Answer: The following code is in c++
#include <iostream>
#include<math.h>
using namespace std;
int main()
{
float a,b,c;
cout<<"Enter height and base of triangle\n";
cin>>a>>b; //reading two sides from user
c=sqrt(pow(a,2)+pow(b,2)); //calculating hypotenuse
cout<<"Length of hypotenuse is "<<c; //printing third side of triangle
return 0;
}
OUTPUT :
Enter height and base of triangle
3
4
Length of hypotenuse is 5
Explanation:
In the above code, three variables a, b and c of int type are declared. After that, it is asked from user to enter the value of a and b. The user puts the value and then c is calculated with the help of Pythagoras theorem formulae which squares the values of two sides and then adds them to calculate hypotenuse of a right angled triangle and finally c is printed to console.
Answer:
B. SSD
Explanation:
VMs or virtual machines are virtually created environment for multiple operating system on a host operating system. The host operating system has an extension called Hyper-V. The hyper-V manager helps to manage the virtual machine's activities.
The VMs can hold applications in their respective containers, which requires a partition of the storage. So when more VMs are configured, more storage memory is required to store their individual data. The VMs in a computer system can share a network interface card.
Answer:
TRUE
Explanation:
A rootkit is a collection of computer software, typically malicious, that is designed to grant an unauthorized user access to a computer or certain programs. Once a rootkit is installed, it is easy to mask its presence, so an attacker can maintain privileged access while remaining undetected.
Rootkit detection is difficult because a rootkit maybe able to subvert the software that is intended to find it.
Rootkits work by using a process called modification (the changing of user account permissions and security).
Rootkits are not malware themselves, but rather a process used to deploy malware on a target.
Therefore, it is TRUE that a rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a PC without the knowledge or consent of a user.
Answer:
Selecting the Tiled windows arrangement option places the windows in a(n) Grid pattern on the screen.
Explanation:
Answer:
vxxgxfufjdfhgffghgfghgffh