1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kow [346]
2 years ago
6

Amtel University decides to keep a record of their student data in a backup server. The administrator contacts you to identify t

he right command interface protocol to be used in this. Which command interface protocol should you advise
Computers and Technology
1 answer:
denis-greek [22]2 years ago
3 0

The command interface protocol that i would suggest to the administrator is SSH.

<h3>What is a command interface protocol?</h3>

A command interface protocol can be defined as a protocol that is designed and developed to processes commands in the form of lines of text to a software application on a computer system.

<h3>The types of command interface protocol.</h3>

In Computer technology, there are different types of command interface protocol and these include:

  • TLS
  • SSL
  • SSH

SSH is an acronym for secure shell and it is a network protocol that gives an administrator a secure way to access data over an unsecured network.

Read more on SSH here: brainly.com/question/17147683

You might be interested in
How did the use of ARPANET change computing?
Paladinen [302]

Answer:

Explanation:

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

PLEASE MARK BRAINLIESTPLEASE MARK BRAINLIEST

8 0
3 years ago
Malcolm is part of a team developing a new smartphone app to track traffic patterns. Because team members are located throughout
Umnica [9.8K]

Answer:

Virtual team

Explanation:

A virtual team is also known as a remote team, where every member of the team is working from different geographic locations. Usually, the communication channel is through voice/video conferencing or email.

Each member of the team is given unique roles and these roles are delivered optimally within the specified time frame.

For instance, Malcolm does not meet with other members of the team, yet they are working on a project (a smartphone app to track traffic patterns). Following standards that would have applied if they were working at a specific location.

Thanks to Information and Communication Technology (ICT), virtual jobs are on the increase, providing jobs to a lot of people not minding their geographic location.

7 0
3 years ago
What online resource would you use if you wanted to read a review about a new movie?
Vilka [71]

Answer:

fdgf

Explanation:

fdgdfg

5 0
3 years ago
The web lab consists of which elements. Select all that apply. Group of answer choices Files Inspector Tool Preview Hints Work S
djverab [1.8K]

Answer:

Inspector Tool

Preview

Work Space

Instructions

Explanation:

Web Lab is a function that incorporates HTML in web development. It has functions such as Workspace where the developer writes the body of the website. Preview helps the developer take a look at the final product of what he is creating. Instructions panel provides a list of the different types of html packages that the developer can chose from.

All of these options help the developer produce a website that is up to standard.

8 0
3 years ago
In which of the following scenarios would you use the Redo function?
MakcuM [25]
D. <span>You have just used the Undo function to delete a paragraph, and you want that paragraph back.</span>
6 0
3 years ago
Other questions:
  • A customer states that when she removes the printed pages from her laser printer output tray, the black ink smears all over her
    10·1 answer
  • Web storage stores data in the browser in
    5·1 answer
  • The weird suspicious box that k12 sends the parents to put on the router. im getting strange privacy error messages on google an
    8·1 answer
  • When the packet leaves the router, which source and destination ip addresses will be contained in the packet?
    9·1 answer
  • Does group policy management matter without a server environment?
    7·1 answer
  • An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel i
    12·1 answer
  • What will be displayed if the following Java code segment is run? System.out.println("one "); System.out.print("two "); System.o
    12·1 answer
  • Which of the following items in the folder window allows users to view locations which have been visited before?
    6·1 answer
  • 1. Define the term M.A.N.
    5·2 answers
  • Explain the use of mail merge feature. <br>pls help​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!