1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
3 years ago
9

Secure shell (SSH) operates over which port by default

Computers and Technology
1 answer:
Karolina [17]3 years ago
5 0

Explanation:

By default, SSH opens port 22.

However, this can be arbitrarily changed.  So if port 22 does not work, it is necessary to check the exact/new port number.

You might be interested in
The layout gallery displays 10 slide layouts with a variety of placeholders to define text and content positioning and formattin
Papessa [141]
The above statement is FALSE.

The layout gallery displays 9 slide layouts NOT 10. 

These 9 layouts have various<span> placeholders to define text and content positioning and formatting.

</span>1 - Title slide
2 - Title and content
3 - Section Header
4 - Two content
5 - Comparison
6 - Title only
7 - Blank 
8 - Content with Caption
9 - Picture with Caption
8 0
3 years ago
In a blockchain, each block has a unique hash value which is dependent on the hash value of the previous block in the chain. Wha
pantera1 [17]

Answer: hello your question lacks the required option, below are the missing options

A. The transaction data in the tampered block is deleted, and a copy is created with the same hash value.

B. The hash values of transaction data of subsequent blocks are validated, and the chain is broken.

C. The hash value for the entire block is nullified, creating a domino effect on all subsequent blocks.

D. The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues.

answer : The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues ( D )

Explanation:

What happens if a transaction data is changed in an earlier existing block in a Blockchain is that the Hash values of subsequent blocks will be updated as soon as they are tampered with and the chain will continue.

Blockchain is a specially design system for recording information, hence any change in data inputted in an earlier existing blocks that changes will automatically be updated as well in all preceding blocks.

4 0
3 years ago
The WAN connections to your regional offices are unfortunately extremely slow for your users and they are complaining about file
Zanzabum

Answer: (B) Branch cache

Explanation:

  The branch cache is the process of cache the data from the given file and the wen server on the wide area network. In the WAN connection, the branch code is the type of functionality which basically allow the window to providing the remote user support in the network. The branch cache basically work on the two mode that are:

  • The distributed mode
  • The host mode

The branch cache is the one of the technology that intend the cache data for reducing the network traffic in the wide are network.

Therefore, Option (B) is correct.

5 0
3 years ago
Jason works as a Help Desk Technician for uCertify Inc. The company has a Microsoft Windows XP-based network. Jason wants to vie
WINSTONCH [101]

Answer:

ipconfig

Explanation:

ipconfig (short for <em>internet protocol configuration</em>) is a command line tool used for determining the network connection configuration of a computer. Some of these configuration information are;

i. the IP address of the computer

ii. default gateway address

iii. subnet mask

iv. Media Access Control (MAC) address.

6 0
3 years ago
Adassadad saflalfaklfajfklajfalkfjalkfjalkfalkf
BlackZzzverrR [31]

Answer:

this belongs on r/ihadastroke

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • 6. An art museum owns a large volume of works of art. Each work of art is described by an item code (identifier), title, type, a
    6·1 answer
  • Assume that the variables gpa, deansList and studentName, have been declared and initialized . Write a statement that both adds
    6·1 answer
  • 1.
    13·1 answer
  • What are some ways to accept data typed into a cell? Check all that apply.
    15·1 answer
  • What can your employer do to protect you from overhead power lines?
    13·1 answer
  • According to your text, three factors are responsible for the rapid rise in new product development. They are faster and more ec
    9·1 answer
  • Which of these is an expansion slot type?
    5·1 answer
  • 01:24:3
    11·1 answer
  • Write convert() method to cast double to int
    7·1 answer
  • Lucas wants to expand his vocabulary to better understand the sentence below. The insidious burglar moved through the house unhe
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!