Answer:
Superscript or Subscript
Explanation:
The superscript or the subscript is a type of character which is set a little lower or more than the normal line of type. And it is generally small as compared to the other texts. The subscript does appear at or less than the baseline, and the superscript is above. And for the superscript, you need to press the Ctrl + Shift + + ( press and at the same time also hold the Ctrl and the Shift, and finally press the +). And for the subscript, you need to press the Ctrl + Shift ++(Press and at the same time also hold the Ctrl. and finally press the =). And pressing the corresponding shortcut once again, you will be back to the normal text.
Answer: Triangle
Explanation: Triangle has Tri
Answer:
<u>Advantages of wireless communication:-</u>
- Flexibility in transferring the message through communication for which the sender and receiver can be in any place.
- Speed of the communication is accurate and fast
- Due to no wiring , the cost of the wireless communication is less.
<u>Disadvantages of wireless communication:-</u>
- The security is less as the data can be accessed by unauthorized sources at times.
- The setting up of wireless communication complex and expensive.
<u>Advantages of wired communication:-</u>
- Simple configuration
- Higher bandwidth is present in the cable
- High reliability
<u>Disadvantages of wired communication:-</u>
- Mobility is present for communication
- Installation requires lot of time due to cabling
- Requires extra devices for covering large areas for communication
Wireless communication is more preferable than wired communication in the conditions like communication connection that should face low damage and longer life which is not present in cable connection as they break or get disrupted.The flexibility of moving while communication is required by most people so, they use wireless communication .
Answer:
b. white-hat hacker
Explanation:
A White-hat Hacker, also known as an Ethical Hacker is an information security specialist, known for performing penetration testing and checks in search for information and communications system's vulnerabilities on demand for his/her clients.
These efforts are meant to find security risks before someone else does, who could cause any kind of damage to the systems or unauthorized access to sensitive information
B. Integer I think that’s the answer