Answer:
Adrian requires a high speed internet connection and a codec player to download and run movie on his system.
Explanation:
There are some basic requirements of the computers that, can be used to watch the movie on the computer.
1. RAM
2. Storage space to store the movie
3. High Speed Internet: As the movie is on the internet, to download it from internet, bandwidth and speed of internet is required.
4. Video Codec Player is required to play a digital movie on laptop or system.
Answer: D
Explanation:
It is not A or C because the "d" in "Divide" is capitalized and the d is lowercase in calling the function. Therefore the answer is D (the last choice) because numA / numB (30 / 5) equals 6.
<u>Answer:</u>
I am writing <em>partial code in</em> <em>c++ to calculate weighted average</em>. The weighted average should be calculated based on multiplying the test score and its <em>respective weight and finally add all the test score.</em>
<u>Explanation:</u>
<em>int arrtestscore[100];</em>
<em>int arrweight[100];</em>
<em>int n;</em>
<em>double weightedavg;</em>
<em>cout<<”Enter the number of test score for which weighted average needs to be calculated”;</em>
<em>cin>>n;</em>
<em>for(int x = 0; x <n;x++)</em>
<em>{</em>
<em> cout<<”Enter test score :” + (x+1) ;</em>
<em> cin>>arrtestscore[x];</em>
<em> count<<”Enter the respective weight:”;</em>
<em> cin>>arrweight[x];</em>
<em>}</em>
<em>for (int i=0; i<n;i++)</em>
<em>{</em>
<em> weightedavg = weightedavg + (arrtestscore[i] * arrweight[i])</em>
<em>}</em>
<em>cout<<”weighted average = “ <<weightedavg; </em>
Answer:
The correct answer to the following question is Drive-by hacking
.
Explanation:
Drive-by hacking is the type of hacking which comes under the cyberterrorism.
Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.
Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.
the answer is true hope it helps