1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
2 years ago
10

Utilizando o padrão de medidas e unidades do National Institute of Standards and Technology, em que 1 KB é igual a 1.000 Bytes,

calcule quantas músicas, de exatos 5 MB cada, você conseguiria salvar em um PenDrive que possui 2 GB livres.
Computers and Technology
1 answer:
Tanya [424]2 years ago
5 0

Segundo o padrão da  National Institute of Standards and Technology a  alternativa correta é a letra E) 400 músicas.  Segundo o padrão disposto acima, dois Giga Bytes equivalem à dois mil Mega Bytes, assim, se cada música tem exatos 5MB, podemos chegar ao total de músicas que podem ser gravadas em um PenDrive de 2GB livres do seguinte modo :

x=\frac{2000 MB}{5MB};x=400

 A evolução da microeletrônica possibilitou uma capacidade de armazenamento cada vez maior a cada ano. O desenvolvimento de novas tecnologias na área permite também que os produtores possam produzir músicas, fotos e vídeos com cada vez mais qualidade (consequentemente mais pesada).

You might be interested in
To save time and avoid formatting errors, you can use the ____ to apply custom formatting to other places in your presentation q
almond37 [142]
The answer to the blank is Format Painter.

Use Format Painter in Microsoft PowerPoint to save time in formatting especially for multiple objects. By using this, formatting errors are also avoided. And most of all, its quick and easy to use.
5 0
3 years ago
In a two-sided tag, a(n) ____ tag indicates the content's end.
alexira [117]

Answer:

A closing tag

Explanation:

A tag in HTML is the core building block that marks the presence of an element. If the element has text or another element within it, it is marked using a two-sided tag and in which case, the opening tag indicates the content’s beginning and a closing tag indicates the end of the content

7 0
3 years ago
Read 2 more answers
The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent leg
Lena [83]

Answer:

True is the correct Answer for the above question.

Explanation:

  • Computer security is a security in which data of the computer is secured from the access of unauthorized users. It is primarily achieved to stop the access grant to the unauthorized user.
  • It means that there is an authorization point which decides that the user is authorized or not. If the user is authorized then only he can enter the system otherwise he can not able to enter the system.
  • It helps to secure the data and the data is the important point of the computer system.
  • The question also states the same which is described above. Hence true is the correct answer.

3 0
3 years ago
Explain where the “heart” of the station is and what can be found there? I will mark brainlyest! This is for the ISS (Internatio
Annette [7]

Answer:

Zevzda

Explanation:

Check for yourself if you think i'm wrong

7 0
2 years ago
Read 2 more answers
Which of the following is NOT an example of editing?
Genrish500 [490]

Answer:

ang answer po at proofreading written

content

Explanation:

if I wrong please correction me!

8 0
2 years ago
Other questions:
  • An archive of files that usually contain scripts that install the software contents to the correct location on the system is ref
    11·1 answer
  • Ethan wants to change the font in his document. He should _____.
    8·2 answers
  • Brainlist will be added!✴
    6·1 answer
  • If you do not specify any criteria in a delete query, Access will delete all the records in the table. Truth or False
    11·1 answer
  • When Gina was 10, she swam in the ocean for the first time. She remembers the feeling of kicking her feet, slicing her arms thro
    12·1 answer
  • What do you like and dislike about school? ANDWER FAST!!!
    5·2 answers
  • Write a program in C/C++ to draw the following points: (0.0,0.0), (20.0,0.0), (20.0,20.0), (0.0,20.0) and (10.0,25.0). For this
    6·1 answer
  • 13) An-Excel-file-is-generally called-a-l-an:
    6·1 answer
  • 4.9 Code Practice: Question 4 Edhisive
    14·2 answers
  • you have been using snmp on your network for monitoring and management. you are concerned about the security of this configurati
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!