1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maurinko [17]
3 years ago
13

What two protocols are used for remote access to a server, using unencrypted and encrypted transmissions respectively? answer

Computers and Technology
1 answer:
drek231 [11]3 years ago
8 0
Telnet or rsh and ssh, http and https, ftp and sftp or ftps ? How are you accessing the server?
You might be interested in
im try to search for question the search bar and is giving me a error message is the page having any technical problem?
aalyn [17]
I have been running into the same problem, they haven't said anything but that might be the case.
6 0
3 years ago
Write some positive and negative impacts of computer in our daily life​
8090 [49]
Positive impacts are
1. Communicating with people
2. Daily update of what going on in the world
3. learn new things
Negative impacts are
1. Viruses
2. Private information shared
3. Less face to face conversations
3 0
2 years ago
When activated, an Excel object has all the features of an Excel
Rainbow [258]
D. Workbook
Hope this helps
7 0
3 years ago
Read 2 more answers
The type of code that uses eight bits for each character is ____.
Ksivusya [100]
It's Binary code simple as that its made of 8 1's and 0's
7 0
3 years ago
Tom and jerry opened a new lawn service
DedPeter [7]
That’s cool sirrrrrrrr
6 0
3 years ago
Read 2 more answers
Other questions:
  • List four reasons of meaningful use that demonstrate the capabilities and processes required for the provider to show active use
    7·1 answer
  • Proponents of Internet freedom see its _____________ as providing protection for unpopular expression; proponents of greater Int
    8·1 answer
  • Missy creates a personal budget. She enters her current savings account balance in cell D3. In cell A3, she calculates her incom
    13·2 answers
  • How many bits would be in the memory of a computer with 4kb memory?
    8·1 answer
  • When an interrogator speaks highly about how a crime was committed, hoping to get the suspect to brag about his or her involveme
    7·2 answers
  • How did punch cards improve the weaving process?
    11·1 answer
  • What is the difference between an activity inventory and an object inventory?
    8·1 answer
  • You cannot then move and resize the control on the form as desired with your mouse TRUE OR FALSE​
    6·2 answers
  • How would you assign roles to your group members?
    9·2 answers
  • What are the limits of hashing and verifying that files haven’t changed?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!