Which type of compression compresses data permanently by discarding bits of information in the file?

Try the new Google Books

Check out the new look and enjoy easier access to your favorite features

Get answer to your question and much more

6.____ compression compresses data by permanently discarding bits of information in the file.PTS: 1REF: 404

Get answer to your question and much more

7.Recovering pieces of a file is called ____.a.carvingc.savingb. slackingd. rebuildingANS: APTS: 1REF: 405

8.A(n) ____ file has a hexadecimal header value of FF D8 FF E0 00 10.GIFPTS: 1REF: 408

Get answer to your question and much more

9. If you cant open an image file in an image viewer, the next step is to examine the files ____.PTS: 1REF: 414

Get answer to your question and much more

10.The uppercase letter ____ has a hexadecimal value of 41.PTS: 1REF: 417

Get answer to your question and much more

11.The image format XIF is derived from the more common ____ file format.a.GIFc.b. JPEGd. TIFFANS: DBMPPTS: 1REF: 423

12.The simplest way to access a file header is to use a(n) ____ editorPTS: 1REF: 423

Get answer to your question and much more

13.The ____ header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C01 0000 20655874 656E 6465 6420 03.PTS: 1REF: 425

Get answer to your question and much more

14.____ is the art of hiding information inside image files.

Get answer to your question and much more

Get answer to your question and much more

PTS: 1 REF: 42514. ____ is the art of hiding information inside image files.a.Steganographyc. Graphieb. Steganalysisd. Steganos

PTS: 1 REF: 42515. ____ Steganography places data from the secret file into the host file without displaying thesecret data when you view the host file in its associated program.PTS: 1 REF: 426

Get answer to your question and much more

16. ____ steganography replaces bits of the host file with other bits of data.

Get answer to your question and much more

PTS: 1 REF: 42617.In the following list, ____ is the only steg tool.PTS: 1 REF: 429

Get answer to your question and much more

18. ____ has also been used to protect copyrighted material by inserting digital watermarks into afile.a. Encryptionc. Compressionb.Steganographyd. Archiving

PTS: 1 REF: 43019. When working with image files, computer investigators also need to be aware of ____ laws toguard against copyright violations.

Get answer to your question and much more

PTS: 1 REF: 43020. Under copyright laws, computer programs may be registered as ____.

Get answer to your question and much more

PTS: 1 REF: 43021. Under copyright laws, maps and architectural plans may be registered as ____.

Get answer to your question and much more

12Downloaded by Shahid Mehmood ([email protected])

What type of image is a collection of dots or pixels that form an image?

Raster (or bitmap) images are generally what you think about when thinking of images. These are the types of images that are produced when scanning or photographing an object. Raster images are compiled using pixels, or tiny dots, containing unique color and tonal information that come together to create the image.

Which of the following graphics/file types includes a collection of dots or pixels in a grid format?

Bitmap images are collections of dots, or pixels, in a grid format that form a graphic.

What is the term used for the process of converting raw picture data to another format?

demosaicing. The process of converting raw picture data to another format, such as JPEG or TIF. bitmap images.

What are the two major forms of steganography?

The two major forms of steganography are insertion and substitution. Insertion places data from the secret file into the host file. Substitution replaces bits of the host file with other bits of data. Describe the difference between lossy compression and lossless compression.