Shakespeare’s complete works have approximately 3.5 million characters. Which is bigger in file size: Shakespeare’s complete works stored in plain ASCII text or a 4 minute song on mp3? How much bigger?

Answers

Answer 1

1 character in ASCII plain text occupies 1 byte of data; therefore 3.5 million of characters are 3.5 million of bytes. Since 1024 bytes = 1KB, we can use this equivalence to convert 3.5 million bytes to KB: (3500000 bytes)*(1KB/1024bytes) = 3417.97 KB. Now 1 minute of mp3 at 128 Kbps occupies 960KB, and since our mp3 is 4 minutes in length: 4*960= 3840KB. The difference between the two is 3840KB – 3417.97KB = 422.1KB, which means that the mp3 is larger than all the Shakespeare’s works by 422.1KB.





Answer 2

The size of MP3 depends on the file quality. The MP3 quality can be 128 Kbps or 256 Kbps or it may be at any other rate (320Kbps). The high quality MP3 (256 Kbps) have more size than the lower size MP3 (128 Mbps). Therefore, we cannot say whether 4 minutes MP3 is large or 3.5 million characters since MP3 is totally dependent on MP3 quality.

Further explanation:

Since the MP3 file size is dependent on the quality of the music. A high quality (256 Kbps) MP3 of 4 minutes has the size about 7.68 MB and on the other hand a comparatively low quality (128 Kbps) MP3 of 4 minutes has the size of about 3.84 MB. The size of plain text file is 3.5 MB (using M=10^6, not 2^20). The compression of much higher MP3 file is not commonly used for music.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ?brainly.com/question/10410011

2. How does coding work on computers?  brainly.com/question/2257971

Answer details:

Grade: Middle School

Subject: Computer Science

Chapter: Computer basics

Keyword:

MP3, file, quality, 256 Kbps, 128 Kbps, 512 Kbps, 320Kbps, high, low, minutes, ASCII code, music, text, size, Shakespeare, millions, MB, KB


Related Questions

What is diffie-hellman most commonly used for?

Answers

DH is an algorithm to derive a shared secret over an unsafe channel.

Both parties exchange public keys, and can join them together with their private keys to create the secret. An eavesdropper can see both public keys, but since he doesn't posess the private keys, cannot derive the same secret.

The secret can be used to subsequently encrypt communications with a symmetric algorithm.

TLS uses this approach.

Final answer:

The Diffie-Hellman algorithm is primarily used for secure key exchange, allowing two parties to establish a shared secret over an insecure channel which can be used for encrypted communication. It relies on the difficulty of solving the Diffie-Hellman problem and is fundamental to many cryptographic protocols.

Explanation:

The Diffie-Hellman algorithm is most commonly used for secure key exchange over a public channel in the field of cryptography. This method enables two parties to create a shared secret key, which can then be used for secure data encryption and decryption. The process involves each party generating a private key and a public key component, followed by an exchange of the public key components. The clever part of Diffie-Hellman is that despite the public exchange, eavesdroppers cannot easily calculate the agreed-upon secret key. Each party then uses its private key together with the other party's public key to compute the identical shared secret.

The security of the Diffie-Hellman algorithm relies on the difficulty of calculating discrete logarithms in a finite field, which is known as the Diffie-Hellman problem. It's a foundational technique in creating secure communications, laying the groundwork for various cryptographic protocols, such as the establishment of SSL/TLS connections which are ubiquitous in securing web-based transactions.

scientist have observed many mysteries of plants True Or False

Answers

I think the answers is true.

Answer:

true

Explanation:

Jane works in the sales department of a service company. She has impressive interpersonal skills and always turns up for work on time. Though she gets along well with her coworkers, she has a habit of constantly interrupting them during a conversation. Which core business etiquette, is missing in Jane?

Answers

Is this multiple choice? I believe it is manners or approachability, but then again I haven't read your lesson.

Active listening. Jane's habit of interrupting coworkers indicates a lack of this core business etiquette, hindering effective communication.

The core business etiquette missing in Jane's behavior is active listening. Active listening involves fully concentrating on what is being said by the speaker, understanding the message, and responding appropriately. By constantly interrupting her coworkers during conversations, Jane fails to practice active listening.

Effective communication in the workplace requires not only expressing oneself but also listening attentively to others. Interrupting others can be perceived as disrespectful and can hinder effective communication. It may make coworkers feel undervalued or ignored, ultimately leading to a breakdown in teamwork and collaboration.

Additionally, active listening is essential for building rapport and trust with coworkers. When Jane interrupts her coworkers, she may come across as impatient or disinterested, which can negatively impact her relationships with them.

To improve her communication skills and demonstrate respect for her coworkers, Jane should work on practicing active listening. This involves giving her full attention to the speaker, refraining from interrupting, asking clarifying questions when necessary, and providing feedback to show understanding. By enhancing her active listening skills, Jane can contribute to a more positive and productive work environment.

You've formatted the first paragraph of a document. What button can you use to apply the formatting from the first paragraph to the next paragraph in the document? A. Cut B. Paste C. Copy D. Format Painter

Answers

the answer is D format painter

A layer 2 switch is used to switch incoming frames from a 1000base-t port to a port connected to a 100base-t network. which method of memory buffering would work best for this task?

Answers

Shared memory buffering would work best. This would give the ports the best allocation of resources, using only those that are the most active and best allocated for the size of the frames being transmitted in the current traffic. In addition, any port can store these frames, instead of being specifically allocated as per other types of memory buffering.
Other Questions
A delivery driver earns a fixed amount for each delivery she makes, and yesterday her average hourly wage was $16.50 an hour. If she worked 6 hours yesterday and made 11 deliveries, how much does she earn for each delivery made? A. $9.90 B. $5.50 C. $5.00 D. $9.00 The supreme court case of prigg v. pennsylvania concerned the issue of _______. I don't know what the symbol means or what to do. Why is the upper layer of desert soil rich in minerals? Which of the following story events from Robinson Crusoe would be considered situational irony?A.Crusoe marks the days he lives on the island on a wooden cross.B.Crusoe sees the sprouted corn as an accident instead of a gift from God. C.After the earthquake, Crusoe decides that the cave isn't the best place for his home. D.After the shipwreck, Crusoe realizes that if the crew had stayed on the ship instead of fleeing on lifeboats, they would have all been saved. Simplify 7(n - p) + 5p.-7n - 12p7n - 12p7n - 2p whats the exact value of tan (300) Erik bought a savings bond. He could have invested in a mutual fund and earned 2 percent more. The 2 percent he could have earned is the _____. A poor farmer son grows up to be one of the most politically powerful government officials in China .which important tang and song cultural feature allowed this person to become so successfully? Which tragic flaw of Juliets character is reflected in this excerpt?her optimistic way of seeing the worldher tendency to act without forethoughther tendency to act out of vengeanceher carefree way of living life What is the significance of having never spoken to the person knocking at the window? What kind of solution causes chloroplasts to be pushed outward against the cell wall? You've formatted the first paragraph of a document. What button can you use to apply the formatting from the first paragraph to the next paragraph in the document? A. Cut B. Paste C. Copy D. Format Painter Which of these equations have no solution? Check all that apply. A 2(x + 2) + 2 = 2(x + 3) + 1 B 2x + 3(x + 5) = 5(x 3) C 4(x + 3) = x + 12 D 4 (2x + 5) = (4x 2) E 5(x + 4) x = 4(x + 5) 1 What were the main features of the Toltec and Aztec empires? explain the yalta conference and how it led to the cold war Through a given point p on a plane how many lines can be drawn that are perpendicular to that plane The word movement in music normally refers to music for the ballet. a piece that sounds fairly complete and independent but is part of a larger composition. the rising and falling of the melodic contour. the rhythm of a piece. A researcher finds 1000 mildly overweight women who exercise regularly, have not had a heart attack, and are willing to participate in the study. she randomly assigns 500 of the women to take an appetite suppressant. the other 500 women are given a placebo. both groups are followed for five years and the amount of weight lost after this time is recorded. the factor (explanatory variable) in the experiment is S shown on the periodic table, the greatest number of elements are which Steam Workshop Downloader