1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mars2501 [29]
4 years ago
8

Which ssh option should you enter at the command prompt to set up an ssh tunnel for x server traffic?

Computers and Technology
1 answer:
skad [1K]4 years ago
7 0
The proper command is ssh -x
You might be interested in
Explain the working system of a computer with an example​
Romashka-Z-Leto [24]

<h2>{\underline{\fcolorbox{White}{pink}{ANSWER♥︎}}}</h2>

<u>The computer is the combination of hardware and software. Hardware is the physical component of a computer like motherboard, memory devices, monitor, keyboard etc., while software is the set of programs or instructions. Both hardware and software together make the computer system function.</u>

<h2><u>E</u><u>x</u><u>a</u><u>m</u><u>p</u><u>l</u><u>e</u><u>s</u><u> </u><u>:</u><u>-</u><u> </u></h2>

<h3><u>Mainframe Computer</u></h3>
  • Mainframe Computer. 20 in Kickin Technology Series: MainFrame Computers. MORE POWEeeer! Movie 1. ...
  • Desktop Computer. Movie: 2. Desktop Computers. ...
  • Laptop or Notebook Computer. Movie: 3. Laptop Computers. ...
  • Palmtop Computer or Personal Digital Assistant (PDA)
7 0
3 years ago
Different between internet and email​
pentagon [3]

Answer:

The internet allows you to connect with people and information around the world. The internet is more broad and could include searching things up or message-based websites. Emails is more specific, with it being when you send someone a message (called an email) on a mail website (that allows you to get messages from other people, websites, etc.)

Explanation:

In my answer.

5 0
3 years ago
Which of the following is a feature of Big Data? Group of answer choices Its datasets are at least a petabyte in size. It is gen
Serggg [28]

Answer:

Its data sets are at least a petabyte in size.

Explanation:

Big data data sets are of huge size to perform the computations using modern techniques.

6 0
4 years ago
Without using any additional variables, and without changing the values of ndays or the elements of the parkingTickets array, wr
dusya [7]

Answer:

Explanation:

mostTickets=0;

for (k=0; k< ndays; k++){

if (parkingTickets[k]>mostTickets) mostTickets=parkingTickets[k];

}

7 0
3 years ago
(2) Design pseudocode for a program that accepts numbers from the user until the special number 555 is entered (you should use a
elena-s [515]

Answer:

Pseudocode is explained below

Explanation:

# Create a variable to count the numbers.

numberOfNumbers = 0

# Create a variable to store the sum of numbers.

sumOfNumbers = 0

# Create a constant to store the special numbers.

constant specialNumber = 222

# Start the loop.

while True:

{

   # Prompt the user to enter a number.

   num = input("Enter a number: ")

   # Break the loop if the number is

   # equal to the special number.

   if num == 222:

   {    

       break

   }

   

   # Otherwise, add the number in the current

   # sum and increment the number of values.

   else:

   {

       sumOfNumbers = sumOfNumbers + num

       numberOfNumbers = numberOfNumbers + 1

   }

}

# Display the values.

print("The number of numbers = ", numberOfNumbers)

print("The sum of numbers = ", sumOfNumbers)

7 0
3 years ago
Other questions:
  • What is the absolute pathname of the YUM configuration file? REMEMBER: An absolute pathname begins with a forward slash
    12·1 answer
  • A delimiter is used to do which of these? A. Separate two lines of data from each other. B. Separate two fields within a line of
    9·2 answers
  • Can anyone help me with getting bash ubuntu on windows setup?
    15·1 answer
  • Which of the following is an example of constructive criticism for a friend who speaks too softly?
    13·2 answers
  • Which resource hels a user access a could service​
    12·1 answer
  • Consider the following statement from the CS Principles course framework: The global distribution of computing resources raises
    12·1 answer
  • Which are technical and visual demands<br> that need to be considered when<br> planning a project?
    6·1 answer
  • Unlike when writing in a programming language, there are no set rules that must be followed when writing pseudocode. What do you
    13·1 answer
  • HELP ME PLEASE <br> Can you help get back my ro blox account: (LOLCrashForce)
    15·2 answers
  • Which of the following is the best description of an ip address?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!