answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
1 year ago
8

Consider a DASH system for which there are N video versions (at N different rates and qualities) and N audio versions (at N diff

erent rates and qualities). Suppose we want to allow the player to choose at any time any of the N video versions and any of the N audio versions. a. If we create files so that the audio is mixed in with the video, so server sends only one media stream at given time, how many files will the server need to store (each a different URL)? b. If the server instead sends the audio and video streams separately and has the client synchronize the streams, how many files will the server need to store?
Computers and Technology
1 answer:
Ksju [112]1 year ago
5 0

Answer: a) N² files. b) 2N files.

Explanation:

If an user can choose freely both the video and the audio quality, if they are stored separately, but the user can download any mix of them as a single file, the server must store one audio version for each video version, so it will need to store NxN = N² files.

If, instead, the server can send the audio and video streams separately, so the user can choose one of the N videos available, and one of the N audio versions, the server will need to store only N video files + N audio audio files, i.e. , 2 N files.

You might be interested in
Have you ever tried to teach a class full of restless, active sixth-graders? I have. I taught sixth-grade students for 12 years.
Illusion [34]

1.the average class size at Harbor Elementary School is 32.    

2.The National Education Association recommends a class size of 23.

3. She taught sixth-grade students for 12 years.

Hope this helps:)

5 0
1 year ago
Arrays are described as immutable because they are two dimensional. are arranged sequentially. can be reordered. cannot be chang
Vlada [557]

Answer:

Arrays are described as immutable because they cannot be changed once they are defined.  (D on Edge)

Explanation:

It's in the notes and I just took the test (2020)

6 0
2 years ago
Design a BCD-to-Gray code decoder. Your decoder will have 4 inputs: A, B, C and D, representing a 4-bit BCD code (A being the MS
ra1l [238]

Answer:

Binary to Gray Code Converter

The logical circuit which converts the binary code to equivalent gray code is known as binary to gray code converter. An n-bit gray code can be obtained by reflecting an n-1 bit code about an axis after 2n-1 rows and putting the MSB (Most Significant Bit) of 0 above the axis and the MSB of 1 below the axis.

The 4 bit binary to gray code conversion table is given in attached file.

3 0
1 year ago
Read 2 more answers
In a situation where handicapped person can only input data into the computer using a stylus or light pen, which keyboard config
asambeis [7]
I think the best one is voice recognition keyboards.


Would perfect work there



Mark as brainliest
8 0
1 year ago
Read 2 more answers
You’re responsible for an always-on VPN connection for your company and have been told that it must utilize the most secure mode
liq [111]

Answer:

Tunneling

Explanation:

A networking protocol that is used to send data from one network to another network by encapsulation process.

It is the more secured method as it secures the data with the help of encapsulation process. Rest of the protocols are not helpful in security of data.

8 0
1 year ago
Other questions:
  • Computer design software requires __________________ to be used properly and successfully by architects.
    9·2 answers
  • How frequently should computers containing ehr information be backed up?
    14·1 answer
  • Open this link after reading about Ana's situation. Complete each sentence using the drop-downs. Ana would need a minimum of ato
    5·2 answers
  • Jane's organization recently experienced a security incident that occurred when malware set to trigger on the chief executive of
    13·1 answer
  • Initialize the list short_names with strings 'Gus', 'Bob', and 'Zoe'. Sample output for the givenprogram:Gus Bob Zoeshort_names
    13·1 answer
  • What level of fault is the following example: North Lake Hospital followed all of the HIPAA policies and procedures for securing
    12·2 answers
  • Timing circuits are a crucial component of VLSI chips. Here’s a simple model of such a timing circuit. Consider a complete balan
    10·1 answer
  • Define a method named roleOf that takes the name of an actor as an argument and returns that actor's role. If the actor is not i
    8·1 answer
  • The geographic coordinate system is used to represent any location on Earth as a combination of latitude and longitude values. T
    5·1 answer
  • Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!