To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuations, an <u>uninterruptible power supply (UPS)</u>, which contains a built-in battery, can be used.
<u>Explanation</u>:
An uninterruptible power supply (UPS) is a device that allows a computer or server powered up for a short time, when the electricity goes off. UPS device also provides uninterrupted service during power fluctuation.
A battery is inbuilt in the UPS and provides power for few minutes to the computer to shut down it in a proper manner.
UPS is available at affordable cost and can be maintained at low cost compared to generators.
Answer: • Ensure that the video card is compatible with the expansion slot
• Install video drivers from CD and then install updated drivers from the internet
• Configure the PC to use the integrated graphics if available and needed
Explanation
Your question isn't complete as you didn't put the options but I got the options online and the correct answers have been provided.
The installation and configuration for the high-end video card suitable for gaming will include:
• Ensure that the video card is compatible with the expansion slot
• Install video drivers from CD and then install updated drivers from the internet
• Configure the PC to use the integrated graphics if available and needed
Answer:
This is because the key in relationships['jimmy'] is wrong. The first letter "j" should be uppercase. The key in the given dictionary is "Jimmy" and therefore a lowercase "j" will result in a KeyError exception. The key is case sensitive and therefore a minor mistake in a single letter either in lowercase or uppercase will cause the error. The correct usage of key to address the value should be relationships["Jimmy"].
Answer:
MAN IN THE MIDDLE
Explanation:
Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.
A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.
In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.