1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zubka84 [21]
3 years ago
14

How to access files on different computer same network

Computers and Technology
1 answer:
mina [271]3 years ago
6 0
Use a UNC path to a share or ssh to the computer
You might be interested in
Select the correct answer
VMariaS [17]

Answer:

Digital pen

Explanation:

It is digital pen because it is basically a pen for electronics which you can write your signature with it.

5 0
3 years ago
Read 2 more answers
Who do you guys ship lol bit with?
LekaFEV [45]

Answer:

nobody

Explanation:

8 0
3 years ago
Read 2 more answers
CS902 Module3 Homework1
egoroff_w [7]
That’s a Great question
3 0
2 years ago
Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this fu
Amiraneli [1.4K]

Answer:

yes administrators have to be concerned

Explanation:

It is necessary for countermeasures to be taken against DoS attacks

The types of attacks that can still occur are:

If the network connection get to be overloaded,  there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd  we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.

To reduce the impact of this kind of attacks,

1. there should be enough or excess network bandwidth  and distributed servers should be replicated if there is a possibility that network could get to be overloaded.

2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.

3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters

4. Use strong antivirus on computer sytems that are used to connect to the internet

7 0
3 years ago
5. ADD A STATEMENT OR STATEMENTS to the program on the following page (including constant and/or variable declarations if you wa
kvasek [131]

Answer:

C code is explained below

Explanation:

#include <stdio.h>

int main() { /* main */

/*

      **********************************************************

      * Declaration Section

      **********************************************************

      *

      * Named Constants

      */

  const int bits_per_byte = 8;

  const int attention_span_in_seconds = 3;

  /*

  * You can insert stuff after this comment.

*/

/*

* Local variables

*/

  int modem_send_speed_in_bits_per_second = 56000;

  int script_file_length_in_bytes = 28000;

  int seconds_to_send_script_file;

  /*

  * You can insert stuff after this comment.

*/

/*

      **********************************************************

      * Execution Section

      **********************************************************

      *

      * You can insert stuff after this comment.

*/

  seconds_to_send_script_file =

      (script_file_length_in_bytes * bits_per_byte) /

      modem_send_speed_in_bits_per_second;

  if (attention_span_in_seconds < seconds_to_send_script_file)

      printf("1\n");

  else printf("0\n");

} /* main */

4 0
4 years ago
Other questions:
  • What is computer engineering?
    11·1 answer
  • What's the ASCII code for boy ?
    15·1 answer
  • It can be useful to have a mentor because they will help you
    7·2 answers
  • All digital images are made up from varying rectangles of color, called _____________.
    6·2 answers
  • The item that is clicked in a JList can be retrieved using the _____ method of JList.
    8·1 answer
  • Data means a group of numbers. <br> a. True<br> b. False
    7·1 answer
  • Which tabs contains options for adding shapes to a chart ? Check all that apply.
    13·1 answer
  • Write a program that asks the user to enter two integer numbers X and Y. The program halves each number between X and Y then pri
    15·1 answer
  • What feature is available to add a suggestion in the margin of someone else's document?​
    15·1 answer
  • HELP THIS IS SO DIFFICULT
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!