 days and possibly 30 days.

Learn more about Windows at brainly.com/question/1705478

#LearnwithBrainly

5 0
2 years ago
B.) Define latency and jitter for service flow in a fixed wireless system.
yuradex [85]
The answer would be between the base station and the subscriber station.
7 0
2 years ago
Write a class named Employee that has private data members for an employee's name, ID_number, salary, and email_address. It shou
mario62 [17]

Solution :

class Employee:

   #Define the

   #constructor.

   def __$\text{init}$__($\text{self, nam}e$,  ID_number, $\text{salary}$, email):

       #Set the values of

       #the data members of the class.

       $\text{self.nam}e$ = name

       $\text{self.ID}$_number = ID_number

       $\text{self.salary}$ = salary

       self.email_address = email

#Define the function

#make_employee_dict().

def make_employee_dict(list_names, list_ID, list_salary, list_email):

   #Define the dictionary

   #to store the results.

   employee_dict = {}

   #Store the length

   #of the list.

   list_len = len(list_ID)

   #Run the loop to

   #traverse the list.

   for i in range(list_len):

       #Access the lists to

       #get the required details.

       name = list_names[i]

       id_num = list_ID[i]

       salary = list_salary[i]

       email = list_email[i]

       #Define the employee

       #object and store

       #it in the dictionary.

       employee_dict[id_num] = Employee(name, id_num, salary, email)

   #Return the

   #resultant dictionary.

   return employee_dict

6 0
1 year ago
Other questions:
  • In a spreadsheet, the instructions for carrying out calculations are called __________. recalculations formulas templates macros
    13·1 answer
  • Write a program in c or c++ to perform different arithmeticoperation using switch statement .the program will take two inputinte
    10·1 answer
  • The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by ele
    7·1 answer
  • An electronics store purchased a CD player at a wholesale price of $60 and then sold it at a 40 percent discount off the origina
    13·1 answer
  • Question 1 :Which type of unshielded twisted pair (UTP) cable is commonly used for 1000BASE-T Ethernet networks and is often mad
    8·1 answer
  • Jen is trying to discover if a motor has failed windings. What sort of test can she do.
    6·1 answer
  • For a class project, Jerome builds a simple circuit with a battery and three light bulbs. On his way to school, Jerome drops his
    9·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
  • For a data structure, such as a stack, who is responsible for throwing an exception if the stack is empty and a pop() is called:
    13·1 answer
  • Finish the program to compute how many gallons of paint are needed to cover the given square feet of walls. Assume 1 gallon can
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!