def computeGrade(float grade, str a){
a = "A" if a > 0.9 else a = "B" if a > 0.8 else "C"
return a;
}
print(a)
Answer:
A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology
Explanation:
Answer:
7 bytes
Explanation:
<u>2 Address Instruction</u>
The 2 address instruction consist 3 components in the format.
One is opcode,other two are addresses of destination and source.
<u>Example-</u>
load b,c | Opcode destination address,source address
add a,d | Opcode destination address,source address
sub c,f | Opcode destination address,source address
Opcode consists of 1 bytes whereas destination address and source address consist of 3 bytes each.
(1+3+3) bytes=7 bytes
Answer:
modulator
Explanation:
A modulator is a device that performs modulation.
(Single conversation)