1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
6

Which is true about SSH and Telnet?

Computers and Technology
1 answer:
MaRussiya [10]3 years ago
8 0

Answer:

Data is encrypted on SSH

Explanation:

Telnet and SSH both are the networking protocols. These protocol are used for the security of data. In telnet data is sent over the link without any encryption. That is the reason, in telnet protocol data is less secure.

In SSH (Security Shell) protocol data has been encrypted before transmission. The encryption of data make it more secure between transmitter and receiver.

So the true statement is that, SSH has data encryption.

You might be interested in
How do I charge my ACDC Halo bolt?
adoni [48]

Answer:

To recharge your HALO Bolt, using the provided AC wall adapter cable, plug the AC adapter tip into the charger's charge input DC 20V/0.6A port. Next, connect the AC adapter into a wall outlet. Your HALO Bolt will automatically begin charging. Charge your HALO Bolt for a full eight hours.

Explanation:

4 0
3 years ago
Write a method body for the static method isDivisibleBy5 shown below. The only NaturalNumber methods you are allowed to use are
raketka [301]

Answer:

public static boolean isDivisibleBy5(int number) {

       boolean isTrue = true;

       if (number % 5 == 0)

           isTrue = true;

       else

           isTrue = false;

           

       return isTrue;

   }

Explanation:

- Create a method called <em>isDivisibleBy5</em> that takes one parameter, an integer number

- Inside the method, create a boolean variable, <em>isTrue</em>, that will be used to store the result

- Check if the number is divisible by 5, using the module operator. If it is, set the isTrue as true. Otherwise, set the isTrue as false

- Return the isTrue

5 0
3 years ago
What is the best platform for a online meeting?
Mice21 [21]

Answer: at the moment i would pick between zoom and something by google

Explanation: Face time is not very useful as only apple users can use other things like house party and the Instagram face chat thing are not good for a professional setting. Skype has been giving me problems with the vast amount of people on it for work.

7 0
3 years ago
Read 2 more answers
You are late in the preparation of the computer graphics for your final report and presentation. You run into a friend who is gr
icang [17]

Answer:

Tactic Exchange

Explanation:

The approaching style of the student to his/her friend for help is of an influence categorized as the "Exchange Influence Tactic".

The Exchange Influence Tactic refers to when a person persuades someone or seeks influence over him/her by offering some sort of reward for their help rendered. It might also work by reminding other person of any favor which you offered in the past that should be repaid now.

Here the student is seeking help of his/her friend for completion of a final report for which he/she is already late. In exchange the student is assuring his/her friend the completion of certain spreadsheets which are pending on him/her. Hence, the student has used the exchange tactic to get his work done by offering a favor in response.

3 0
3 years ago
Which three of the following are used for mobile Internet access?
AlladinOne [14]
Bluetooth wifi and cell tower
8 0
3 years ago
Read 2 more answers
Other questions:
  • Dial-up connections can be made over a(n) ____ line or phone line. isdn dsl ipx tcp/ip
    12·1 answer
  • Which of the following should you NOT do when using CSS3 properties to create text columns for an article element? a. make the c
    12·2 answers
  • Identify the electronic community that is a social-networking site.
    5·2 answers
  • What is the best way to locate where my C program gets into an infinite loop
    5·1 answer
  • Write a program that uses an initializer list to store the following set of numbers in an array named nums. Then, print the arra
    10·2 answers
  • The information given to you by your teachers is always accurate and should never be questioned. Please select the best answer f
    8·1 answer
  • You designed a program to create a username using the first three letters from the first name and the first four letters of the
    6·1 answer
  • Nia is editing a row in an Access table. The row contains the Pencil icon on the left end of the record
    12·2 answers
  • I am stuck on these 2 questions. Can someone help me please?
    10·1 answer
  • HELP ASAP Encoding a video format and then decoding it during playback is one of the functions of MPEG-4 and H.264 file players.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!