Deck 15: Data Compression
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/13
Play
Full screen (f)
Deck 15: Data Compression
1
In a ___ data compression method, the received data is an exact copy of the original message.
A) lossless
B) lossy
C) JPEG
D) MPEG
A) lossless
B) lossy
C) JPEG
D) MPEG
A
2
___ is a lossy compression method for pictures and graphics, whereas ___ is a lossy compression method for video.
A) DCT, MPEG
B) MPEG, JPEG
C) JPEG, MPEG
D) JPEG, DCT
A) DCT, MPEG
B) MPEG, JPEG
C) JPEG, MPEG
D) JPEG, DCT
C
3
___ encoding is a lossless data compression method.
A) Only Huffman
B) Only Run-length
C) Only LZ
D) Huffman, run-length, or LZ
A) Only Huffman
B) Only Run-length
C) Only LZ
D) Huffman, run-length, or LZ
D
4
In ___ encoding, PPPPPPPPPPPPPPP can be replaced by P15.
A) Huffman
B) run-length
C) LZ
D) MPEG
A) Huffman
B) run-length
C) LZ
D) MPEG
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
5
In JPEG encoding, the ___ process breaks the original picture into smaller blocks and assigns a value to each pixel in a block.
A) blocking
B) DCT
C) quantization
D) vectorization
A) blocking
B) DCT
C) quantization
D) vectorization
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
6
In ___ encoding, the more frequently occurring characters have shorter codes than the less frequently occurring characters.
A) Huffman
B) run-length
C) LZ
D) JPEG
A) Huffman
B) run-length
C) LZ
D) JPEG
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
7
The last step in JPEG, ___, removes redundancies.
A) blocking
B) quantization
C) compression
D) vectorization
A) blocking
B) quantization
C) compression
D) vectorization
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
8
LZ encoding requires ___.
A) only a dictionary
B) only a buffer
C) only an algorithm
D) a dictionary, a buffer, and an algorithm
A) only a dictionary
B) only a buffer
C) only an algorithm
D) a dictionary, a buffer, and an algorithm
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
9
A string of one hundred 0s is replaced by two markers, a 0, and the number 100. This is ___.
A) run-length encoding
B) Morse coding
C) Huffman encoding
D) Lempel Ziv encoding
A) run-length encoding
B) Morse coding
C) Huffman encoding
D) Lempel Ziv encoding
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
10
___ is an example of lossy compression.
E) Huffman encoding
F) Lempel Ziv encoding
G) Run-length encoding h. JPEG
E) Huffman encoding
F) Lempel Ziv encoding
G) Run-length encoding h. JPEG
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
11
Data is compressed using a dictionary with indexes to strings. This is __________ .
A) Huffman encoding
B) Lempel Ziv encoding
C) Morse coding
D) lossy coding
A) Huffman encoding
B) Lempel Ziv encoding
C) Morse coding
D) lossy coding
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
12
JPEG encoding involves ___, a process that reveals the redundancies in a block.
A) blocking
B) the discrete cosine transform
C) quantization
D) vectorization
A) blocking
B) the discrete cosine transform
C) quantization
D) vectorization
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
13
___ data compression method, the received data need not be an exact copy of the original message.
A) Only in MP3
B) Only in JPEG
C) Only in MPEG
D) In MP3, JPEG, or MPEG
A) Only in MP3
B) Only in JPEG
C) Only in MPEG
D) In MP3, JPEG, or MPEG
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck