1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sati [7]
4 years ago
8

You are part of a team that is setting up a movie streaming service. The company is planning on initially making available 500 m

ovies. According to some research, the average length of a movie is 130 minutes. When the movie video files are compressed to mp4, the compressed bitrate can be chosen. The rate that has been chosen by the encoding team is 4 Mbps. What is the minimum amount of storage that is required to host the initial 500 movies? Group of answer choices
Computers and Technology
1 answer:
gulaghasi [49]4 years ago
3 0

Answer:

1 petabyte

Explanation:

The minimum amount of storage that is required to host the initial 500 movies is 1 petabyte.

You might be interested in
Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
Sindrei [870]

Answer:

Cloud Computing        

Explanation:

Cloud Computing is basically an infrastructure to deliver various computing resources and services  to the users online (via Internet). These resources include networks, applications, servers, databases, software, storage etc.

These services are mostly utilized by organizations for recovery and backup of data, using virtual hardware and other computing resources such as desktops, memory etc. Cloud computing is also used for developing software, for securing data by providing with access control and for storing bulk of data.

The benefits of cloud computing are as following:

Because of cloud computing the customers do not have to buy hardware or install software on their computer which might be very costly to maintain and update. Servers and data centers are provided by cloud service providers and experts are available for managing the services and resources.

These services are scalable and can be adjusted as per the users requirements.

Cloud computing offers a variety of protocols, tools, and access controls that improve security and protects confidential data, applications, and networks against security threats and attacks. It also provides with data backup, disaster recovery.

5 0
3 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
The Electronic Age began in the<br> A. 1940s<br> B. 1970s<br> C. 1980s<br> D. 1990s
sergejj [24]

Answer:

1940

Explanation:

4 0
3 years ago
Read 2 more answers
What are the possible consequences if you fail to identify system requirements correctly and completely?
AlladinOne [14]
There are a few consequences for failing to identify system requirements. 

1. Strain on time and effort which can cost money for either a company or yourself (depending if you are an employer, employee, etc).

2. Additional costs for hardware. If you decide to upgrade your hardware on a later time. It will cost additional money for repairs and replacements to adjust.

3. It can cause dissatisfaction to a user if you are working as a technician (for example) which can leave a negative mark on your reputation/resume) 
4 0
4 years ago
Computer program allowing the computer to communicate<br> with a hardware device
Airida [17]

Answer:The software that allows a computer to communicate with hardware devices is referred to by the general term known as 'Drivers.

Explanation:Transmission Control Protocol/Internet Protocol (TCP/IP) is the backbone of the Internet and the true language computers use to talk to each other. Essentially it's a set of standards for sending information from a computer's network card, through transmission lines to another network card.

8 0
3 years ago
Other questions:
  • Which of the following could be useful during system testing?
    6·1 answer
  • The registrar does all of the following except:
    12·2 answers
  • Felicia has been having problems with her computer. Her documents won’t open, her computer is running slow, and programs automat
    7·1 answer
  • ANYONE WITH K12 OHVA HIGH SCHOOL LAPTOP! I successfully enter my schools homepage and can login. BUT once I am logged in, it say
    9·2 answers
  • What does a student use when types text into a word processing program ?
    7·1 answer
  • U $ er Ideas for R 0 B 1 0 X?
    12·2 answers
  • Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,150,
    6·1 answer
  • Explain the uses of computer in police department​
    13·2 answers
  • A multinational pharmaceutical company used a saffron trident in a promotional campaign for one of its drugs in India. The saffr
    5·1 answer
  • Question 2 if you have a slow computer, what are some possible culprits that could be causing this? select all that apply
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!