What is the required disk storage capacity

Assignment Help Basic Computer Science
Reference no: EM133398597

Assignment:

You are building a hotel with 100 rooms. Each room is to have a video-on-demand television that displays movies in HDTV resolution of 1920 X 1080 pixels at 30 frames/s. If each pixel is 24 bits and you can compress video data by a factor of 100, determine the following.

a. What is the maximum bit rate that can be demanded if you assume that, in the worst case, 70% of the rooms will be watching television?

b. What is the required disk storage capacity if the hotel provides 250 movies on demand, each lasting on average 90 minutes?

c. When a viewer selects a new movie, the server is interrupted and an appropriate routine is executed. The switching routine is composed of approximately 15,000 instructions that take approximately one cycle/instruction on a processor running at 4 GHz. If a user can cope with a latency of 80 ms (i.e., a delay in the data stream of less than 80 ms is not visually disturbing), how many simultaneous switch-overs can the system handle at any instant?

Please add an explanation I have been getting different answers from everyone I have asked.

Reference no: EM133398597

Questions Cloud

Explain how well-known off-the-shelf exploits : Also discuss and evaluate the issues of detection techniques used to detect off-the-shelf exploits and their bypasses.
Define moores law : Predict a possible technological advancement that might happen in the development of computers in the next ten years. Define Moore's Law.
How do you reference contextual help on a specific keyword : Looking at the Solution Explorer, how are projects organized? How do you reference contextual help on a specific keyword?
Explain the key generation and encryption : Explain the Key Generation ("KeyGen"), Encryption ("Enc") and Decryption ("Dec") procedures of the textbook RSA encryption scheme.
What is the required disk storage capacity : What is the required disk storage capacity if the hotel provides 250 movies on demand, each lasting on average 90 minutes?
What are the network number : What are the network number, subnet number, and host number for the address 192.228.17.57 and the mask 255.255.255.224?
Discuss the role of dns in networking : How can the following commands help troubleshoot network connectivity issues? PING, ARP and NSLOOKUP commands.
Discuss relational database terminology : Discuss relational database terminology (table, tuple, constraints, relationship, especially the various keys).
Compare c++ vs java : Compare and contrast the positives and negatives when using C++ or Java specifically when dealing-with Performance issues when using concurrency.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Right To Privacy And Compliance Regulations

The United States has a number of privacy laws that affect the government's use of information as well as the use of information by specific industries,

  Define what constitutes secure posture

Define what constitutes a secure posture and how it helps in understanding the importance of having a good defense and attack strategy.

  Positive two-digit monotonic integers

If each digit in an integer is greater than the digit to theleft, the integer is said to be "monotonic". For example,12 is a monotonic integer since 2 > 1. How many positive two-digit monotonic integers are there?

  Find concept and technique relating to security information

Information Security Assignment 01 - Information Security Mapping Case Study Semester 01, 2017 Details: Title: Information Security Assignment 1 Due Date.

  Packet filtering firewalls

Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they should choose the firewall you are selling.

  Command line arguments in crossword

In this question you will create a simple command line program which will help solve these problems.

  Resource curse and failed development

Explain why oil wealth in Nigeria is seen as an example of a "resource curse" and "failed development".

  What is access control

What is access control? How do cyber operators like you manage their users' access to company resources?

  Penetration testing is simulated cyberattack

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities.

  Why are two types of legal systems in the united states

Explain why there are two types of legal systems in the United States: State and Federal systems. How are they similar and how are they different?

  Why fitting a linear model to given data might be misleading

HDI Revisited. The United Nations Development Programme (UNDP) uses the Human Development Index (HDI) in an attempt to summarize in one number the progress.

  Thirteen common mistakes in dashboard design

Few (2006) lists thirteen common mistakes in dashboard design. List, explain and provide an example of each of these.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd