1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
netineya [11]
3 years ago
5

Shakespeare’s complete works have approximately 3.5 million characters. Which is bigger in file size: Shakespeare’s complete wor

ks stored in plain ASCII text or a 4 minute song on mp3? How much bigger?
Computers and Technology
2 answers:
11111nata11111 [884]3 years ago
8 0

The size of MP3 depends on the file quality. The MP3 quality can be 128 Kbps or 256 Kbps or it may be at any other rate (320Kbps). The high quality MP3 (256 Kbps) have more size than the lower size MP3 (128 Mbps). Therefore, we cannot say whether 4 minutes MP3 is large or 3.5 million characters since MP3 is totally dependent on MP3 quality.

Further explanation:

Since the MP3 file size is dependent on the quality of the music. A high quality (256 Kbps) MP3 of 4 minutes has the size about 7.68 MB and on the other hand a comparatively low quality (128 Kbps) MP3 of 4 minutes has the size of about 3.84 MB. The size of plain text file is 3.5 MB (using M=10^6, not 2^20). The compression of much higher MP3 file is not commonly used for music.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ?brainly.com/question/10410011

2. How does coding work on computers?  brainly.com/question/2257971

Answer details:

Grade: Middle School

Subject: Computer Science

Chapter: Computer basics

Keyword:

MP3, file, quality, 256 Kbps, 128 Kbps, 512 Kbps, 320Kbps, high, low, minutes, ASCII code, music, text, size, Shakespeare, millions, MB, KB

oksano4ka [1.4K]3 years ago
4 0

1 character in ASCII plain text occupies 1 byte of data; therefore 3.5 million of characters are 3.5 million of bytes. Since 1024 bytes = 1KB, we can use this equivalence to convert 3.5 million bytes to KB: (3500000 bytes)*(1KB/1024bytes) = 3417.97 KB. Now 1 minute of mp3 at 128 Kbps occupies 960KB, and since our mp3 is 4 minutes in length: 4*960= 3840KB. The difference between the two is 3840KB – 3417.97KB = 422.1KB, which means that the mp3 is larger than all the Shakespeare’s works by 422.1KB.





You might be interested in
Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the a
Paraphin [41]

Answer:

Follows are the matching to this question:

Option \ a \to \ Option \ 3\\\\Option \ b \to \ Option \ 4\\\\Option \ c \to \ Option \ 1\\\\Option \ d \to \ Option \ 2\\

Explanation:

While time-consuming or prone to errors mechanical adjustments to both the referential, databases could be configured with four measures to engine violations. The restricted action causes the insert, update, and removes to only be denied. Set Null to NULL sets the invalid external key, whereas Set Default to a specific core consideration specified in SQL sets a default foreign key. Its Cascade operation spreads the main changes in external keys.

6 0
3 years ago
What is the function of a text box in Microsoft word?​
Lisa [10]
A text box is an object you can add to your document that lets you put and type text anywhere in your file. Text boxes can be useful for drawing attention to specific text and can also be helpful when you need to move text around in your document.
4 0
3 years ago
Give an original idea for an app idea to do with sports, please.
BlackZzzverrR [31]
Maden Mobile is an app for sports :)
5 0
4 years ago
How long will my chromebook last if it is at 30 percent
Marta_Voda [28]

Answer:

You can see an estimated battery life time.

Explanation:

To see it simply put your mouse over the battery icon, don't click it and it should give you the life it has left in hours:minutes format.

5 0
3 years ago
A public key is part of what security measure?
lord [1]
A public key or the asymmetric key which is used for the authentication process. It consists of a pair of keys in which one key encrypts and the other decrypts. It come under Public Key Infrastructure (PKI) and is a part of INFORMATION SECURITY measures. PKI is the management solution for the keys.
6 0
3 years ago
Other questions:
  • When you schedule an appointment, Outlook adds the appointment to the ____ folder by default.
    9·1 answer
  • What acronym describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrig
    9·1 answer
  • What is the keyboard shortcut used to paste previously copied text?
    15·2 answers
  • The carbon-14 isotope is important because it allows scientists to determine the ___________ of an organic sample.
    14·1 answer
  • HELP ASAP
    7·1 answer
  • Code Example 17-1 class PayCalculator { private: int wages; public: PayCalculator& calculate_wages(double hours, double wage
    8·1 answer
  • El planeamiento estratégico de una empresa es​
    9·1 answer
  • Select the correct answer from each drop-down menu.
    5·2 answers
  • 2.Some artists look for ways to extend copyright for longer than the laws normally allow. Why do they do this?
    15·1 answer
  • Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the publi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!