Browse Definitions :
File Extension

M4A File Format

Unprotected AAC audio file

M4A file format icon

M4A is a file extension for an audio file encoded with advanced audio coding (AAC) which is a lossy compression. M4A was generally intended as the successor to MP3, which had not been originally designed for audio only but was layer III in an MPEG 1 or 2 video files. M4A stands for MPEG 4 Audio.

Both M4A and MP3 file extensions are used for audio-only files. Audio-only MPEG 4 container files usually have an M4A file extension. M4A files are unprotected. Protected files usually have an M4P file extension.

AAC or M4A file quality is better and file sizes smaller compared to MP3 files. M4A files sound better than MP3 files when encoded at the same bit rate due to some of the enhancements made to the format such as:

  • Compression based on perception -- if it is not within human perception, that sound data may be lost without notable effect to quality.
  • Smaller sample block size of 120 or 128 samples rather than 192 for changing (or transient) signals, allowing for more precise details where they are needed.
  • Larger block sizes in stationary signals, 1024 or 960 vs MP3's 576 sample blocks, allowing for less data to represent a portion of the music that does not have the same complexity.

Programs that open M4A files include iTunes, Quicktime, Windows Media Player, and Roxio Popcorn, Toast and Creator. Some media players will only play the format when renamed to MP4.

 

Learn more about M4A-related files:

Andoni Oconchubhair defines MPEG standards at Search SOA

Look for answers to M4A-related questions on IT Knowledge Exchange.

Visit the MPEG webpage.

This was last updated in August 2010

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close