1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
2 years ago
7

Sftp uses which mechanism to provide security for authentication and data transfer?

Computers and Technology
1 answer:
12345 [234]2 years ago
3 0

Sftp uses SSH mechanism to provide security for authentication and data transfer.

<h3>What are SSH known for?</h3>

SSH or Secure Shell is known to be a kind of a network communication protocol that helps two computers to be able to communicate and also  share their data.

Therefore, one can say that Sftp uses SSH mechanism to provide security for authentication and data transfer.

Learn more about  SSH mechanism from

brainly.com/question/13086077

#SPJ12

You might be interested in
PLS HELP ME!! WILL GIVE BRAINLIEST
Doss [256]
B i think sorry if I’m wrong
5 0
3 years ago
Read 2 more answers
Max magnitude Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the
Ira Lisetskai [31]

Answer:

The java program is as follows.

import java.lang.*;

public class Numbers

{

   //variables to hold two numbers

   static int num1=-8, num2=-2;

   //method to return integer with higher magnitude

   public static int maxMagnitude(int userVal1, int userVal2)

   {

       if(Math.abs(userVal1) > Math.abs(userVal2))

           return userVal1;

       else    

           return userVal2;

   }

public static void main(String[] args) {

    int max = maxMagnitude(num1, num2);

 System.out.println("The number with higher magnitude among "+num1+ " and "+num2+ " is "+max);

}

}

OUTPUT

The number with higher magnitude among -8 and -2 is -8

Explanation:

1. Two integer variables are declared to hold the two numbers. The variables are declared at class level (outside main()) and declared static.

2. The variables are initialized with any random value.

3. The method, maxMagnitude(), takes the two integer parameters and returns the number with higher magnitude. Hence, return type of the method is int.

public static int maxMagnitude(int userVal1, int userVal2)

4. This method finds the number with higher magnitude using the Math.abs() method inside if-else statement.

               if(Math.abs(userVal1) > Math.abs(userVal2))

                   return userVal1;

        else    

                   return userVal2;

5. Inside main(), the method, maxMagnitude(), is called. This method takes the two variables as input parameters.

6. The integer returned by the method, maxMagnitude() is assigned to a local integer variable, max, as shown.

      int max = maxMagnitude(num1, num2);

7. The result is displayed to the user as shown.

System.out.println("The number with higher magnitude among "+num1+ " and "+num2+ " is "+max);

8. The class variables and the method, maxMagnitude(), are declared static so that they can be used and called inside main().

9. The variable, max, is called local variable since it can be used only within the main() where it is declared. It is not declared static.

10. The class is declared public since it has the main() method and execution begins with main().

11. The program is saved with the same name as the name of the public class having main(). In this case, the program is saved as Numbers.java.

12. No user input is taken for the two input parameter values. The static variables can be assigned any integer value and the program can be tested accordingly.

8 0
3 years ago
Jasmine is writing a shopping app. She has created a variable to keep track of the number of items in the shopping cart. Everyti
Gemiola [76]

Answer:

b. cart total + 1

Explanation:

A. cart total=1 do increment the total with every 1 click here, it only 're-assigns cart total with value 1 for every click, hence it's always 1.

B. In every click, 1 is always added to the previous value of cart total, like addItemButton(cart total+1) or so.

C. This would have worked too if "cart total" and "cartTotal" where of same type.

D. cart total is just being initially defined here.

E. Likewise here, var shows that cart total has just only been declared.

6 0
3 years ago
What is the difference between a master device in a Bluetooth network and a base station in an 802.11 network?
spayn [35]

Answer:

In an 802.11, a master device in a bluetooth network organize themselves into a "Piconet" of up to 8 slave devices. In an 802.11, a base station is a receiver and transmitter that plays a role of the WIFI network.

Explanation:

802.11 is the original wireless specification and it was developed by IEEE. IEEE stands for Institute of Electrical and Electronic Engineers (IEEE).

In an 802.11, a master device in a bluetooth network organize themselves into a "Piconet" of up to 8 slave devices. In an 802.11, a base station is a receiver and transmitter that plays a role of the WIFI network.

7 0
3 years ago
Which 2 tools are useful to remote employees and coworkers.
dsp73
Two big useful tools are one, File Storage tools, and two, Project Management Tools.
5 0
2 years ago
Other questions:
  • At an open or uncontrolled intersection, yield if ____.
    11·2 answers
  • How can touch typing quickly but accurately improve your earnings (the money you can make)
    15·2 answers
  • Me2540 week 5 assignment<br> what do i want to know?
    9·1 answer
  • What two methods can be used to access and modify an existing program that is running on an iot device in cisco packet tracer? (
    6·1 answer
  • The Python print function
    9·1 answer
  • Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how
    9·1 answer
  • Do you think that dealing with big data demands high ethical regulations, accountability, and responsibility of the person as we
    7·1 answer
  • The physical parts of a computer are called application software.
    9·2 answers
  • Consider the following method substringFound, which is intended to return true if a substring, key, is located at a specific ind
    14·1 answer
  • Why AI strategy is important?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!