Browse Definitions :
File Extension

M4A File Format

Unprotected AAC audio file

M4A file format icon

M4A is a file extension for an audio file encoded with advanced audio coding (AAC) which is a lossy compression. M4A was generally intended as the successor to MP3, which had not been originally designed for audio only but was layer III in an MPEG 1 or 2 video files. M4A stands for MPEG 4 Audio.

Both M4A and MP3 file extensions are used for audio-only files. Audio-only MPEG 4 container files usually have an M4A file extension. M4A files are unprotected. Protected files usually have an M4P file extension.

AAC or M4A file quality is better and file sizes smaller compared to MP3 files. M4A files sound better than MP3 files when encoded at the same bit rate due to some of the enhancements made to the format such as:

  • Compression based on perception -- if it is not within human perception, that sound data may be lost without notable effect to quality.
  • Smaller sample block size of 120 or 128 samples rather than 192 for changing (or transient) signals, allowing for more precise details where they are needed.
  • Larger block sizes in stationary signals, 1024 or 960 vs MP3's 576 sample blocks, allowing for less data to represent a portion of the music that does not have the same complexity.

Programs that open M4A files include iTunes, Quicktime, Windows Media Player, and Roxio Popcorn, Toast and Creator. Some media players will only play the format when renamed to MP4.

 

Learn more about M4A-related files:

Andoni Oconchubhair defines MPEG standards at Search SOA

Look for answers to M4A-related questions on IT Knowledge Exchange.

Visit the MPEG webpage.

This was last updated in August 2010

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • denial-of-service attack

    A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to ...

  • information security (infosec)

    Information security, often shortened to infosec, is the practice, policies and principles to protect data and other kinds of ...

  • user authentication

    User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close