Answer:
#include <iostream>
#include <time.h>
#include <string>
using namespace std;
int main(){
srand(time(NULL));
cout<<"Throw dice"<<endl;
int b =0;
int a=0;
a=rand()%6;
b=rand()%6;
for (int i =0;i<1;i++)
{cout<<"dice one: "<<a<<endl;}
for (int i =0;i<1;i++)
{cout<<"dice two: "<<b<<endl;}
if(a>b)
{cout<<"first dice won"<<endl;}
if(b>a)
{cout<<"second dice won"<<endl;}
else{cout<<"they are same"<<endl;
return main();
}
return 0;
}
Explanation:
/*best dice roll game just for you change it as you want but all necessary things are there/*
Hello.
The benefits of using presentations to organize and deliver information are: it keeps things in order, keeps peoples attention longer, and it looks more professional.
Answer:
In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u> by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u> filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u> exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.
Answer:
a) bytes
b) hertz
c) 1) hertz and 2) bytes
Explanation:
A byte is the basic unit of information and data stored in a computer storage. Hence, the storage capability of a drive will be measured in Bytes. On the other hand speed of processor is measured in terms of number of cycles made per second i.e hertz. Hence, the higher the value of hertz the higher is the speed of the computer.
step by step
1. Open the Disk Cleanup by clicking Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. Disk Cleanup will then calculate how much space you will be able to free on your hard drive.
2.Select the files by clicking the check box that you would like to delete (e.g. Downloaded Program Files and Temporary Internet Files) and click OK
3. Click Yes to confirm performing these actions.
To read the description of the particular program file, click the appropriate file and the file description is displayed at the bottom. If you want view the files on the particular program file (e.g. Downloaded Program Files and Temporary Internet Files), click View Files.
4. Click More Options tab to free up more space on Windows components, installed programs or System Restore. Click Clean up