Answer: Conventions
Explanation: Convention is the writing activity with the components like punctuation,grammar,symbols,note etc to make the written content understandable and clear. This feature is used because people can understand the meaning of content read by them without initializing it later.
As soon as the reader finishing the reading the information should be clear in his/her mind so that they don't have to figure it out after reading.Convention enhances the value of reading and learning by it's feature .
Answer.
1.Surge protection board
2.Uninterrupted Power Supply (UPS)
Explanation
A surge protection board is designed to protect equipment against a power surge or over voltage in power supply.A UPS provides back up power in occasions of power outage.In most events of power cut,UPS units only allow a person to save the work and perform a controlled shutting down of a computer.
Answer:
d. all of the above
Explanation:
Google filetype operator enables restricting the search results to the specified file type. For example if you are searching for Eiffel Tower and you want to restrict the results to pdf files then the query will be of the form Eiffel Tower filetype:pdf . Similarly for text file results you need to specify the search query as Eiffel Tower filetype:text. The Google filetype operator supports several different file types.
Answer:
1. Sniffing.
2. Sequence number.
3. Phishing.
4. Null session.
Explanation:
1. Sniffing is a situation where someone examines all the network traffic that passes their NIC, whether addressed for them or not.
2. A sequence number is a 32-bit number established by the host that is incremented for each packet sent. It can be used by a computer administrator or network engineer to reorder packets.
3. Phishing is the use of fraudulent e-mails or instant messages that appear to be genuine but are designed to trick users. Informations such as password, credit card details and other personal information can be gotten by an attacker through this process.
4. A null session is a connection to a Windows interprocess communications share (IPC$). A hacker can use a null session to gain unauthorized access to informations such as security settings, registry settings, username (User ID) about an end user.