1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilya [14]
3 years ago
7

In Linux, the most popular remote access tool is OpenSSH. Which software performs the same remote command line (CLI) access from

a Windows machine? Check all that apply.
Computers and Technology
1 answer:
maxonik [38]3 years ago
6 0

Answer:

Putty

Explanation:

PuTTY is an SSH and telnet client for Windows and Unix platform. PuTTY is an open source terminal emulator, serial console and network file transfer application. It does not only support SSH and telnet, it also supports other network protocols like SCP, rlogin, and raw socket connection.

To make use of the SSH client on windows, you need to first download and then install the PuTTY software.

You might be interested in
Which of the following is not an example of plagiarism?
OLga [1]
The answer that isn't an example of plagiarism would be 'D. Quoting with Source' that means you are giving credit where credit is due and not taking or copying other work which is the definition of plagiarism.

I'm not sure about the second one but I believe it might be 'A. Students and Teachers'. 

Hope this helped!
8 0
3 years ago
What is the difference<br> difference between<br> Open<br> and recent<br> command?
Nostrana [21]
The difference between the new and open commands on the file menu are quite simple. The new command creates a brand new file, while the open command opens a file that already exists or has been created.
3 0
3 years ago
Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did n
zalisa [80]

Answer:

A.

Some image resolution was lost while uploading it

As she uploaded them on her website not downloading as choice B&D show while E is false and C is rarely occur

7 0
3 years ago
Black box testing is the practice of writing tests without knowing the implementation of the code you're testing. White box test
Lelu [443]

Answer:

<u>First test:</u> Give a list of disordered numbers to the sorting algorithm an examine if the output is correctly sorted.

<u>Second test:</u> Give a list of ordered numbers to the sorting algorithm an analyze if the output is still correctly ordered.

<u>Third test:</u> Give a list of ordered numbers and some non-numeric values to the sorting algorithm and check how is managed the exception in case of error or if the output is correctly ordered.

6 0
3 years ago
Imagine cashing or taking money using the Automated Teller Machine (ATM) and the banking hall, which of these two ways would you
Brut [27]

Imagine cashing or taking money using the Automated Teller Machine (ATM) and the banking hall, the two ways are When it involves convenience, not anything can beat ATMs.

<h3>What are the benefits and drawbacks of the usage of an ATM card?</h3>

No credit score allowed: A debit card is related for your financial institution account. There isn't anyt any opportunity of creating any transaction on credit score. All transactions and withdrawals are restricted to the stability to be had for your account. Difficult to dispute fraudulent use: It is less difficult to fraudulently use your debit card.

Automated Teller Machine (ATM) – It is a digital system that is operated with the aid of using clients and lets in acting for monetary transactions consisting of switch funds, coins withdrawals, and deposits. It extensively utilized for acquiring account facts at any time and with out the assist of financial institution staff.

Read more about the Automated Teller Machine:

brainly.com/question/19185661

#SPJ1

3 0
2 years ago
Other questions:
  • Does technology get in the way of learning ?<br> Help Meh ! ♥ Some ideas :D
    14·2 answers
  • You have installed a streaming video service on your network. You want selected hosts to be able to access this service via a dy
    6·1 answer
  • Why is a DNS cache poisoning attack dangerous? Check all that apply. A. Errrr...it's not actually dangerous. B. It allows an att
    12·1 answer
  • A book of the Law was found in the Temple, which was being repaired, during what year of Josiah's reign.
    15·2 answers
  • Trish has bought a new computer that she plans to start working on after a week. Since Trish has not used computers in the past,
    10·1 answer
  • he fundamental building block in every Hypertext Markup Language (HTML) document is the _____ tag, which marks a component in th
    7·1 answer
  • How can rows be added to a table? Check all that apply
    13·2 answers
  • Last bittttt of points
    8·1 answer
  • Which is the OS that can be obtained for free or at a much lower price than other major operating systems?
    15·2 answers
  • Write a pseudocode statement that declares the variable total so it can hold integers. Initialize the variable with the value 0
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!