answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
2 years ago
9

Determine the number of bytes necessary to store an uncompressed binary image of size 4000 × 3000 pixels.

Computers and Technology
1 answer:
miss Akunina [59]2 years ago
5 0

Answer:

12,000,000 bytes.

Explanation:

If we want to store an uncompressed binary image, assuming that we will use 256 different levels to represent all tones in a monochromatic image, each pixel will be stored as an 8-bit sample, i.e. one byte per pixel.

The complete image will have 4000 pixels wide by 3000 pixels height, so an entire image will need 3000*4000= 12,000,000 pixels.

As we will use 8 bits= 1 Byte per pixel, we will need to store 12,000, 000 bytes for a complete uncompressed monochromatic (white & black) image.

You might be interested in
Which is true regarding pseudocode
Andrews [41]

Answer:

The features of pseudocode are:

It uses plain english statements.

It emphasizes on the design of the computer program.

It uses structured english.

It is detailed and readable to draw an inference.

It enables the programmers to concentrate on the algorithms.

Explanation:

Clues!!!! Your welcome

8 0
2 years ago
How would GIS, GPS, or remote sensing technology be used to evaluate the destruction caused by a tornado in Oklahoma?
emmainna [20.7K]

Answer:

They can be used to compare a certain region before and after disaster.

Explanation:

4 0
2 years ago
In your own words, describe what Internet Protocols are. Why is it important to have agreed upon protocols?
Anni [7]

Answer:

Internet Protocol refers to a set of rules that govern how data packets are transmitted over a network. Internet protocol describes how data packets move through a network. Its important to have agreed upon protocols because Computers make use of protocols as well, to enable them to communicate. Devices need to communicate. When two devices want to successfully communicate, they must agree to follow some rules about the way they will do it.

8 0
2 years ago
The web development team is having difficulty connecting by ssh to your local web server, and you notice the proper rule is miss
joja [24]

Answer:

Option b (Port 22) seems to the appropriate choice.

Explanation:

<u>Below seem to be some measure you should take to correct this mistake.</u>

  • Verify whether Droplet's host IP address seems to be right.  
  • Verify existing connection supports communication over all the utilized SSH port. Any access points can be able to block port 22 and sometimes customized SSH. For illustration, you could do this by checking different hosts who used the same port, using only a recognized working SSH connection. These could help you identify unless the current problem is not particular to clients' Droplet.
  • Authenticate the Droplet configuration settings. Verify that they're not being configured to DROP 's preferred policy, and do not apply the port to require connectivity.

The SSH server also operates on port 22, by default.  

Other choices don't apply to the specified scenario. So that the argument presented above will be appropriate.

7 0
2 years ago
In the description of the Hack machine language in chapter 4, it is stated that in well-written programs a C-instruction that ma
kati45 [8]

Answer:

To avoid conflicting uses of A register, few well-written programs follow the best practice, i.e, avoiding reference to M and vice versa. The programmer can use the A register to select either a data memory location for a subsequent C-instruction involving M, or an instruction memory location for a subsequent C-instruction involving a jump. Thus, to prevent the conflicting use of the A register, in well-written programs a C-instruction that may cause a jump (i.e., with some non-zero j bits) should not contain a reference to M, and vice versa.

Image is attached for better demonstration and understanding.

4 0
2 years ago
Other questions:
  • 9.10: Reverse ArrayWrite a function that accepts an int array and the array ’s size as arguments . The function should create a
    9·1 answer
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    6·1 answer
  • Mara's presentation included essential information about the company's new safety procedures. She wanted to make
    13·2 answers
  • A slide in Blake's presentation contained the following information:
    11·1 answer
  • Delete Prussia from country_capital. Sample output with input: 'Spain:Madrid,Togo:Lome,Prussia: Konigsberg' Prussia deleted? Yes
    13·1 answer
  • You are the IT security administrator for a small corporate network. Samuel Garcia (sgarcia) has been away on vacation and has f
    9·1 answer
  • Your friend Margo is considering what type of display to purchase with her new desktop computer and she asks you for advice. You
    14·1 answer
  • A 1.17 g sample of an alkane hydrocarbon gas occupies a volume of 674 mL at 28°C and 741 mmHg. Alkanes are known to have the gen
    14·1 answer
  • Complete the program below that takes in one positive, odd, integer, n (at least 3), and prints a "diamond" shape of stars with
    9·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!