1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
3 years ago
6

How would you copy all files from a remote directory into your LOCAL home folder.

Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
5 0

Answer: Using secure copy 'SCP' we can copy all files from a remote directory into local folder. It also replaces existing files.

Explanation:

This is illustrated as follows:

scp -r [email protected]:/path/to/server/source/folder/  .

-r is recursively copy all files

username is your username in your system

IP, here you cab specify the IP or type the website such as www.google.com

Then we specify the path, complete path

"." dot here refers the current directory. To copy the contents in the current directory.

You might be interested in
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
2 years ago
how could environmental and energy problem Kenya faces as far computer installations are concerned be avoided​
ipn [44]

The environmental and energy problem Kenya faces as far computer installations are concerned can be avoided​ by

  • Knowing and finding out the key aspect of ICT strength.
  • Create an holistic judgements in the assessment of ICT capability. Promote the use of solar power.

<h3>How can we overcome ICT challenges?</h3>

There are a lot of Energy Challenges in terms of ICT  in Kenyan and it is good the government and the people work towards energy in terms of sustainable ICT.

Therefore, The environmental and energy problem Kenya faces as far computer installations are concerned can be avoided​ by

  • Knowing and finding out the key aspect of ICT strength.
  • Create an holistic judgements in the assessment of ICT capability. Promote the use of solar power.

Learn more about computer installations from

brainly.com/question/11430725

#SPJ1

7 0
1 year ago
Adding transitions to slides in a presentation.
8090 [49]

B.) The addition of slide transitions

4 0
3 years ago
Read 2 more answers
What important advice to include about spyware, viruses and other types of malware
S_A_V [24]

Answer:

You should probably include the fact that most of these things will disguise themselves as fake downloads and that will most of the time claim to allow you to download something that costs money for free.

Explanation:

thats all i could come up with

5 0
2 years ago
Read 2 more answers
The internet backbone is a foundation network linked with _____ that can support very high bandwidth.
slava [35]
The internet backbone is a foundation network linked with fiber-optic cables that can support very high bandwidth. Fiber-optic cables can be compared with an electrical cable because they use the fibers to carry light and transfer information. The fiber-optics within a network help the information travel through the bandwidths at a fast, clear speed. 
8 0
3 years ago
Other questions:
  • Your boss calls you from his home to use the vpn connection you configured for him on his laptop. he has traditionally depended
    6·1 answer
  • You need a version of usb technology that will support older usb devices, of which you have many, as well as newer ones. what wo
    12·1 answer
  • In Outlook 2016, what are the three format options when sending an email message? Check all that apply.
    7·1 answer
  • Which wireless communication technology is most likely used when synchronizing device information to an automobile?
    9·1 answer
  • The city government of Los Angeles recently upgraded its information technology infrastructure​ and, for the first​ time, implem
    14·1 answer
  • Create a class called Fraction. Provide a constructor that takes 2 integers. Provide methods for:
    8·1 answer
  • What methods do phishing and spoofing scammers use? List and explain methods to protect against phishing and spoofing scams.
    14·1 answer
  • Pls answer will give brainlest dont answer if you dont know Upload your 300-word essay containing the following: the definition
    5·1 answer
  • Which of the following are true about algorithms? (You may select more than one)
    12·1 answer
  • which type of processor chip is designed to perform a single function and is typically custom-designed?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!