¿Si tengo un disco de 1Tb, y en el tengo almacenado lo siguiente:
a) 300 videos de 126GB en total
b) 1376 archivos de office que cada uno pesa 117kb.
c) 3000 mp3 de 3.8mb cada uno.
d) 4Gb ocupados en el sistema operativo.
¿Cuánto espacio me sobre en el disco duro?

Answers

Answer 1

Answer:

Espacio a la izquierda = 858,8439008 Gb

Explanation:

Dados los siguientes datos;

Tamaño del disco duro = 1 Tb

Vídeos = 126 Gb

Archivos de Office = 1376 * 117 Kb = 160992 Kb

Mp3 = 3000 * 3.8 mb = 11400 Mb

Sistema operativo (OS) = 4 Gb

Conversión:

En primer lugar, convertiríamos el tamaño del archivo en kilobytes a megabytes.

1000 Kb = 1 Mb

160992 Kb = 160992/1000 = 160.992 Mb

Memoria total (Mb) = 11400 + 160,992

Memoria total (Mb) = 11560.992 Mb

A continuación, convertiríamos el tamaño del archivo en megabytes a gigabytes;

1000 Mb = 1 Gb

11560.992 Mb = 11560.992/1000 = 11.560992 Gb

Por último, sumaríamos todos los tamaños de archivo en gigabytes;

Espacio total (memoria) utilizado = 126 + 11.560992 + 4

Espacio total (memoria) utilizado = 141,560992 Gb

Conversión:

1000 Gb = 1 Tb

Espacio restante = tamaño del disco duro - memoria total utilizada

Espacio a la izquierda = 1000 - 141.560992

Espacio a la izquierda = 858,8439008 Gb

Nota:

Kb significa kilobyte. Mb significa megabyte. Gb significa gigabyte. Tb significa terabyte.

Related Questions

the condition for meeting future enables you to apply formatting to the cells which satisfy a particular condition true or false​

Answers

Answer:

True

Explanation:

Conditional formatting feature available in several spread sheet applications is a feature that allows users to apply the type of formatting they want to cells, such that the content of the formatted cells are displayed in a manner that meets a given specific criteria

What best Describes algorithm bias

Answers

Answer:

E

Explanation:

cause e

a.
5. A red circle and diagonal slash on a sign means
that
a hazard is ahead.
b. the action is not allowed.
c. diagonal crossing is permitted.
d. two roads intersect ahead.

Answers

Answer:

b. the action is not allowed.

Explanation:

Traffic signs are established rules and regulations designed to direct and guide commuters and other road users.

A red circle and diagonal slash on a sign simply means that the action is not allowed.

A hortatory technique is focused on encouraging, exhorting and urging people to do that which is right, acceptable and worthy of emulation by others.

For example, commuters and road users are being urged not to litter the highway with thrash, waste, or dirt, in order to protect the planet from environmental degradation and pollution. This would help in conserving and mitigating risks posing as a threat to our dear planet and habitat.

Hence, a hortatory technique in policy implementation and enactment is primarily aimed at appealing to the sense and conscience of individuals, to engage in socially responsible acts.

anyone know how to translate this 1100111111110100000110 pls n ty!4!:$;

Answers

Answer:

1100111111110100000110 = �

Binary -> UTF-16

3,407,110 in decimal form

Additionally, it also translates to the color green in hexadecimal.

Not really sure what you are trying to translate this in to though.

yeah sure no problem that says

We use loops to: Process Numeric Data Ask users to enter information Repeat blocks of code Ask True/False questions

Answers

Answer:

Repeat blocks of code.

Explanation:

EXAMPLE JAVASCRIPT LOOP CODE

_________________________________________________________

INPUT:

while(true){//Check If bool True=True

console.log("Hello World!")

}

_________________________________________________________

OUTPUT:

Hello World!

Hello World!

Hello World!

Hello World!

Hello World!

[tex]\cdots[/tex]

Hello World!

Hello World!

A data center needs to ensure that data is not lost at the system level in the event of a blackout. Servers must stay operable for at least an eight-hour window as part of the response and recovery controls implemented. Which redundancy effort should be put in place to ensure the data remains available?

Answers

Answer: UPS

Explanation:

The redundancy effort that should be put in place to ensure the data remains available is the Uninterruptible Power Supply(UPS).

Uninterruptible Power Supply (UPS) is necessary in the provision of battery backup power when there's drop or stoppage in the flow of electricity. With regards to the question, it'll ensure that data is not lost at the system level in the event of a blackout.

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm

Answers

Answer:

An online UPS

Explanation:

An online uninterrupted power supply (ups) can be defined as an electronic device that is designed to supply continuous power to a load that uses alternating current (AC), through the inverter and rectifier arrangement (combination) during normal operation of the device. Thus, an online UPS through its inverter supplies continuous AC power in the event of a power failure.

Hence, an online UPS power backup method is designed and developed to continually provide power to a server (load) if there is a power outage as a result of a thunderstorm.

In conclusion, an online uninterrupted power supply (ups) guarantees a 24 hour power supply when properly installed and connected to a load or end user device such as a server.

The CTRL, ALT, and WINDOWS keys are commonly used for keyboard shortcuts, which are keystrokes that can quickly perform an operation within software. True False

Answers

answer
True
explain



The shortcut keyboard is one or more keys that are used to performing a program and other capabilities, that's why the given statement is "True", and the further discussion can be defined as follows:

The keyboard shortcut is a set of one or more keys that invoke the preprogrammed activity of the software package.Shortcut keys are the strategic utilization key combinations on one's keyboard for more good functioning in your software. The shortcuts are in one's file folders, word processing programs, and even for e-mail accounts or social bookmarking sites.The keyboard shortcuts, CTRL, ALT, and WINDOWS, which can perform quickly in the software, are commonly used.

Therefore, the final answer is "True".

Learn more:

brainly.com/question/1212286

A(n) _____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.

Answers

Answer:

Explanation facility

Explanation:

Expert systems leverage the ability of artifical intelligence as they are computer programs which have the ability of learning over time from a particular expert on a certain knowledge base or field in other to be reproduce or simulate the responses or capability of the expert based on the same subject. The expert system is composed of components such as the knowledge base, inference engine, knowledge and learning module, user interface and the Explanation facility . What the explanation facility typically does is explains to the user why and how a particular recommendation is made or how it reached a certain conclusion

In _____, a program running on a Web server creates a Web page in response to a request for specific information from a Web client.

Answers

Answer:

server-side scripting

Explanation:


Write a short note on Computer
impact on
our society?​

Answers

well not a note but here are some few points

Explanation:

1 Computers can have the huge impact on employment of people like job and other stuff.

2 lots of human can be jobless or unemployed

3 it can cuz impact on the health of peoples

4 it also can make us lazy and and lack of self knowledge

Answer:

Everybody knows that the computer age is here, and most people use the computer. Science and technology development has a direct impact both on our everyday life and on our social lives. In seconds, computer technology has enabled communication between the two parts of the world. In one part of the world, you may see the transactions while in the other part. The development of computers is one of the 20th century's greatest scientific achievements.

Explanation:

Positive Impact of Computer:-

The work can be done very quickly.You can store more information in a small space.Multitasking and data multimedia capacity.Access to data is easy.

Negative Impact of Computer:-

Very costly.Accidents.Pirating data. Enhanced joblessness.Sometimes enormous data and information can be lost.Computer technology is changing rapidly.Distribution of services.Computing and computer analphabetism.

Made from fruit juice, water and sugar, The American version contains milk and cream and sometimes egg white​

Answers

Answer:

ok what is the question supposed to be ?

Edit : nvm i got what you were saying ...

Sherbet and Ices – made from fruit juices, water and sugar. American sherbet contains milk and cream and sometimes egg white.

If you set the Decimal Places property to 0 for a Price field, and then enter 750.25 in the field, what does Access display in the datasheet

Answers

Answer:

The answer is "750".

Explanation:

Throughout this question the even though it used to provides the precise decimal which is used as the representation or rounding requirement in software such as billing, it also used to represents only the 750, demonstrating the nearest rounding of the given technique, that's why the solution is 750.

Specifications that establish the compatibility of products and the ability to communicate in a network are called:

Answers

Answer:

technology standards

Explanation:

Technology standards can be regarded as standards that dish specifications that set up Product compability as well as communication capability in network, they give standards that are required in using technology in different areas such as teaching, business, IT network as well as learning. One of the body that Ado publish this is the International Society for Technology in Education( ISTE) which is a non profit membership association that regulate technology as regards educational technology.

It should be noted technology standards is Specifications that establish the compatibility of products and the ability to communicate in a network.

Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer choices

Answers

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

Escribe un ejemplo de:• Software de aplicación. • Software de diagnóstico. • Software de sistema. ayudenme plis, me toca entregar esto hoy. >﹏<

Answers

Answer:

1. Software de aplicación: Microsoft Word.

2. Software de diagnóstico: Speccy.

3. Software de sistema: Windows operating system (OS).

Explanation:

Un software puede definirse como un conjunto de instrucciones ejecutables (códigos) o una colección de datos que se utiliza normalmente para instruir a una computadora sobre cómo realizar una tarea específica y resolver un problema en particular.

Básicamente, los softwares se clasifican en tres (3) categorías principales y estas son;

1. Software de aplicación: es un software de usuario final que normalmente está diseñado para realizar tareas y funciones específicas.

Algunos ejemplos de software de aplicación son Microsoft PowerPoint, Notepad, Windows Media player, Firefox, Go-ogle Chrome, Adobe Photoshop, AutoCAD, etc.

2. Software de diagnóstico: estos son programas de software que se utilizan para solucionar problemas y posiblemente reparar un sistema informático.

Algunos ejemplos de software de diagnóstico son Speccy, Windows Sysinternals Suite, System Explorer, hddscan, HWiNFO, SIW (System Information for Windows), CPU-Z, HD Tune, etc.

3. Software de sistema: es un software que normalmente está diseñado para ejecutar el hardware de la computadora y todas las demás aplicaciones de software.

Algunos ejemplos de software del sistema son Linux, Windows OS, Mac OS, WinZip, McAfee antivirus, Norton antivirus, Avast antivirus, Piriform CCleaner, Ubuntu, etc.

Discuss if you think technology, mobile apps, and/or social networks make us lazy or not. Justify your answer.
Identify ways that you’ve seen social media affect people in the workplace or in society (whether positively or negatively).
Analyze technology’s impact (and in particular, consider social media and mobile apps) on your own life.

Answers

Answer:

Yes, I do you can't just go out and work, play, or anything outside and people just want to stay inside on electronics like phones, tv, game systems.

Explanation:

   In truth, technology has made a lot of difference in our society, but it has also transformed humans into lazy-bones. These days, people don't need to run errands anymore; they push a button on their phone (another product of tech) and have most of the human's first world problems solved

what is an example of analog device​

Answers

Explanation:

Thermometer. Speedometer. Analogue Clock. Seismometer. Voltmeter. Flight Simulators.

hope it helps

stay safe healthy and happy...

50 POINTS! PLEASE HELP!
________ is a VMware Network setting that does not put the virtual machine directly on the physical network of the computer.


Host Only

MAT

NAT

VNAT

Answers

Answer:

NAT

Explanation:

The Network Address Translation (NAT) is a Virtual Machine Software which allows organizations to make use of a single Internet Protocol by altering the private network addresses to a private one. It makes it possible to Map multiple network addresses to a public address thereby providing security. The NAT VMware allows a single device such as a router provide an information transfer interface between a private and public network. Hence, it does not use the physical network of the computer.

Answer:

NAT

Explanation:

I took the test :D Hope this helps!

Why is it important to ensure that your software is up to date?

Answers

Explanation:

It is important to ensure that your software is up to date simply because these updates often provide critical patches to security issues. These patches are to terminate any bugs or exploits that may cause harm to your computer system, and even your personal data. Updating your software allows the program to remove old outdated features, while installing newer/better features. They will often improve the stability and preformance as well.

Tell me a password. Your password must be at least 8 characters long and must include at least one uppercase letter, one lowercase letter, one special character, and one number.

82 point question even tho it’s really easy

Answers

Answer:

swa#22*88#&mu#hu..

Explanation:

hope it correct

A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?

Answers

Group of answer choices.

A. It can communicate with networks inside a particular company with subnets.

B. It can communicate on the local network as well as on the Internet.

C. It has a public IP address that has been translated to a private IP address.

D. It cannot communicate outside its own network.

Answer:

D. It cannot communicate outside its own network.

Explanation:

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.

When a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.

Generally, a computer cannot communicate outside its own network when it is assigned an IP address of 169.254.33.16.

Which command entered without arguments is used to display a list of processes running in the current shell

Answers

Answer:

ps

Explanation:

In Unix and Unix-like operating system, the command used to display the list of processes running in the current shell is ps. For each of these processes, the following details are displayed;

i. PID which indicates the id of the process

ii. TTY which indicates the type of terminal from which the process is running.

iii. TIME which represents the CPU time consumed by the the process and its sub-processes.

iv. CMD which represents the command that runs as the current process.

A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, without investing in physical equipment and layouts.

Answers

Answer:

The correct answer is "Cave automatic virtual environment ".

Explanation:

An interactive virtual setting composed of something like a VR chamber or space throughout the cube form wherein the projection displays represent the boundaries as well as flooring, is determined as Cave automatic virtual environment.This same client computer does have a Virtual reality headset as well as header projection but instead uses devices like walls etc.

 

Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding technique to use. Which technique would work best for her?

Answers

Answer:

Webbed storyboard technique

Explanation:

There are several storyboard techniques; however, the best for a website is the webbed storyboard technique.

Coined from the word "web", this technique does not only help in linking pages within the website where a page can be access from other pages, it also links pages of the website to external pages.

An illustration is as follows:

From the homepage of a website, one can access the contact page, the about page, etc.

Each of the listed pages also have link back to the homepage and to every other pages.

Popular mixed drinks such as margaritas

contain more alcohol than a standard drink.

A. will

B. do not necessarily

O C. never

Drugs

the chemistry of the brain and the way that a person thinks.

A. change

B. don't change

C. trick

Highway Safety Administration

Answers

Answer:

C.never and A.change that's what I think

what is the best college in texas for cyber security

Answers

Answer:

Cybersecurity education in Texas There’s no doubt that cybersecurity education in Texas is in a league of its own. Out of all of the Lone Star State’s universities, the University of Texas at San Antonio is the number one choice for many budding cybersecurity professionals.

Why are peripherals added to computers?
to limit their applications
to change their purpose
to expand their capabilities
to specify their functions

Answers

Answer:

To expand their capabilities

Explanation:

They allow users to do more with computers

What is the correct order or a technological system?

A Input, Output, Process
B Output, Process, Input
C Input, Process, Output
D Process, Resources, Output


POV : the topic is fcm aka family consumer management i don't see any topic for that so i put a different one plz help

Answers

Answer

C

Explanation:

In a system you have to send on input data, then the application processes it and then it returns your output

i am doing 7th grade coding 3.02 assignment can anybody help me it says bad input on line 3 and this is what it is can someone help me
grade = int(input("What grade are you in?"))

Answers

Answer:

grade = int(input("What grade are you in?")

if grade == 9:

print ("Freshman")

elif grade == 10:

print ("Sophomore")

elif grade == 11:

print ("Junior")

elif grade == 12:

print ("Senior")

else:

print ("Invalid")

Explanation:

You fail to provide the complete code. So, I will rewrite the code from scratch

The complete question requires that the level is printed based on the input grade.

The code has been added in the answer section.

The explanation is as follows:

[Thus gets input for grade]

grade = int(input("What grade are you in?")

[If grade is 9, this prints Freshman]

if grade == 9:

print ("Freshman")

[If grade is 10, then level is sophomore]

elif grade == 10:

print ("Sophomore")

[If grade is 11, then grade is Junior]

elif grade == 11:

print ("Junior")

[If grade is 12, then level is senior]

elif grade == 12:

print ("Senior")

[All other inputs are invalid]

else:

print ("Invalid")

Other Questions
A Catapult throws a payload in a circle with an arm that is 65.0 cm long. At a certain instant, the arm is rotating at 8.0 rad/s and the angular speed is increasing at 40.0 rad/s2. For this instant, find the magnitude of the acceleration of the payload. Simplify b. 3a + 4b-2a-b4 V216 x18 HURRY PLEASE!!!! The night was loaded with omens. The grieving sky turned the little water to a dangerous metal and then the wind got up not the gusty, rabbity wind of the seacoasts I know but a great bursting sweep of wind with nothing to inhibit it for a thousand miles in any direction. Because it was a wind strange to me, and therefore mysterious, it set up mysterious responses in me.What is the purpose of the description in this passage from Travels with Charley?The author wants to show that he is a superstitious person.The author wants to provide a factual description of North Dakota.The author wants to persuade people to stay away from North Dakota.The author wants to explore human reactions to nature. What is the radius of the circle: x^2+y^2=41. -22. -43. 44. 2 At a point 25 ft. from the base of a totem pole, the angle of elevation of the top of the pole is 50.1 . How tall is the totem pole to the nearest foot? The rear wheels of a tractor are very wide. Why? How did the Battle of Saratoga affect the American Revolution? What is 240 : 60 in its simplest form Help asap!!!!!!A.B.C.D. b. Purchase this book. Do not delay. simple to complex sentence Think about a thermos bottle. It consists of an inner bottle with a shiny silver surface separated from an outer container by a space with no air. In what ways does it block conduction, convection, and radiation? Having term limits on Boards of Directors for companies forces firms to rotate leadership to get new ideas. It also creates this unintended consequence: one minute short speech on The joy of having a pet at home Given the latitudinal differences in sunlight intensity, how might you expect the carrying capacity of a plant species found at the equator to compare with that of a plant species found at high latitudes? Explain your answer Which best describes the claim of a compare and contrast paragraph? A French family flies from Paris, France to New York City where they have a brief layover before flying to Montreal, Canada. While in New York the family has a $25 dollar lunch at a hot dog stand near Time Square. How does this lunch contribute to U.S. GDP? a. U.S. GDP remains unchanged, but French GDP increases by 22 Euros ($25 U.S.). b. GDP decreases by $25 c. GDP increases by $25 d. GDP does not change since the family is not from the U.S. Determine the area of the triangle.67.7 square units777.2 square units135.5 square units5.9 square units Determine if a quadrilateral with the given vertices is an isosceles trapezoid. Show and explain all steps to prove or disprove.A(3, 3) B(5, 3) C(8,1) D(1,1) 1: YoA: eresB: sonC: esD: somos E: soy2: TA: eresB: sonC: esD: somos E: soy3: lA: eresB: sonC: esD: somos E: soy4: NosotrosA: eresB: sonC: esD: somos E: soy5: EllosA: eresB: sonC: esD: somos E: soy Increased skill with reading speed, accuracy, and appropriate expression will lead to better comprehension and fluency.TrueFalse