1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
12

How many bits does it take to store a 3-minute song using an audio encoding method that samples at the rate of 40,000 bits/secon

d, has a bit depth of 16, and does not use compression
Computers and Technology
1 answer:
blondinia [14]3 years ago
5 0

Answer:

115200000 bits

Explanation:

Given Data:

Total Time = 3 minute = 3 x 60 sec = 180 sec

Sampling rate = 40,000 bits / sample

Each sample contain bits = 16 bits /sample

Total bits of song = ?

Solution

Total bits of song = Total Time x Sampling rate x Each sample contain bits

                             = 180 sec x 40,000 bits / sec x 16 bits /sample

                             = 115200000 bits

                             =  115200000/8 bits

                             = 14400000 bytes

                             = 144 MB

There are total samples in one second are 40000. Total time of the song is 180 seconds and one sample contains 16 bits. so the total bits in the song are 144 MB.

You might be interested in
Create html code showing heading tags​
kow [346]

Answer:

Assuming you mean the HTML5 head tag, then this may work for you:

<!DOCTYPE HTML>

<html lang="en">

<head>

<title>My Very Awesome Website</title>

<link href="./css/main.css" rel="stylesheet"  />

<meta name="viewport" content="width=device-width, initial-scale=1" />

</head>

<body>

<h1>Hey look</h1>

<p>This is my awesome website!</p>

<h3>Note</h3>

<p>This website is supposed to be 100% awesome!</p>

</body>

</html>

3 0
3 years ago
If your computer has a ________, someone else can gain access to it undetected.
irinina [24]
<span>If your computer has a rootkit, someone else can gain access to it undetected.
</span>The term rootkit denotes a set of software tools <span>typically malicious.
 The purpose of this software is to enable access to a computer or areas of its software that is not otherwise allowed.
</span><span>It is one of the most difficult types of malware to find and remove.</span>
3 0
3 years ago
Briefly explain what is net neutrality and why is it important today
ICE Princess25 [194]

Net neutrality also means that ISPs can't charge users access fees for particular websites. ... The goal of net neutrality is to ensure that businesses can compete freely on the internet without having to pay gatekeeper tolls. Without it consumers would look more like advertising segments than an open marketplace.

Credits: thestreet.com

6 0
3 years ago
If you have cable internet service, what protocol is used between the head end connection and the cable company's network
julsineya [31]
The answer would be (DOCSIS). :)

Have a blessed day and hope this helps!
7 0
3 years ago
You are most likely to use<br> images for photos or digital paintings.
Lubov Fominskaja [6]

Answer: Digital Paintings

7 0
3 years ago
Other questions:
  • 8 POINTS!!!!!!!!
    6·2 answers
  • To see a custom, object-specific action on the palette of the page layout editor: A. Click Layout Properties on the page layout
    11·1 answer
  • Please help me complete this task for ICT! Its about Hardware and Software
    12·1 answer
  • Select the correct answer.
    11·1 answer
  • An Administrator wants to have a thank you email sent after the form on the "Request a Demo" landing page is submitted. Where ca
    12·1 answer
  • Select the antonym for given word freedom
    7·2 answers
  • i have a class for computers and i need a free hardrive are there any websites that give me one for free in 3 days??​
    15·1 answer
  • Project: Math Tutor Program with Error Handling
    9·2 answers
  • State the functions of all the parts of the computer​
    14·1 answer
  • Question 1
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!