1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
3 years ago
13

Predict how digital video will be viewed in the future. Step into the year 2028. How are people viewing digital video? Or have w

e moved on to a completely new format? What do you think the movie going experience will be like? How about home video? Mobile communications? Tell us what the future of digital video holds.
Assignment Guidelines: Write at least 500 words using descriptive imagery and creative thinking in a thoughtful, organized essay. You must use at least two sources to back up your opinion and ideas and cite them.
Computers and Technology
2 answers:
Nostrana [21]3 years ago
4 0
<span>Google Glass was interesting; a personal screen overlaid onto the real world, with 'augmented reality' ideas. The Nintendo 3DS was the first 'no glasses' portable 3D system.

So I predict Google 3D Glasses with built in Dolby 9.1 sound emulation. </span>
Oliga [24]3 years ago
3 0
I feel that this will all change because of all the emerging technology that is evolving in just 2018. I think that all of the desktops will become more portable an have more features while the common laptop will do the same also and there will be even fewer people going out to shop at malls or clothing stores which means these local businesses will not be able to pay the rent or they will have to cut down on employment or even lower the hourly wage. this combined will snowball and be even worse by the year 2028. hope this helps
You might be interested in
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
Calculate the maximal size of a file if we have:
ollegr [7]

Answer:

4 GB

Explanation:

<u>Determine the maximal size of a file </u>

100 direct block address

= 100 * 1024 = 102400

One single indirect block address

= 128 * 1024 = 131072

One double indirect block address

= 128 * 128 * 1024 = 16777216

one triple indirect block address

=  128 * 128 * 128 * 1024 = 2147483648

one quadruple indirect block addresses

=  128 * 128 * 128 * 128 * 1024 = 274877906944

maximal size of the file

= ∑ 102400 +  131072 + 16777216 + 2147483648 + 274877906944

= 4GB

7 0
3 years ago
The use of computers in education is referred to as computer assisted instruction (CAI). Write a program that will help an eleme
dybincka [34]
I don't think some will write the whole program here, but which part are you having trouble with?
6 0
3 years ago
Calls to the tostring( ) method emphasize the use of ____.
DaniilM [7]
<span>Polymorphic message
   
Methods in different classes with a similar function are given the same name. - Makes classes easier to use because programmers need to remember fewer method names. - Employed as much as possible. - Polymorphic message ex. is the toString method.</span>
5 0
3 years ago
What does a network backbone do? allows data to be delivered more quickly and efficiently makes data transfer from the cloud mor
Musya8 [376]

Answer:

A network backbone connects multiple networks together, allowing them to communicate with each other.

5 0
3 years ago
Read 2 more answers
Other questions:
  • WILL GIVE BRAINLIEST! A rent payment is an example of which type of expense?
    14·2 answers
  • What error, if any, is in the following code?
    11·1 answer
  • If we have a priority queue storing approximately million numbers, and the bottom level is "full", which of the following statem
    9·1 answer
  • Are the actions legal or illegal?
    13·1 answer
  • Next, Leah wants to add a content slide that allows her to insert a table.
    8·2 answers
  • How do you create a formula in excel​
    10·1 answer
  • Create a program that calculates the tip and total for a meal at a restaurant. Type the code into an IDLE IDE editor window and
    5·1 answer
  • Reading (BCK FORM 2C IT 2020-2021)
    12·2 answers
  • What is the benefit of hosting a website on a personali
    6·1 answer
  • Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advanta
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!