1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoray [572]
4 years ago
8

A certain audio compact disc (cd) contains 783.216 megabytes of digital information. each byte consists of exactly 8 bits. when

played, a cd player reads the cd's digital information at a constant rate of 1.4 megabits per second.
Computers and Technology
1 answer:
kakasveta [241]4 years ago
3 0
You are not putting the question but I can guess that it asking for the CD duration. To answer this question, you need to convert the CD capacity unit(783.216 megabyte) into megabits which were used for the cd read rate (1.4 megabits/s). The calculation would be:

CD duration: CD capacity / rate= 783.216 megabytes *(8 megabits/megabyte) / (1.4 megabits /s)= 4475.52 second or 74.6 minutes
You might be interested in
Complete the sentence.
Luda [366]
The answer is Tablets
6 0
3 years ago
Which layer in the Internet Protocol Suite model verifies that data arrives without being lost or damaged?
zloy xaker [14]
It is D I believe

Explanation:
4 0
3 years ago
How can you add contrast between text and headlines in a document? increase the font size of the headline make the headline long
Pavlova-9 [17]
Increase the font size and make the headline bold
8 0
3 years ago
In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt
ra1l [238]
The answer is DNS Cache Poisoning

Also known as DNS spoofing, this is a type of attack that exploits the Domain Name System to divert traffic away to legitimate servers. It inserts corrupt data into the cache database of the DNS server. In this attack, a hacker sends forged responses from an imposter DNS with an intention to reroute a domain name to a new IP address. This new IP is almost always controlled by the hacker.

       




6 0
4 years ago
1 Point
jekas [21]

Answer: Its A

Explanation:

For creative writing

8 0
3 years ago
Other questions:
  • I'm stuck on this Java exercise problem and don't know how to organize my code with proper formatting and it's not helping that
    14·1 answer
  • The manager of a football stadium wants you to write a program that calculates the total ticket sales after each game. There are
    6·1 answer
  • "an excel spreadsheet is an example of a(n ________ database."
    7·1 answer
  • AW Computing uses a private sharing model for cases. A select group of five users need read/write access to all cases with a spe
    8·1 answer
  • EIPP:________.
    9·2 answers
  • Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that pe
    13·1 answer
  • Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certa
    11·1 answer
  • Discuss what technologies you might see in use at an enterprise. For example, where would you most likely see fiber-optic Ethern
    9·1 answer
  • 2Discuss the difference between overriding and overloading. (This is a very common interview question in programming)
    10·1 answer
  • You want to search for contacts in your email program. You enter the person’s first name and last name in the search box. You wa
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!