1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
loris [4]
4 years ago
12

A Windows user contacted the help desk with a problem that requires the technician to connect to the remote computer using Remot

e Assistance to view a very detailed and cryptic error message on the user's desktop. Each attempt the technician makes to connect to the remote computer results in a message stating the connection was refused. Which of the following protocol and port number combinations should be opened on the remote computer's firewall to allow this connection?
Computers and Technology
1 answer:
djverab [1.8K]4 years ago
6 0

Answer:

RDP port 3389 .

Explanation:

A Windows user has informed the helpdesk with such an issue that requires the operator to link to the remote server through Remote Assistance to access the user's screen with a very comprehensive and ambiguous error message. Almost any attempt made by the operator to link to the remote access concludes in a message that says that the connection has been denied. To make this link, the following protocol and the port number combinations must be enabled on the firewall of the remote connection.

You might be interested in
A(n) ______ database stores data in tables that consist of rows and columns.
melisa1 [442]
The answer is a spreadsheet.
4 0
4 years ago
Read 2 more answers
Given storeMonthlySales NUM STOREST[NUM MONTHST[NUM DEPTS] is a three-dimensional array of floating point values. Write a C++ fu
iogann1982 [59]

Answer:

Y

Explanation:

YEZ

5 0
4 years ago
You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following wil
adelina 88 [10]

Answer: d. incremental backup

Explanation:

In incremental backup it copies only the files that have changed since the last full backup. It does not backup all the files just like the full backup. it however backup those copies into the  system which has changed since the last backup.

In doing  so it just increases the efficiency and performance of the backup procedure. This process is basically preferred when the amount of file to be backup is huge and there is not enough time to do a full backup.

Increment backup also use less disk space.

Cloud backup uses most increment backup for its application.

6 0
4 years ago
Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which
SSSSS [86.1K]

Answer:

C++ code explained below with its sample outputs

Explanation:

Twitter.h

========

#ifndef Twitter_h

#define Twitter_h

#include <iostream>

using std::string;

using std::cout;

using std::endl;

template <typename T>

class Twitter

{

private:

string name;

T followers[5];

int numFollowers;

public:

Twitter(string n);

bool AddFollower(T follower);

bool RemoveFollower(T follower);

void PrintFollowers();

};

template <typename T>

Twitter<T>::Twitter(string n)

{

name = n;

numFollowers = 0;

}

template <typename T>

bool Twitter<T>::AddFollower(T follower)

{

if(numFollowers < 5)

{

followers[numFollowers] = follower;

numFollowers++;

return true;

}

else

return false;

}

template <typename T>

bool Twitter<T>::RemoveFollower(T follower)

{

int index;

bool found = false;

for(index = 0; index < numFollowers; index++)

{

if(followers[index] == follower)

{

found = true;

break;

}

}

if(found)

{

//shift all other followers after the one to be removed to one position left

for(++index; index < numFollowers; ++index)

{

followers[index-1] = followers[index];

}

numFollowers--;

return true;

}

else

return false;

}

template <typename T>

void Twitter<T>::PrintFollowers()

{

cout << "Followers for " << name << endl;

for(int i = 0; i < numFollowers; i++)

cout << followers[i] << endl;

 

cout << "------" << endl << endl;

}

#endif /* Twitter_h */

main.cpp

=========

#include "Twitter.h"

#include <iostream>

using namespace std;

struct Profile {

string userName;

int age;

string state;

};

 

ostream& operator << (ostream & output, Profile p) {

output << p.userName;

return output;

}

bool operator == (const Profile &p1, const Profile p2)

{

return p1.userName == p2.userName;

}

int main()

{

Twitter<string> t1("John");

Twitter<Profile> t2("Bob");

 

cout << "Adding followers to John" << endl;

t1.AddFollower("Bill");

t1.AddFollower("Jack");

t1.PrintFollowers();

 

Profile p1 = {"Alice", 20, "Alaska"};

Profile p2 = {"Janet", 22, "California"};

Profile p3 = {"Jim", 20, "Texas"};

 

cout << "Adding follower profiles to Bob" << endl;

t2.AddFollower(p1);

t2.AddFollower(p2);

t2.AddFollower(p3);

t2.PrintFollowers();

 

cout << "Removing Bill from John" << endl;

t1.RemoveFollower("Bill");

 

cout << "Removing Janet's profile from Bob" << endl << endl;

t2.RemoveFollower(p2);

 

t1.PrintFollowers();

t2.PrintFollowers();

 

 

 

}

output

-======

Adding followers to John

Followers for John

Bill

Jack

------

Adding follower profiles to Bob

Followers for Bob

Alice

Janet

Jim

------

Removing Bill from John

Removing Janet's profile from Bob

Followers for John

Jack

------

Followers for Bob

Alice

Jim

------

6 0
3 years ago
What controls network connectivity such as Wi-Fi and the GPS locator in a mobile device?
MakcuM [25]

Answer:

There are hybrid system that consist of WiFi, GPS, GSM and IP address to locate the mobile devices.

Explanation:

In Cellular phone communication, hybrid technique is used to locate to find the locations. It consist of WiFi, GSM, GPS and IP addresses. GPS technology is used with satellite communication. Location has been sent from satellite to the mobile network with the help of Google maps. There are few other techniques used to such as GSM based techniques that is used by the help of radio signals strength to find the location of the device. This technique is helpful in the areas where the many communication tower are there to locate the signal strength in the area of the mobile device. WiFi also used to locate the mobile device with the help of IP addresses.

In mobile phones, different combinations of all above technologies used to provide the network connectivity such as WiFi and GPS locator in the mobile Phone.  This is called Cellular locating technology.

5 0
3 years ago
Other questions:
  • 5) How have the wireless web and peer-to-peer networking helped small businesses compete with large corporations?
    15·2 answers
  • DG Loans, a mortgage lender, was charged with a discrimination lawsuit. It alleged that the company was offering loans at higher
    13·1 answer
  • âwhen the footer is the last element in a page body, the _____ pseudo-element is used to add a placeholder element after the foo
    8·2 answers
  • Design a database to keep data about college students, their academic advisors, the clubs they belong to, the moderators of the
    12·2 answers
  • Which of the following is the correct code to link the text "Sunny Days" to the website www.sunnysunshine.com?
    15·1 answer
  • "The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements t
    13·1 answer
  • 71 81 77 15 63 96 36 51 77 18 17
    14·1 answer
  • What are the advanced file and folder search commands?PLEASE GUYS ITS IMPORTANT
    12·1 answer
  • A ……………………………is used to verify the identity of a website and is issued to the owner of the website by an independent and recogni
    7·2 answers
  • When solving a problem in a group situation, which of the following traits should be demonstrated?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!