Answer:
Explanation:
It knows how to remember data and where to find that data. In other words, it knows how the raw memory works. (RAM).
It understands how to make a program run within the confines of its logical steps in an order that makes the program work the way the user intends.
It can be made to display short cuts, or any icon or picture (not an obvious talent).
It can search for unwanted intruders like ads or viruses.
It can can time events even to the point of getting your coffee ready for you with the proper add on.
Answer:
#include <iostream>
using namespace std;
int main() {
int a[4][5];//declaring a matrix of 4 rows and 5 columns.
for(int i=0;i<4;i++)
{
for(int j=0;j<5;j++)
{
if(i==3)//initializing last row as 0.
{
a[i][j]=0;
}
else//initializing last row as 1.
{
a[i][j]=1;
}
}
}
for(int i=0;i<4;i++)
{
for(int j=0;j<5;j++)
cout<<a[i][j]<<" ";//printing the matrix.
cout<<endl;
}
return 0;
}
Output:-
1 1 1 1 1
1 1 1 1 1
1 1 1 1 1
0 0 0 0 0
Explanation:
I have created a matrix of size 4 rows and 5 columns.I have used for loops to fill the array.To fill the last row with 0 i have used if statement.else we are filling it with 1.
Businesses that conduct telemarketing are required to access the Do-Not-Call Registry every 31 days in order to maintain an updated database of people.
<h3>What telemarketing firms do?</h3>
The act of telemarketing is known to be the act talking to potential or existing customers through the use of a telephone.
Conclusively, Note that Telemarketing can help a business firm to promote or boast their products or services, make their customer database stronger, bring about a lot of leads and appointments and others.
Learn more about telemarketing from
brainly.com/question/25974538
Authentication protocols are usually designed and configured to create a number that will be used only once, so as to prevent replay attacks in a computer network. Thus, this number is called a <u>nonce</u>.
Authentication work based on the principle of strategically matching an incoming request from an end user or electronic device to a set of uniquely defined credentials.
In an access control list (ACL), authentication and authorization is used to ensure an end user is truly who he or she claims to be, as well as confirming that an electronic device is valid through the process of verification.
In Cybersecurity, authentication protocols are usually designed and configured to create a nonce, which can be used only once, so as to prevent replay attacks in a computer network.
In conclusion, a nonce is used prevent replay attacks in a computer network because the number created by an authentication protocol can be used only once.
Read more: brainly.com/question/17307459
Answer:
#include<stdio.h>
#include<stdlib.h>
int main(void){
int seedval;
scanf ("%d", &seedval);
srand(seedval);
printf("%d\n", rand()%10);
printf("%d\n", rand()%10);
return 0;
}
Explanation:
The given code is poorly formatted. So, I picked what is usable from the code to write the following lines of code:
#include<stdio.h>
#include<stdlib.h>
int main(void){
This line declares seedval as integer
int seedval;
This line gets user input for seedval
scanf ("%d", &seedval);
This line calls the srand function to generate random numbers
srand(seedval);
This prints a random number between 0 and 9
printf("%d\n", rand()%10);
This also prints a random number between 0 and 9
printf("%d\n", rand()%10);
return 0;
}