1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Agata [3.3K]
2 years ago
7

Ncomputing and thin clientwhat it is why is done , how it works and how it's done ​

Computers and Technology
1 answer:
SVEN [57.7K]2 years ago
4 0

The term NComputing  is known to be a form of desktop virtualization company that is said to creates hardware and software to form virtual desktops.

The term Thin clients is known to be virtual desktops. They help a lot of users at the same time to share a single operating system instance.

<h3>What is the aim of a thin client?</h3>

In Ncomputer networking, a thin client is known to be a kind of low-performance computer that is known to be optimized and used for setting up a remote connection.

It is often used with a server-based computing system. The server here is one that often does most of the work, such as launching software programs, etc.

Learn more about Ncomputing from

brainly.com/question/12629145

You might be interested in
In which of the following situations may the taxpayer take an education expense on Schedule C? a. Henry, a self-employed adminis
daser333 [38]

Answer:

Henry, an administrative assistant, is taking an advanced Word computer program class through an adult school program.  

Explanation:

4 0
3 years ago
What is output? Select all that apply. c = 0 while (c &lt; 10): c = c + 5 print (c) 0 1 2 3 4 5 6 7 8 9 10
Harlamova29_29 [7]

Answer:

5 10

Explanation:

that's the answer : 5 10

4 0
3 years ago
What kind of device is a printer? output or input
ANEK [815]
A printer is output. :)
8 0
3 years ago
2. What type of expansion card allows your computer to
nekit [7.7K]

You can use a peripheral component interconnect Express card (also known as an expansion card) to connect your computer to a wireless network (WLAN).

I hope this helped!

3 0
3 years ago
Which of these statements regarding mobile games is true? A. They are typically played indoors. B. They have detailed environmen
Lyrx [107]

Answer:

c and d

Explanation:

6 0
3 years ago
Other questions:
  • The collection of all possible vulnerabilities that could provide unauthorized access to computer resources is called the:
    12·1 answer
  • To what extent can u justify that computer is not the only ICT tool?​
    9·1 answer
  • Microcomputers, different from those giant mainframes and supercomputers, are designed for individuals. In fact, the microcomput
    7·1 answer
  • How are logical operators used?
    14·1 answer
  • Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application. Sele
    6·1 answer
  • Accessing a computer system by using several words is known as​
    13·2 answers
  • Once the CPU has fetched the data requested, what are the next steps in the process?
    15·1 answer
  • The Arizona Department of Transportation has offices throughout the state. State documents are stored on a large server in a cen
    5·2 answers
  • Paul is a baker who wants to improve his recipe for muffins because they turn out with a greasy flavor. What ingredient should h
    14·1 answer
  • Darla is going to start writing the HTML code for a web page. What would she start with?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!