Answer:
Name of Operating System: Ubuntu
Five legal file names:
inventory.txt
total.txt
NIKKAH.txt
Defaulter.txt
studenT.txt
Five illegal file names:
wel/come.txt
..
MY>note.txt
.
my<work.yxt
Explanation:
To fix the illegal name:
1. Remove the special character, so it becomes welcome.txt
2. Remove the double dot and rename using text characters
3. Remove the special character, so it becomes MYnote.txt
4. A file cannot be named using dot. So we rename to a textual name
5. Remove the special character, so it becomes mywork.txt
Some additional rule for naming of files legally in Unix is that, you cannot use a reserved word to name your file. Starting a file name with number is allowed. Starting a file name with dot make the file to be hidden.
That is actually true. In order to format the font, margins and alignment of a form you need to s<span>elect the control that you want to format, then right-click the selection, and then click Format Control. What you do next is that on the Font tab you select the font type, font style, font size, other formatting options for the selected text and in order to finish to press ok </span>
The answer is a POST Diagnostic Card.
Although not a necessity, a POST card can help discover and report computer errors and conflicts that occur when you first turn on a computer and before the operating system. To be able to understand how a POST card works, one needs to be very familiar with the BIOS. The power-on self test (POST) is a series of various tests performed by a computer when you turn it on. If you have any issues that conflicts with the operating system and prevents the computer from booting, you can install a POST card in the available expansion slots. This card will monitor the entire boot process and report errors in coded numbers on a small LED panel on the card.
Answer: Software
Explanation:
Security certificate is defined as the assurance that maintain authenticity and intactness of a website or different sites.It is present in small sized data filed that establishes encryption and validation through verification of owner's identity.
- As per the suggestion of Webmaster, who takes care of web-pages and web-servers , security certificate should be purchased to verify the transmission of message with encryption.
- Certificate in this case will be acting as software for providing security and operations to the websites.