1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
9

You want to use a terminal emulation program to terminal into a series of Cisco routers. You will be managing these devices remo

tely. What protocol should you use?
Computers and Technology
1 answer:
vampirchik [111]3 years ago
7 0
If a terminal emulation program is used and the devices should be reotely managed, then you should use the Telnet protocol. <span>Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP networks like the Internet. </span>It allows the user access<span> to a text terminal and all its </span>applications<span> such as command-line for example. </span>

You might be interested in
Most presentation programs allow you to save presentations so they can be viewed online by saving them as ____
Elza [17]

Explanation:

Most presentation programs allow you to save presentations so they can be viewed online by saving them as html

files.

5 0
3 years ago
Read 2 more answers
In the year, , the American Department of Defense put a military research network, called ARPANET online.
mario62 [17]

Answer:

November 21st of 1969.

Explanation:

In the year, 1969, the American Department of Defense put a military research network, called ARPANET online.

3 0
2 years ago
Electrical pressure is also called
fgiga [73]
Electrical pressure is also known as voltage.

I hope this helps you! :-)
3 0
3 years ago
Read 2 more answers
The process of encoding messages or information in such a way that only authorized parties can read it is called ____________.
lukranit [14]

Answer:

Encryption

Explanation:

Encryption is a term in the field of computer security (Cryptology) this is a process of encoding information in a way that hackers and eavesdroppers cannot read. The process of encryption involves a plain text (message) been converted into a scrambled text (cipher text) with an encryption algorithm (key) in this way, if the message is intercepted by a hacker he/she is unable to read the contents. Only the authorized party with a decryption key will be able to decrypt back to a plain text and read the contents of the message

3 0
3 years ago
In the context of machine learning, an artificial neural network (ann) is most likely used for?
Marianna [84]

In the context of machine learning, an artificial neural network (ANN) exists most likely utilized for oil and gas exploration (Option c).

<h3>What is machine learning?</h3>
  • Machine learning (ML) guides to a kind of artificial intelligence based on computer algorithms capable of producing predictions without being programmed to do so.

  • Machine learning algorithms are used in various industries, including, among others, medical diagnostics, bioinformatics, image processing, modification of hygiene in production plans, etc.

  • Moreover, an artificial neural network (ANN) directs to a machine learning technique that receives inputs and then delivers explicit outputs regarding predefined activation functions.

  • This kind of computation network (artificial neural network) exists similar to neuronal biological networks carried out by neurons.

Hence, In the context of machine learning, an artificial neural network (ANN) exists most likely utilized for oil and gas exploration (Option c).

To learn more about Machine learning refer to:

brainly.com/question/25523571

#SPJ4

The complete question is,

In the context of machine learning, an artificial neural network (ANN) is most likely used for

a. Supplying explanations for solutions.

b. problems that require the use of if-then-else rules.

c. oil and gas exploration.

d. portfolio development and analysis.

7 0
2 years ago
Other questions:
  • The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,
    13·1 answer
  • How do you ask someone for help?
    6·1 answer
  • 1) The program reads an integer, that must be changed to read a floating point. 2) You will need to move that number into a floa
    6·1 answer
  • Which character is often used to identify registered trademarks and is available on the Insert tab and Symbols
    5·1 answer
  • Building relationships during your career exploration is called
    6·1 answer
  • What is the most efficient way to prevent the spelling checker from repeatedly flagging a correctly spelled name in all of your
    5·1 answer
  • What is a system unit
    7·1 answer
  • The first version of Windows to have a Start button and taskbar was?
    5·1 answer
  • Complete the sentence.
    8·1 answer
  • In cryptocurrency, a block is only considered valid if it has a.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!