What is the protocol for SSH (Secure Shell)?
A. TCP 21
B. TCP 22
C. TCP 23
D. TCP 20
Answer: B. TCP 22
Computer Science & Information Technology
You might also like to view...
The ____________________ statement designates the technique Access uses to compare and sort text data.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The ____________ is critical to ICT acquisition because it provides the sole point of reference for the bidding process.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The tables or queries from which a report's data is taken are known as the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
In C++, you can use a(n) ____________________ to instruct a program to mark those memory locations in which data is fixed throughout program execution.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology