1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
3 years ago
13

A commonly-used estimate for the number of bytes needed to store one

Computers and Technology
1 answer:
Basile [38]3 years ago
3 0

Answer:

0.127 miles ; 5.458 *10^8 miles

Explanation:

Number of bytes needed to store a page = 2000

Number of pages (Harry Potter's book) = 800

Total memory required to store entire book = (2000 * 800) = 1600000 = 16 * 10^5 bytes

Hence,

1 byte of memory will store : (height of each book / memory size of each book)

= 3 ÷ 16 * 10^5

= 1.875 * 10^-6

For 32 bit memory space :

(1.875 * 10^-6 * 2^32) = 8053.06368 inches

1 inch = 1.578 * 10^-5 mile

8053.06368 inches = 8053.06368 * (1.578 * 10^-5) = 0.1270773448704 miles

= 0.127 miles

For 64 bit memory size :

(1.875 * 10^-6 * (2^64)) = 3.45876 * 10^13 inches

(3.45876 * 10^13) * (1.578 * 10^-5)

= 5.458 *10^8 miles

You might be interested in
(1) Experiment Purpose
ra1l [238]

An Output report is known to be the various  findings that has been generated or it is said to be the result of a given program outcome.

<h3>What is an output report?</h3>

An output is known to be a file that has been produced by the system when a user is said to have submitted a Program, Report Set, etc. for execution.

Note that to be able to compile the GPSSWorld program, one has to use a statistical software to create the output and charts, and then one can copy and paste the results unto any given  word processor software where one can construct a table for it.

Learn more about output reports from

brainly.com/question/11599232

#SPJ1

3 0
2 years ago
A software engineer is developing a new operating system. The operating system has to make a decision when it sees an applicatio
anyanavicka [17]

Answer:

No.

Be patient. Wait a bit longer to see if the application succeeds, and if it does not, force quit and debug the operating system to figure out what's wrong.

7 0
3 years ago
The composer pictured above is best known for taking older forms and styles and redefining them in modern ways. Antonin Dvorak w
vfiekz [6]

Answer:

The composer pictured above is Johannes Brahms (1833-1897), who were born in the German city of Hamburg. Several musicians from his time and also later composers consider him as a traditionalist but an innovator too. Some his work inspired the great composer Arnold Schoenberg.

He met Antonin Dvorak in 1877. The Czech composer dedicated his String Quartet, Op. 44 to Brahms.

His Hungarian Dances are a total of 21 dance tunes inspired by Hungarian themes. This compositions are among the most known works by Brahms.

Explanation:

7 0
4 years ago
39. What information does the switchport port-security command use to restrict access to a switch’s interface?
Alinara [238K]

The Switchport port security command helps to configure a switchport so that the traffic can be reduced to only a particular configured MAC address or list of MAC addresses.

<h3>What are the Port security feature?</h3>

The port features are made up of three types of ports which are:

  • Trunk ports
  • Ether channel ports
  • Switch port analyzer ports

Note that The Switchport port security command helps to configure a switchport so that the traffic can be reduced to only a particular configured MAC address or list of MAC addresses.

Learn more about switchport from

brainly.com/question/14801758

#SPJ1

6 0
2 years ago
A defined set of standards that computers must follow in order to communicate properly is known as a
Degger [83]

a defined set of standards that computers must follow  in order to communicate properly is known as communication protocol.

standards are really need to be set to communicate effectively between two or more different communication.

these communication standards defines the rules of communication in the computers

i.e when one  computer is sending something the other should receive that

ie both computers should not do same operations at same time.

5 0
3 years ago
Read 2 more answers
Other questions:
  • There are several different types of RAM, each with its own purpose. Name the three types of RAM and briefly describe their func
    8·2 answers
  • Gear systems with __________ can have both drive and driven gears on the same shaft. a. an odd number of gears b. an even number
    6·1 answer
  • b) Derive the logic expressions for the incrementor and 7-sgement decoder. Since software can perform gate-level optimization, y
    7·1 answer
  • Which among the following choices is correct based on the two statements listed below? Statement 1: When the lexical analyzer sc
    12·1 answer
  • What are five features of word 2016 you would use to make a brochure
    6·2 answers
  • Select which is true for for loop​
    11·1 answer
  • 18
    6·1 answer
  • What is the output of this program? age=4 if age &gt;5: print (“more”) else: print (“less”)
    7·1 answer
  • A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a use
    15·1 answer
  • Write an expression in Boolean algebra that evaluates to 1 when an odd number of bits of the number is 1 and 0 otherwise
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!