1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
3 years ago
9

Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. The server is run

ning a Telnet server and an FTPS server. Why is it not a good idea to use Telnet to reach the remote computer?
a. Telnet transmissions are not encrypted.
b. Telnet is not reliable and the fi le might arrive corrupted.
c. FTP is faster than Telnet.
d. FTP running on the same computer as Telnet causes Telnet to not work.
Computers and Technology
1 answer:
mel-nik [20]3 years ago
4 0

Answer:

a. Telnet transmissions are not encrypted.

Explanation:

Indeed, since <em>Telnet transmissions are not encrypted,</em> all the information sent, and even the characters typed in the telnet console are sent in clear text.

This is a security issue, since any other device in the same network will receive a copy of the information (packets) sent. For default, all the devices, except for the server expecting to receive the information, will discard the packets. However it is easy to actively <em>listen </em>and keep those packets, wich will contain the information in plain text and human readable.

You might be interested in
Apart from using secure networks, how else can Dhruv keep his deliverables safe in the office and on the go? Select all that app
solong [7]

It should be noted that data can be secured when working in the following way:

  • Establishing a cyber security policy.
  • Using two-factor authentication.
  • Keeping passwords strong.
  • Using secure internet connections.

Your information is incomplete. Therefore, an overview relating to the topic will be given. It should be noted that as telecommuting becomes a standard practice, the challenge regarding data security increases.

Employers should educate their employees about data security. The workers should know that data security is a priority and that all the internet connections are secure.

Learn more about data security on:

brainly.com/question/10091405

6 0
3 years ago
What observations can you make about any of these data structures ? Go into as much as you can. Try proposing your own data stru
STALIN [3.7K]

Answer:Here Is An Example Data Structure We Can Struct Coordinate Int X; Intys Struct Square Coordinate Centers Coordinate Box[41; Here Is An Alternative Data Structure We Can Use To Describe Squares Struct Coordinate Int X; Int Y 2) Consider Our Drawing Example From Lecture. In The Below All We Can Draw Are Circles And Squares. Here Is An Example Data Structure

Explanation:

6 0
3 years ago
Write a function DrivingCost() with input parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar
stira [4]

Answer:

// program in C++.

#include <bits/stdc++.h>

using namespace std;

// function to calculate cost

double DrivingCost(double drivenMiles, double milesPerGallon, double dollarsPerGallon){

  double cost;

  //Expression to compute cost

  cost = drivenMiles / milesPerGallon * dollarsPerGallon;

  return cost;

}

// main function

int main()

{

   double drivenMiles, milesPerGallon, dollarsPerGallon;

  //initialise the variables

  drivenMiles = 50;

  milesPerGallon = 20.0;

  dollarsPerGallon = 3.1599;

  //Call function

  double cost = DrivingCost(drivenMiles,milesPerGallon,dollarsPerGallon);

  //Display result

  cout<<"Driven miles : "<<drivenMiles<<endl;

  cout<<"Miles per Gallon : "<<milesPerGallon<<endl;

  cout<<"Dollars per Gallon : "<<dollarsPerGallon<<endl;

  cout << fixed << setprecision(2);

  cout<<"The total driving cost : "<<cost ;

  return 0;

}

Explanation:

Declare and initialize drivenMiles with 50, milesPerGallon with 20.0 and dollarsPerGallon with 3.1599.Call the function DrivingCost() with these parameters,This will calculate the cost and return the value.Print the result after getting the cost.Similarly we can calculate cost for drivenMiles equals to 10 and 400 miles also.

Output:

Driven miles : 50

Miles per Gallon : 20

Dollars per Gallon : 3.1599

The total driving cost : 7.90

5 0
3 years ago
In programming languages, ____ is used as a mnemonic representation for the program instruction’s memory address.
Alecsey [184]

Answer:

Assembly language

Explanation:

Assembly language writes instructions in human letters. Every machine language instruction has a corresponding assembly language instruction that means exactly the same thing. Assembly language uses a symbolic form of a program which are capable of:

- readable by human beings (+/-)

- constants, addresses, and names of symbolic instructions

- arithmetic during assembly - calculations of addresses, constants

- synthetic instructions (not supported by our assembler)

- expansion of macroinstructions (not supported by our

assembler)

- assembly instructions (pseudo-instructions)

• memory allocation

• memory initialization

• conditional assembly (not supported by our assembler)

3 0
3 years ago
The process of finding the largest and smallest numbers is used frequently in computer applications. Write a C++ program that us
WINSTONCH [101]

Answer:

The program to this question can be given as:

Program:

#include<iostream>  //header file

using namespace std;

int main()    //main method

{

int x[10],i,largest = 0,second_largest=0,n;  //variable

cout << "Enter Number of elements :";  //message

cin>>n;

cout << "Insert array elements :";  //message

for(i=0;i<n;i++)  //insert elements in array

{

cin >>x[i];

}

//Finding Largest element  

for(i=0;i<n;i++)

{

if (x[i]>largest)

{

largest = x[i];

}

}

//finding second largset element

for(i=0;i<n;i++)

{

if (x[i]>second_largest)

{

   if(x[i]==largest)

   {

   continue;   //Ignoring largest in order to get second largest

   }

   second_largest=x[i];

}

}

//print value

cout <<"Largest Number:"<<largest<<endl;

cout <<"Second Largest Number:"<<second_largest;

return 0;

}

Output:

Enter Number of elements :5

Insert array elements :33

45

75

87

23

Largest Number:87

Second Largest Number:75

Explanation:

In the above program firstly we define the header file then we define the main method in the main method we define the array and other variables. We first input the number for the size of the array. Then we insert array elements after inserting array elements we search the largest number and the second largest number in the array. To search the largest number in the array we use the loop. To search the first largest number we define a condition that array is greater than the largest number and store the value into the largest variable. Then we check the second largest number in the array for this we use two conditions that are array is greater than the second largest number in this we use another condition that is array is equal to the largest number. If the inner condition is true then it will move forward and end of an inner condition. In the outer condition, the value will be stored on the second_largest variable all the conditions will be done inner the loop. At the last we print values.

3 0
3 years ago
Other questions:
  • Lance is at a bus station. His friend is using the ATM machine to withdraw some money. Lance notices a stranger deceptively watc
    6·2 answers
  • Find an element inside a div using javascript
    12·1 answer
  • Of the following choices, what indicates the primary purpose of an intrusion detection system (IDS)?
    12·1 answer
  • Create a new program called Time.java. From now on, we won’t remind you to start with a small, working program, but you should.
    13·1 answer
  • _________ mode is similar to Cipher Feedback, except that the input to the encryption algorithm is the preceding DES output. A.
    11·1 answer
  • In mathematics, the notation n! represents the factorial of the nonnegative integer n. The factorial of n is the product of all
    7·1 answer
  • What is a bin range?
    14·1 answer
  • Write a MY SQL query to display the name and hire date of all employees who were hired in 1992.
    9·1 answer
  • Which step do you think is most useful from big data life cycle and why?
    12·1 answer
  • General Electric saves $1.6 billion per year by using its private corporate network that links its 340,000 employees. Another na
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!