1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
10

Why is ssh preferred over telnet for remote connections?

Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
3 0
Telnet conversations are not encrypted, whereas ssh conversations are, so ssh is secured against eavesdropping.
You might be interested in
An information system report is an example of...
STatiana [176]

Answer:

a. data processing

b. data collection

c. data input

d. data output

Explanation:

An information system is a system used to filter, process, collect, distribute and create data.

Information system can be a work system whereby humans and machine perform processess using informations gathered, process it to solve the needs of their customers in the form of goods and services.

8 0
4 years ago
The process of providing only the essentials and hiding the details is known as _____. Group of answer choices algorithm abstrac
almond37 [142]
The answer is data structure
8 0
2 years ago
PLEASE HELP ME WITH THIS QUESTION:
Darina [25.2K]
There’s literally no question here
5 0
3 years ago
Which of the following is an attack that adds SQL statements to input data for the purpose of sending commands to a database man
liq [111]

Answer: SQL Injection

Explanation:

The SQL injection is one of the type of attack which is used in the database management system for sending the commands by adding the structured query (SQL) language statement in the form of input data.

  • The SQL injection is the technique of code injection in which the SQL statement for the purpose of sending commands.  
  • It is widely used in the data driven applications.
  • The various types of web applications and web pages are used the SQL injection and uses in the form of input in the SQL query and then it is executed in the database.

Therefore, The SQL injection is the correct option.

5 0
3 years ago
All members within a class are by default
miv72 [106K]

Answer:

All the members within a class are by default are private. Private function in a class can access public function within a similar class. Private member formed the implementation of the class and also form the private interface of members within the class.

All the member of class can be access by function inside the class when it is declare as private.

For example:

class test

{     private:

   int a; // when test:a is private

     public:

   test() : a()  // a is accessible in test class  

}

8 0
3 years ago
Other questions:
  • Almost all PCs have this type of serial connector
    8·1 answer
  • You can deselect multiple selected sheets beginning with the sheet1 tab by pressing the ____ key and clicking the sheet1 tab.
    15·1 answer
  • Which of the following is a good choice to help you stay organized when you are away from the office? A. Personal Information ma
    7·1 answer
  • Group technology identifies components by a coding scheme that specifies the
    13·1 answer
  • What are the two houses in Congress?
    5·1 answer
  • What are the reasons why is it necessary to evaluate online sources and content?
    6·1 answer
  • Trish has bought a new computer that she plans to start on after a week
    5·1 answer
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    13·2 answers
  • For what purpose power point is used?​
    5·2 answers
  • SOMEONE PLEASE HELP ME WITH THIS ILL GIVE YOU BRAINLY IF YOU GET IT RIGHT PLEASE!!!!!
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!