Suppose you have a tablet with a capacity of gigabytes. For a plain text​ book, one byte typically corresponds to one character and an average page consists of 2000 characters. Assume all gigabytes are used for plain text books. a. How many pages of text can the tablet​ hold? b. How many​ 500-page books can the tablet​ hold?

Answers

Answer 1

Answer:

a. 17,500,000 pages

b. 35,000

Explanation:

The computation is shown below:

As we know that

[tex]1 giga\ bytes = 1 \times 10 ^ {9} bytes[/tex]

So for 35 gigabytes it would be

[tex]= 35 \times 10 ^ {9} bytes[/tex]

And it is given that there is 2,000 characters

a. So the number of text pages would be

Let us assume that

for 2,000 it would be 1 page

So for [tex]35 \times 10 ^ {9} bytes[/tex] it would be x

Now we solve the x which is equal to

[tex]= \frac {35 \times 10 ^ {9} bytes}{2,000}[/tex]

= 17,500,000 pages

b. Now for 500 pages, it would be

[tex]= \frac{17,500,000}{500}[/tex]

= 35,000


Related Questions

Andy designed a web page for a product-oriented industry using CSS properties. He used several HTML tags to create the web page. He also used tables to ensure that the data is easily managed.
​Andy wants the borders to be distinctly visible for each cell in the product details table. Which of the following properties must Andy add to his code to accomplish his goal?
A. ​border-spacing: length;
B. ​border-collapse: separate;
C. ​border-collapse: collapse;
D. ​border-spacing: initial;

Answers

Answer:

CSS documentation

Explanation:

Use this CSS reference to browse an alphabetical index of all the standard CSS properties, pseudo-classes, pseudo-elements, data types, and at-rules. You can also browse a list of all the CSS selectors organized by type and a list of key CSS concepts. Also included is a brief DOM-CSS / CSSOM reference.

Locatiopn: https://devdocs.io/css/

The properties that Andy must add to his code to accomplish his goal is (B), border-collapse: separate.

What is border-collapse?

The border-collapse property in CSS determines how the borders of table cells are collapsed. The default value of border-collapse is collapse, which means that the borders of adjacent cells are merged together. To make the borders of the cells in Andy's table distinctly visible, he needs to set the border-collapse property to separate.

The other possible answers are incorrect. The border-spacing property determines the amount of space between the borders of adjacent cells. The border-spacing: initial value sets the border spacing to the default value, which is 0 pixels.

Find out more on CSS properties here: https://brainly.com/question/14918146

#SPJ2

Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single integer value, assign the resulting pointer to ip, and initialize the integer value to 27.

Answers

Answer:

In C++:

int *ip;

ip = new int;

*ip = 27;

Explanation:

First of all, let us have a look at the methods of memory allocation to a variable.

1. Compile Time: The memory gets allocated to the variable at the time of compilation of code only. It is also called static allocation of memory.

Code example:

int a = 5;

2. Run Time: The memory is allocated to the variable on the fly i.e. during the execution of the program. It is also called dynamic allocation of memory.

Now, we have to write code for a variable ip, which is an integer pointer to dynamically allocate memory for a single integer value and then initialize the integer value 27 to it.

Initializing a variable means assigning a value to variable for the first time.

Writing the code in C++ programming language:

int *ip;      // Declaring the variable ip as a pointer to an integer

ip = new int;    // Dynamically allocating memory for a single integer value

*ip = 27;   // Initializing the integer value to 27.

Which is an aspect of structural-level design? A. scaling B. player-adjusted time C. difficulty level D. radiosity

Answers

Answer:

D. radiosity

Explanation:

This is because in computers the definition of radiosity is an application of the elemental method of solving the equation for other particular scenes with surfaces that gradually reflects light diffusely.

Answer:

its d

Explanation:

im right

Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode. What can she do to make the games work properly in Windows

Answers

Complete Question:

Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode.

Group of answer choices;

A. Reboot into Safe Mode

B. Run compatibility mode for 640 x 480 resolution.

C. Reduce her screen resolution to 640 x480

D. Reboot into Low Resolution Mode

Answer:

B. Run compatibility mode for 640 x 480 resolution.

Explanation:

In this scenario, Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode. In order to make the games work properly in Windows, Missy should run compatibility mode for 640 x 480 resolution.

The video graphics array (VGA) is the standard graphics or display interface used for computer monitors. It was developed in 1987 by IBM and it had a standard display resolution of 640 x 480 pixels.

Hence, if the output of a software program (games) looks fuzzy or is not being displayed properly, you should run compatibility mode for 640 x 480 resolution. This is to enable low resolution video mode on the computer.

The VGA mode is very basic because only minimal video drivers are being loaded on the windows.

what is a good electric fan for your room?​

Answers

Answer:  a box fan

Explanation:

the get you really cold easily and its easy to turn off and on

Which of the following statements expresses why the following code is considered bad form? for (rate = 5; years-- > 0; System.out.println(balance)) . . . I. unrelated expressions in loop header II. doesn't match expected for loop idiom III. loop iteration is not clear II and III only I and II only I and III only I, II, and III

Answers

Answer:

l and ll only that is the answer

Answer:I , II , and III

Explanation:

You asked your colleague to provide feedback on a blog post you recently wrote. When they sent you their feedback, they made edits directly in the doc. Is this a best practice for a content editing process?

Answers

Explanation:

This question can have both answers that is yes as well as no.

1.Yes, it can serve as an editor who completes your content and ensures it will read well to others.

2. No, the editor should have tracked changes which would have shown you where they would apply recommended edits.

A college marketing department has a networked storage device that uses the IP address 10.18.7.5, TCP port 443 for encryption, and UDP port 4365 for video streaming. The college already uses PAT on the router that connects to the Internet. The router interface has the public IP address of 209.165.200.225/30. The IP NAT pool currently uses the IP addresses ranging from 209.165.200.228-236. Which configuration would the network administrator add to allow this device to be accessed by the marketing personnel from home

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The static NAT stands for (static Network Address Translation), which enables the user to modify a single interpretation for a local second-order to the external environment addresses, and all IP and port numbers were also transcribed inside to random traffic as well as from outside with the internal traffic.

It is used to map network traffic by an internal IP address from a static external IP address. It provides a fixed conversion for actual addresses onto maps. It offers Internet access to the network equipment via a private LAN with such a private IP address which is not recorded.Please find the attachment of the ip address.

Write a pseudocode algorithm which inputs numeric scores and outputs how many of them are over 100. The end of the data is signalled by a user input of -1.

Answers

Answer:

calculateCountGreaterThan100()

{

declare variable count with zero

while True

 {

 input numeric values from user

 if user inputted value > 100

  increment the count

 if user inputted value == -1

  break the loop

 }

print the value of count

}

Explanation:

First of all, let us have a look at the meaning of a pseudocode:

A pseudocode is nothing but a informative way of expressing our code in simple plain English.

It is not written in programming language so it does not have any syntax rules.

Here, we are asked to write pseudocode algorithm for inputting numeric scores and output the number how many of them are greater than 100. The end of numbers is signalled by a user input of -1.

The answer is:

calculateCountGreaterThan100()

{

declare variable count with zero

while True

 {

 input numeric values from user

 if user inputted value > 100

  increment the count

 if user inputted value == -1

  break the loop

 }

print the value of count

}

Here, we have declared a variable with initial count as 0.

Then, in a loop we are taking input from user in which user is giving integer input.

If the value is greater then zero, the count is incremented.

If the value is -1, we come out of the loop and then print the count value.

Pseudocode algorithm are algorithms that are implemented using pseudocodes, and it does not obey the syntax of a programming language.

The Pseudocode algorithm

The pseudocode algorithm is as follows:

count = 0

input num

while num != -1:

    if num > 100:

         count++

print(count)

The flow

The flow of the above pseudocode algorithm is as follows

First, variable count is initialized to 0Next, we take input for numNext, a loop is repeated until the input is -1During each loop, the inputs over 100 are countedLastly, the count of inputs greater than 100 is printed

Read more about pseudocode algorithm at:

https://brainly.com/question/11623795

Asia pacific and Japanese sales team from cloud kicks have requested separate report folders for each region.The VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder. What should a consultant recommended to meet this requirement.

Answers

Answer:

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

Explanation:

Below are the options

A) Create grouped folders, keeping the top region folder sharing settings and limiting the sharing settings for the grouped folders for each region.

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

C) Create all new regional folders and move the reports to the respective region folder with subscribe access.

D) Create subfolders, keeping the top region folder sharing settings and limiting the sharing settings for the subfolders for each region

In order to required reports at one place and also wants to retain the visibility for each folder the consultant should suggest that all new regional folders should be created and afterwards it would be moved to their relevant region folders by involving the viewer access feature so that the VP should access it anytime

Hence, the correct option is B.

Based on the information given, the correct option will be B. Create all new regional folders and move the reports to the respective region folder with viewer access.

From the information given, it was stated that the VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder.

Therefore, it's important to create all new regional folders and move the reports to the respective region folder with viewer access.

Learn more about folders on:

https://brainly.com/question/20262915

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud

Answers

Answer:

D) A private cloud

Explanation:

Note we are told that GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.

Thus, to be able to manage the cloud infrastructure itself; it implies buying it's own hardware equipments, which means it is best to use a private cloud computing option.

Doing so would give GuardIN the opportunity to design the cloud storage in a way that all users of the organization can access it without any lag.

Which of the following statements is true? A. Ethernet connections allow the most mobility for users. B. Maximum advertised connection speeds are for Wi-Fi connections only. C. Every computer user can expect the same Internet connection speed. D. The actual speed of a network can differ from the maximum advertised speeds. E. Wi-Fi is the best option for intensive Internet users who have high data

Answers

Answer:

A

Explanation:

Ethernet connections allow the most mobility for users

Employees often have more than one laptop-so one or both of them are always handheld. For this cause, companies turn to the versatility and scalability of wireless networks. It is convenient to grant workers connectivity through a wireless network, which they can use to connect several devices. Tablets, smartphones and laptops can all be connected to the network, which enables employees to access

Answer: D. The actual speed of a network can differ from the maximum advertised speeds



Explanation:

just got it correct on the test

Write a method, getFirstLine, that is passed a String argument and that returns the first line. (Recall that lines are terminated with the "\n" character.) Assume that the argument contains at least one complete, newline-terminated line.
My Solution:
public String getFirstLine(String a)
{
String[] myLines = a.split("\n");
return(myLines[0]);
}

Answers

Answer:  The answer to this question can be given as:

Method definition :

String getSecondLine (String aString) //define function getSecondLine()

{

return aString.substring(aString.indexOf("\n") + 1, aString.indexOf("\n") + 1 + aString.substring(aString.indexOf("\n") + 1, aString.length()).indexOf("\n"));

//return value.

Explanation:

Bharath has made a table of content for his document, in which he wants to make few changes, but he is unable to make the changes. Give reason. Explain how he can make the necessary changes.

Answers

Answer:

Explanation:

Microsoft Word has an automatic table of contents function that can automatically generate a table of contents for your document, provided you correctly tag the chapter headers and sub-headers that you wish to show in your table of contents.  Setting this up can be a time-consuming process, but if you are writing a lengthy document that will go through several drafts, the automatic Table of Contents can save you a lot of manual revising each time your page numbers or chapter titles change.

Step 1:  In order for Word to identify the headers and subheaders for your Table of Contents, you need to apply the appropriate "Heading" styles to your chapter and sub-chapter headers.

For example, to mark a chapter title as a Level 1 Heading, first select the text that you would like to appear as the chapter heading in the Table of Contents by clicking-and-dragging your cursor over it to highlight it.

Other than hard discs and flash discs, identify other three different storage media

Answers

Answer:

A storage media is any media that can store data.

1. USB flash memory

2. Memory stick

3. Floppy disk

A binary search function is searching for a value that is stored in the middle element of an array. How many times will the function read an element in the array before finding the value?

Answers

Answer: 1 time.

Explanation:

A binary function is also known as a half-interval search is a search algorithm to find the position of a given element x within a well-sorted array []. Binary search compares the target value to the middle element of the array.It ignores half of the elements just after one comparison. it compares x with the middle element.

So, the function read an element one time in the array before finding the value.

BP measuring machine is an example of __________

A)Computing device
B)Medical device
C)Embedded machine
D)None of these​

Answers

Answer:

I think it is a Medical device.

BP = blood pressure

Explanation:

Your program will read in an existing text file. You want the program to terminate if the file does not exist. Which of the following indicates the correct code for the main method header? public static void main(String[] args) throws FileNotFoundException public static void main(String[] args) throws UnknownFileException public static void main(String[] args) public static void main(String[] args) throws FileMissingException

Answers

Answer:

FileNotFoundException

Explanation:

Other Questions
The spread of cancer cells from one site to others in the body is known as _____. n Fill in the blank. The _______ for a procedure consists of all possible simple events or all outcomes that cannot be broken down any further. The (1) for a procedure consists of all possible simple events or all outcomes that cannot be broken down any further. 1. The total area within any continuous probability distribution is equal to 1.00. A. TrueB. False2. For any continuous probability distribution, the probability, P(x), of any value of the random variable, X, can be computed.A. True B. False 3. For any discrete probability distribution, the probability, P(x), of any value of the random variable, X, can be computed.A. True B. False A landscaping company charges $50 per cubic yard of mulch plus a delivery charge of $24. Find alinear function which computes the total cost C(in dollars) to deliver a cubic yards of mulch.C(x) = Read the sentence below. "He was a true statesman and wanted to do what was right for the citizens of his district."Based on the context of this sentence, which word gives it a positive connotation?A. wantedB. citizensC. statesmanD. district why were artists in the PRC advised to observe people and experience a variety of social classes? a. Artists needed to advertise themselves to get artistic commissions b. Artists were considered part o the intellectual class and thus in need of reeducation c. After the Civil War, it was necessary for artists to get new inspiration d. the CCP needed workers to help with all parts of the country Match each type of financing with its purpose.Seed capital?Funding for research anddevelopment of abusiness ideaAngel investment?Funding to get a newbusiness up and runningVenture capital?Investment to achievehigh returns quickly How would 7/2 be written as a complex number crea un acrostico con la palabra RECONCILIACION. el tema es religion please help Describe how the Ming and Qing dynasties' policies of isolation during the 15th century affected China over the long term. Include at least one positive and one negative impact of these policies on China. (4 points) Inflation is a general rise in the level of prices experienced by people in a nation. The Lannisters family went to bed one frigid winter night and were found deceased the next day. A squirrels nest was found in their chimney. What happened to the Lannisters? Write the equation of a line through the given point with the given slope (0,6);m undefined Bagwell's net income for the year ended December 31, Year 2 was $175,000. Information from Bagwell's comparative balance sheets is given below. Compute the cash paid for dividends during Year 2. At December 31 Year 2 Year 1 Common Stock, $5 par value $500,000 $450,000 Paid-in capital in excess of par 948,000 853,000 Retained earnings 688,000 582,000 A. $95,000. B. $201,000. C. $69,000. D. $79,000. E. $50,000. HELP ME ON THIS ONE PLZ NEED ANSWERSWhat is the domain and range of each relation?Drag the answer into the box to match each relation.{(7,2),(2,2),(0,1),(4,5)}A mapping diagram. Element x contains negative 4, negative 3, negative 1, and 1. Element Y contains negative 3, negative 1, and 4. Negative four maps to negative 1. Negative three maps to negative 3 and 4. Negative one maps negative 1. One maps to 4. I really need help!! What is the cash and carry amendment to the Neutrality Acts? A. The US will sell arms, as long as countries pay cash and provide their own transport B. US ships carrying goods to other countries are allowed to attack threatening ships C. The US can declare war, but only if attacked first D. The US will sell arm, but not to members of the Axis countries help me meeeeeeeeeeee You are a project manager for Laredo Pioneer's Traveling Rodeo Show. You're heading up a project to promote a new line of souvenirs to be sold at the shows. You are getting ready to write the project management plan and know you need to consider elements such as policies, rules, systems, relationships, and norms in the organization. Which of the following is not true? A These describe the authority level of workers, fair payment practices, communication channels, and the like. B This describes organizational governance framework. C This describes management elements. D This is part of the EEF input to this process. Use Demoivres Theorem to find (-square root 3 +i)^6 Nongovernmental organizations are usually willing to quickly align themselves with intervening military forces in order to ensure their ability to achieve their objectives and for their physical security.a) trueb) false