1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
3 years ago
13

Predict how digital video will be viewed in the future. Step into the year 2028. How are people viewing digital video? Or have w

e moved on to a completely new format? What do you think the movie going experience will be like? How about home video? Mobile communications? Tell us what the future of digital video holds.
Assignment Guidelines: Write at least 500 words using descriptive imagery and creative thinking in a thoughtful, organized essay. You must use at least two sources to back up your opinion and ideas and cite them.
Computers and Technology
2 answers:
Nostrana [21]3 years ago
4 0
<span>Google Glass was interesting; a personal screen overlaid onto the real world, with 'augmented reality' ideas. The Nintendo 3DS was the first 'no glasses' portable 3D system.

So I predict Google 3D Glasses with built in Dolby 9.1 sound emulation. </span>
Oliga [24]3 years ago
3 0
I feel that this will all change because of all the emerging technology that is evolving in just 2018. I think that all of the desktops will become more portable an have more features while the common laptop will do the same also and there will be even fewer people going out to shop at malls or clothing stores which means these local businesses will not be able to pay the rent or they will have to cut down on employment or even lower the hourly wage. this combined will snowball and be even worse by the year 2028. hope this helps
You might be interested in
Equity is proportional ownership in a firm. Which of the following is synonymous with Equity?
Andreas93 [3]
<span>A. Certificate of License</span>
8 0
2 years ago
Helpppppp
Advocard [28]

here's a good expiation

Explanation:

a good and cheap way to remove acne scars from your face is to put vasaline only on the scar. do this about 3 times a day and keep it on overnight as well. in a couple of days the scar will peel leaving a new layer of skin on the bottom. this layer will be scar free! make sure you dont put vasaline on your entire face.

8 0
2 years ago
A single digit of 1 or 0 in the binary code is called a _____________.
maksim [4K]
A single digit of 1 or 0 in the binary code is called a bit. It is the smallest possible unit of data for a computer. The only possible values for a bit is either zero or one. These values decide which paths the current can flow and which paths are blocked. Bits can represent two states namely, true and false or low and high.
5 0
3 years ago
What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack
grigory [225]

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

6 0
3 years ago
Which part of a plant is responsible for reproduction? answers:
galina1969 [7]

Answer:

the flower

Explanation:

5 0
3 years ago
Other questions:
  • Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping
    11·1 answer
  • To insert notes into a worksheet, insert ________ in cells.
    15·1 answer
  • Pre-Test
    8·1 answer
  • Write a C++ program that determines if a given string is a palindrome. A palindrome is a word or phrase that reads the same back
    6·1 answer
  • Adding _____ will allow the user to create text as it will often appear in publications with multiple articles, such as a newspa
    13·2 answers
  • Define the missing method. licenseNum is created as: (100000 * customID) licenseYear, where customID is a method parameter. Samp
    14·2 answers
  • What are registers in ICT used for?
    5·1 answer
  • What type of activities are performed with the help of the software used in hospitals?
    7·2 answers
  • Describe how a black and white image could be represented in binary
    11·2 answers
  • What is a computer please tell me ​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!