1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GuDViN [60]
1 year ago
6

ABC Manufacturing Company is located in Hiroshima, Japan. Being prone to earthquakes, the company decided to implement a backup

of their data on a Singapore server. The IT administrator contacted you to identify the optimal command interface protocol for this backup. Which command interface protocol should you advise?
Computers and Technology
1 answer:
maxonik [38]1 year ago
7 0

The command interface protocol that I would suggest to the IT administrator is Secure Shell (SSH).

<h3>What is a command interface protocol?</h3>

A command interface protocol can be defined as a standard protocol that is designed and developed to processes commands in the form of lines of text to a software program that is installed on a computer system.

<h3>The types of command interface protocol.</h3>

In Computer technology, there are different types of command interface protocol and these include:

  • SSL
  • TLS
  • SSH

SSH is an acronym for Secure Shell and it is a standard network protocol that gives a IT administrator a secure way to access data over an unsecured network, especially when backing up data.

Read more on SSH here: brainly.com/question/17147683

You might be interested in
Jaboooo helloooo are u there
Fed [463]
?????????????????????
8 0
3 years ago
Read 2 more answers
Windows server 2012 r2 supports two types of folder shares. what are those two types?
larisa [96]
<span>Windows server 2012 r2 supports the following two types of folder shares: </span>Network File System and Server Message Blocks. Correct answer: D
Network File System<span> (</span>NFS) is a distributed file system protocol for <span>storing and updating files on a remote computer. </span>
The Server Message Block<span> (SMB) Protocol is a </span>network file sharing protocol.
7 0
3 years ago
Write a program that will read in a line of text and output the number of words in the line and the number of occurrences of eac
kherson [118]

Answer:

Here is the C++ program:

#include<iostream>  //to use input output functions

#include <algorithm>  //to use tolower() function

using namespace std;  //to identify objects like cin cout

int main() {  //start of main function

 string text;  // to hold text input

 cout<<"Enter a line of text: ";  // prompts user to enter a string

 getline(cin,text);  // reads the input string (text) from user

transform(text.begin(), text.end(), text.begin(), ::tolower);  //converts the text into lower case

 int letter[26] = {0}; //to hold the letters

 int i;  // used as a loop variable

 int words=0;  // to hold the count of words

 for(i = 0; i< text.size();i++){  // iterates through the text

 if(isalpha(text[i])&&(text[i+1]=='.'||text[i+1]==','||text[i+1]==' '))  //checks if the character at i-th index of text is a letter, and checks if i+1 index position of text is a period, comma or a space

 words++;  // adds 1 to the count of words

 if(isalpha(text[i]))  // if the character at the i-th index of text is a letter

 letter[text[i]-'a']++;  }  // counts the occurrences of each letter

 char j = text[text.size()-1];  // sets j to the last character of text

 if(j != '.' && j!= ' '&& j!=',' &&j!= '\0')  //if the last character is not a period or empty space  or comma or end of lone

 words++;  //add 1 to the count of words

 cout<<"Number of words: "<<words<<endl;  //display the number of words in the text

 for(i=0; i<26; i++)  {  //iterates 25 times

   if(letter[i]>0)  //if letter at index i is greater than 0

   cout<<(char)('a'+i)<<" : "<<letter[i]<<endl;  }} //displays each letters and its number of occurrences in the text

 

Explanation:

The program is explained in the attached document with an example.

7 0
3 years ago
Security is essential to keep in mind when doing business online. Select three tips for keeping customers' private
zlopas [31]
Make sure credit card processing uses a digital certificate to verify the processing site
5 0
2 years ago
Expliquer les règles à respecter quand on fait une recherche sur internet.
Illusion [34]

Answer:

Explanation:

Step one

We must analyze all the possibilities like tools, search engines, and what kind of information we need.

Step two

We must administrate keywords, we can make a keywords research or hire a SEO expert.

Step three

We must study the first search and do notes about it, and get the first data.

Step forth

We can start with the entire research on the internet, we must visit several sites and levels surfing.

8 0
3 years ago
Other questions:
  • The IT person most involved with system development is the _________
    14·1 answer
  • A method's name and parameter list constitute the method's ____.
    13·1 answer
  • jason works for a restaurant that serves only organic local produced what trend is this business following?
    6·2 answers
  • A package that includes hardware, software, and support from a single vendor is called a(n ____ package.
    6·1 answer
  • Coordinate with
    12·1 answer
  • Why is there no ide length or timing for study breaks?​
    12·1 answer
  • What would the following program print to the screen when run?
    7·1 answer
  • Describe your previous personal or professional experience with Microsoft Word.
    9·1 answer
  • In java I need help on this specific code for this lab.
    5·1 answer
  • Write 3 3 advantage and disadvantage of computer​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!