Try the new Google Books Show
Check out the new look and enjoy easier access to your favorite features Get answer to your question and much more 6.____ compression compresses data by permanently discarding bits of information in the file.PTS: 1REF: 404 Get answer to your question and much more 7.Recovering pieces of a file is called ____.a.carvingc.savingb. slackingd. rebuildingANS: APTS: 1REF: 405 8.A(n) ____ file has a hexadecimal header value of FF D8 FF E0 00 10.GIFPTS: 1REF: 408 Get answer to your question and much more 9. If you can’t open an image file in an image viewer, the next step is to examine the file’s ____.PTS: 1REF: 414 Get answer to your question and much more 10.The uppercase letter ____ has a hexadecimal value of 41.””PTS: 1REF: 417 Get answer to your question and much more 11.The image format XIF is derived from the more common ____ file format.a.GIFc.b. JPEGd. TIFFANS: DBMPPTS: 1REF: 423 12.The simplest way to access a file header is to use a(n) ____ editorPTS: 1REF: 423 Get answer to your question and much more 13.The ____ header starts with hexadecimal 49 49 2A and has an offset of four bytes of 5C01 0000 20655874 656E 6465 6420 03.PTS: 1REF: 425 Get answer to your question and much more 14.____ is the art of hiding information inside image files. Get answer to your question and much more Get answer to your question and much more PTS: 1 REF: 42514. ____ is the art of hiding information inside image files.a.Steganographyc. Graphieb. Steganalysisd. Steganos PTS: 1 REF: 42515. ____ Steganography places data from the secret file into the host file without displaying thesecret data when you view the host file in its associated program.PTS: 1 REF: 426 Get answer to your question and much more 16. ____ steganography replaces bits of the host file with other bits of data. Get answer to your question and much more PTS: 1 REF: 42617.In the following list, ____ is the only steg tool.PTS: 1 REF: 429 Get answer to your question and much more 18. ____ has also been used to protect copyrighted material by inserting digital watermarks into afile.a. Encryptionc. Compressionb.Steganographyd. Archiving PTS: 1 REF: 43019. When working with image files, computer investigators also need to be aware of ____ laws toguard against copyright violations. Get answer to your question and much more PTS: 1 REF: 43020. Under copyright laws, computer programs may be registered as ____. Get answer to your question and much more PTS: 1 REF: 43021. Under copyright laws, maps and architectural plans may be registered as ____. Get answer to your question and much more 12Downloaded by Shahid Mehmood ([email protected]) What type of image is a collection of dots or pixels that form an image?Raster (or bitmap) images are generally what you think about when thinking of images. These are the types of images that are produced when scanning or photographing an object. Raster images are compiled using pixels, or tiny dots, containing unique color and tonal information that come together to create the image.
Which of the following graphics/file types includes a collection of dots or pixels in a grid format?Bitmap images are collections of dots, or pixels, in a grid format that form a graphic.
What is the term used for the process of converting raw picture data to another format?demosaicing. The process of converting raw picture data to another format, such as JPEG or TIF. bitmap images.
What are the two major forms of steganography?The two major forms of steganography are insertion and substitution. Insertion places data from the secret file into the host file. Substitution replaces bits of the host file with other bits of data. Describe the difference between lossy compression and lossless compression.
|