<span>
C. The net charge does not change. The charge remains neutral and thus,
polarization takes effect. Polarization simply means electrons and protons are separated into opposites. To best explain this, we can use a rubber balloon that has been rubbed against animal fur. Assume is has been negatively charged, bring it close to the object and make sure that these two do not touch. Electrons within the object will experience a repulsive force.
</span>
Since repulsion will be greatest for those
electrons nearest the balloon, many of them will be induced into moving away
from the rubber balloon. By default, electrons are free to move from atom to
atom and thus there will be a mass migration of balloons side of the object to
the opposite side of the object. <span>This will leave more atoms on the rubber
balloon’s side of the object with a shortage of electrons and will be
positively charged and vice versa. </span>Overall, the object will become
electrically neutral.
Answer:
visual effect
Explanation:
A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects.
<span>a computer that is used by more than one employee
A multi-tasking computer is </span><span>able to run more than one program</span>
Answer:
please sulto garera kichnu hola
Answer:
B
Explanation:
Stands for "Intrusion Prevention System." An IPS is a network security system designed to prevent malicious activity within a network. It is often used in combination with a network detection system (IDS) and may also be called an intrusion detection and prevention system (IDPS).
Like an IDS, an IPS may include hardware, software, or both. It may also be configured for a network or a single system. However, unlike IDSes, intrusion prevention systems are designed to prevent malicious activity, rather than simply detecting it.
When an IDS detects suspicious activity, such as numerous failed login attempts, it may log the IP address. If it detects a suspicious data transfer, it may check the packets against a database of known viruses to see if any any malicious code is being transferred. When an intrusion detected, an IDS compares the activity to a set of rules designed to prevent malicious activities from taking place. For example, when an IDS detects numerous failed logins, it may block the IP address from accessing any network devices. If it detects a virus, the data may be quarantined or deleted before it reaches its destination.
Examples of hardware-based IPSes include Cisco's IPS 4500 Series, IBM's Security Network "GX" systems, and HP's TippingPoint "NX" devices. Software IPS solutions include Check Point's IPS Software Blade and McAfee's Host Intrusion for Desktop.
-techterms.com