1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilya [14]
3 years ago
7

In Linux, the most popular remote access tool is OpenSSH. Which software performs the same remote command line (CLI) access from

a Windows machine? Check all that apply.
Computers and Technology
1 answer:
maxonik [38]3 years ago
6 0

Answer:

Putty

Explanation:

PuTTY is an SSH and telnet client for Windows and Unix platform. PuTTY is an open source terminal emulator, serial console and network file transfer application. It does not only support SSH and telnet, it also supports other network protocols like SCP, rlogin, and raw socket connection.

To make use of the SSH client on windows, you need to first download and then install the PuTTY software.

You might be interested in
You have heard that the Linux distribution your are going to install to run a new application runs best on a RISC architecture.
Artyom0805 [142]

Answer:

SPARC .

Explanation:

When the user has understood they're required to install the linux distribution to set up a specific program works better on such a RISC architecture. SPARC must therefore find the device from which it would work that following distribution for the Linux. It is a RISC and ISA that was previously designed through both Fujitsu and Sun.

6 0
3 years ago
Which of these lights is NOT part of the standard three-point lighting setup?
Contact [7]

Answer:

i believe background lighting

8 0
3 years ago
List and describe two of the four generally recognized security positions.
Llana [10]
CISO: This person reports directly to the CIO and is responsible for assessing, managing, and implementing security.
Security Technician: Entry-level position and provides technical support to conFgure security hardware, implement security software, and diagnose and troubleshoot <span>problems</span>
8 0
4 years ago
To move the insertion point to another location on the screen, users can use: the clipboard click to type arrow keys scroll bars
slega [8]

Answer:

arrow keys

Explanation:

duh

5 0
3 years ago
Consider the key success factors of B2C. Is it only IT? What is most important?​
Ad libitum [116K]

Jsjfu zzer jsusuc888 kksss

6 0
3 years ago
Other questions:
  • Ben uses a table that has few columns. He knows about a particular value in the first column and wants to find the corresponding
    8·2 answers
  • Using caller id is part of which step in an effective time management plan
    10·1 answer
  • What is the most recognized and widely used database of published nursing practice literature?
    15·1 answer
  • Which of the following would be considered a primary source of information?
    6·1 answer
  • What is the difference between a software engineer and a system analyst?
    8·1 answer
  • Modify the code below to do the following:
    12·1 answer
  • Which of the followings is not a testingtype? [2 marks]
    8·1 answer
  • The use of desktop computer equipment and software to create high-quality documents such as newsletters, business cards, letterh
    14·1 answer
  • What will the computer do in response to a line of code reading # name = input("What is your name?")
    7·1 answer
  • If you added the formula =SUM(B1:B5) to a spreadsheet, what would it do?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!