1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
10

Why is ssh preferred over telnet for remote connections?

Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
3 0
Telnet conversations are not encrypted, whereas ssh conversations are, so ssh is secured against eavesdropping.
You might be interested in
Horizontal and vertical flips are often used to create ___.
mixer [17]

Answer:

Rotation of an image

Explanation:

The correct answer is -  Rotation of an image

Reason -

When you rotate an object, it moves left or right around an axis and keeps the same face toward you.

When you flip an object, the object turns over, either vertically or horizontally, so that the object is now a mirror image.

5 0
2 years ago
Adios brainly, wont be posting that much take my points away i d c
mrs_skeptik [129]
Omg I would die to have your points because when I get on people call me a noob because I just got the app like 3 days ago and every time I answer a question some says noob like dang I just started
5 0
3 years ago
Read 2 more answers
I have a question about this programming assignment. The outcome when the user puts in Taylor for guest one and Fernando for gue
ivolga24 [154]
Yes u need more brackets
4 0
3 years ago
Read 2 more answers
In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
elixir [45]

In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as <u>d. cyber terrorists</u>.

<u>Explanation</u>:

Cyber crime means crime committed with the help of computer and internet. Cyber terrorism means crime that causes damage to infrastructure components of financial institutions and government office and causes threat to the society.

Cyber terrorists are person who involve in cyber terrorism. The systems used in the governments and financial institutions should be protected with hardware and software to avoid cyber terrorism.

This kind of cyber terrorism is very dangerous, as they hack the system and destroy the valuable information stored in it.

5 0
3 years ago
What happens to energy as we move from step to step in a chain or web
scZoUnD [109]

Answer:Energy decreases as it moves up trophic levels because energy is lost as metabolic heat when the organisms from one trophic level are consumed by organisms from the next level.

Explanation:

6 0
3 years ago
Other questions:
  • All of the following statements correctly describe an advantage or disadvantage associated with the use of Monte Carlo Analysis
    9·1 answer
  • Sharing a workbook helps to complete ________ (A, tasks) (B,changes) (C, typing) on time. Multiple people acssessing the workboo
    9·1 answer
  • A general rule for adding text to a slide is ____.
    8·2 answers
  • Which is better analog music or digital music
    15·2 answers
  • 2.2-2 Consider sorting numbers stored in array by first finding the smallest element n A of and exchanging it with the element i
    11·1 answer
  • Someone plz answer
    8·1 answer
  • Whats yall favv scary movie
    11·1 answer
  • SummaryIn this lab, you complete a partially written C++ program that includes a function named multiplyNumbers() that multiplie
    13·1 answer
  • what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage
    12·1 answer
  • Technical skills are also called soft skills.<br> Question 9 options:<br> True<br> False
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!