Software tools can be categorized as either "lossy" or "lossless". Which of the following tools are considered lossy?

a. Windows Explorer
b. A raw disk editor
c. A disk imaging utility
d. A network capture utility

d.

Computer Science & Information Technology

You might also like to view...

Using forged source addresses is known as _________.

A. source address spoofing B. a three-way address C. random dropping D. directed broadcast

Computer Science & Information Technology

What objects would you encounter in a bank?

What will be an ideal response?

Computer Science & Information Technology