Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.
Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.
False. I think the $ sign is used for that. e.g. $A$4.
Carbon retains heat in the atmosphere. It is a greenhouse gas and is linked to global warming.
Answer:
An SSH server needs to be installed on the remote machine.
Explanation:
An SSH server is what establishes a command line interface remotely, this will allow the remote machine to communicate with the laptop and allow an terminal interface to be used to enter commands and such. An example of an SSH server is OpenSSH Daemon (sshd).