1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yKpoI14uk [10]
4 years ago
6

You also learn in class that one kilobyte of computer memory will hold about 2/3 of a page of typical text (without formatting).

A typical book has about 400 pages. How many such books can a 9-gig flash drive hold? _______________
Computers and Technology
1 answer:
Travka [436]4 years ago
8 0

Answer:

The flashdrive can hold 35389 400-pages-books

Explanation:

If \frac{2}{3} of a page occupies 1 kB of memory, we can calculate how much memory a book will take

2/3kB=1 page\\ x kB=400 pages\\266.67 kB=400 pages

Now that we know that a book average file size is about 266,67 kB, we calculate how many of them can a 9 GB flash drive hold.

To do the calculation, we have to know how many kilobytes are in 9 gigabytes.

There is 1024 kilobytes in a megabyte, and 1024 megabytes in a gigabyte, so:

Memory_{in _kilobytes}^{} =1024\frac{kilobytes}{megabytes} *1024\frac{megabytes}{gigabytes}*9=9437184 kilobytes

Finally, knowing the average file size of a book and how much memory in kilobytes the 9 GB flash drive holds, we calculate how many books can it hold.

Books=\frac{Flash drive memory}{Filesize of a book} =\frac{9437184kilobytes}{266.67\frac{kilobytes}{book} } =35389,4 books

The flashdrive can hold 35389 400-pages-books, or 14155776 pages of typical text.

You might be interested in
A tornado may be approaching if you observe which of the following?
musickatia [10]
I would go with a funnel cloud on this one. It is the most common sign although it does not guarantee a tornado. Most tornadoes that reach the ground do expand from funnel clouds, but a condensation funnel cloud formation is not absolutely necessary for a tornado to form.
5 0
3 years ago
Brief description email etiquette​
Solnce55 [7]

Answer: See explanation

Explanation:

Email etiquette is defined as the code of conduct which helps to guide the behavior when people send or respond to emails. Some of ail etiquette include:

• Using proper and correct grammar and punctuations.

• Replying quickly too emails.

• Including a clear and direct subject.

• Proofreading of messages.

• Cautious with humour.

• Sending of smaller files and compressing large files.

7 0
3 years ago
The social commerce feature that includes a stream of events to create a history for friends to view​ is/are called​ ___________
lesya692 [45]
<span>The social commerce feature that includes a stream of events to create a history for friends to view​ is called a <u>timeline</u>.
You can see it on Facebook, or any other social media you use - timeline is where you can see what other people are doing, or where they can see what is happening in your life, if you choose to share that with your friends on a social media network of your choice.</span>
4 0
3 years ago
What are the advantages of using an electronic database to store information?
svlad2 [7]
Save time and save paper and protect the environment
7 0
3 years ago
Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that eb
myrzilka [38]

The first step that Ebba should take is: Information gathering and Reconnaissance.

<h3>What is an In-house Penetration Test?</h3>

An in-house Penetration test is a form of offensive test that is aimed at finding the lapses that a system has and initiating attacks to know the best way to prevent them.

Before launching such a test it is advised to plan and gather information about the possible lapses.

This will help the pen tester to know what attacks to launch and the right measures to resolve them. So, the first step that Ebba should take is Information gathering and Reconnaissance.

Learn more about In-house Penetration test here:

brainly.com/question/19085749

3 0
2 years ago
Other questions:
  • Almost all PCs have this type of serial connector
    8·1 answer
  • An existing document that you use as a starting point for a new document; it opens a copy of itself, unnamed, and then you use t
    15·1 answer
  • A file extension of .xlsx means that the file contains what? *
    12·2 answers
  • Using ________ data mining, the user usually begins by telling the data mining software to look and test for specific patterns a
    15·1 answer
  • Match each document to its respective type.
    8·2 answers
  • Describe data center technology and its relevance to modern-day cloud computing. Support your opinion with cited information.( S
    14·1 answer
  • When you use information hiding by selecting which properties and methods of a class to make public, you are assured that your d
    14·1 answer
  • Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
    13·1 answer
  • Select the correct answer.
    10·2 answers
  • Fill in the blank: A keyword set to _____ match type will display your ad if the search term contains the same order of the word
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!