1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tia_tia [17]
1 year ago
14

If you give someone ______ to your device, they can control it through another phone or computer.

Computers and Technology
1 answer:
icang [17]1 year ago
5 0

If you give someone <u>Remote access </u>to your device, they can control it through another phone or computer.

<h3>What is  Remote entry?</h3>

An authorized user can use remote access to connect to a computer or network from a different location using a network connection. Users can connect to the systems they require through remote access even if they are physically far away.

Therefore, the dangers to remote access are:

  • There is a risk of device loss or theft due to a lack of physical security safeguards.
  • as the data is transmitted through a public internet, eavesdropping.
  • unapproved access to systems or data, possibly while oblivious to the screen.
  • If someone gets access to the gadget, they could watch and change the data.

Learn more about Remote access from

brainly.com/question/28900477
#SPJ1

You might be interested in
Online databases allow you access to material you may not be able to find when using popular search engines like Google. Select
Anna007 [38]

Answer:

True

Explanation:

6 0
3 years ago
Application software developed by the user or at the user’s request is called ____ software.
Zolol [24]
End-User Software. Because it is not professional

4 0
3 years ago
How does a sound card work?
vlabodo [156]
In order to be able to listen to your music, a sound card converts digital data to analog sound waves you can hear. The output signal is then connected to a headphone or set of speakers. You can also use a sound card to record audio with a microphone
8 0
3 years ago
Read 2 more answers
RAM is usually a. secondary storage b. a static type of memory, used for permanent storage c. a volatile type of memory, used fo
PolarNik [594]

Answer:

The correct answer to the following question will be Option C (Volatile type of memory).

Explanation:

Random Access Memory, a variety of computer's memory which could be retrieved accidentally i.e., some memory can be obtained without any of the previous bytes being touched.

  • Volatile memory is a type of a storage in computer that only retains its information or data while powering the appliance.
  • Almost all of the RAM used in Pc's for the primary storage is unstable storage.

So, Option C is the right answer.

8 0
3 years ago
Each vertex in a graph of n bertices can be the origin of at most ____edges
EastWind [94]

Answer:

B. n-1

Explanation:

If there are n vertices then that vertex can be origin of at most  n-1 edges.Suppose that you have a graph with 8 vertices you can select a vertex from these 8 vertices now you have 7 other vertices.So the vertex you selected can have at most 7 edges or it can be origin of at most 7 edges.So we conclude that the answer is n-1.

6 0
3 years ago
Other questions:
  • PLEASE HURRY What data unit is addressed based on the IP address of the recipient? a. packet b. frame c. segment d. section
    9·2 answers
  • to the nearest millimeter a cell phone is 123 long and 54 mm wide what is the ratio of width to length
    12·1 answer
  • How can you tell that a website is valid and reliable 10 points
    10·1 answer
  • PLEASE  HELPPPP!!!!!
    14·1 answer
  • Which of the following TCP/IP settings should be configured to specify DNS suffixes to use other than resolving names through a
    9·1 answer
  • After you set a pin for a domain account on your laptop, that pin can be used only on your laptop. question 17 options:
    7·1 answer
  • You would like to enter a formula that subtracts the data in cell B4 from the total of cells B2 and B3. What should the formula
    10·1 answer
  • Stella is surfing the Internet to look for affordable apartments in New York City. Every time she clicks on a link to a webpage,
    9·1 answer
  • Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB
    10·1 answer
  • HELP FAST PLS<br> Do you care more about avoiding fees/costs, accumulating perks, convenience, etc?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!