1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DENIUS [597]
3 years ago
8

Your boss wants you to devise a way for remote contractors to be able to access the server desktop. There is one stipulation, ho

wever, in that your boss wants to ensure that the local user can see everything that the remote contractor is doing in real time. What do you suggest?
A) Install TeamViewer on the server
B) configure a VPN connection on the server
C) Install GoToMyPC on the server (NOT THE ANSWER)
D) Configure RDP within the server’s web browser
Computers and Technology
2 answers:
blagie [28]3 years ago
5 0

Answer:

Install Team Viewer on the server ( A )

Explanation:

Team viewer is a software used for web conferencing , file transfer, desktop sharing and online meetings it is used to regulate and monitor activities been done by remote workers. The functionality of online meeting and desktop sharing and web conferencing that comes with installing a Team viewer will enable the local user see everything that a remote contractor will be doing in real time

RDP ( remote desktop protocol ) which is a protocol mainly for redirecting audio and file redirection but cannot redirect VIDEO which is where user can see what a remote contractor is doing.  but it can also be used for remote connections and transfer of Data between workers

A VPN connection lacks these functionalities it only encrypts and decrypts data

Sloan [31]3 years ago
3 0
Not 100% sure but I can Definitely say not b or c. So you’re narrowed down to A and D.
You might be interested in
What is unique address in ICT​
iren2701 [21]

Answer:

IP Addressing.

Explanation:

It stands for Internet Protocol address. It is a unique address that identifies a computer on a network such as the Internet.

Hope this helped you!

4 0
3 years ago
If a user’s current directory is /home/mary/project1, which command could she use to move to the etc directory directly under th
kykrilka [37]

Answer:

Option 4 is the correct answer to the above question.

Explanation:

In the Linux operating system, The etc folder is listed on the root directory. When any user wants to go in the root directory of the Linux operating system from anywhere, then he needs to follow the command of the name of the folder where he wants to go with the '/' symbols. The above question states that the user wants to go to the etc folder of the root directory, then he needs to press the command '/etc' with the help of cd command because cd command is used to open any folder. So the option 4 is the correct, while the other is not because--

  • Option 1 states about cd which gives the error.
  • Option 2 states about cd /home/mary/etc which take the user to the etc folder which is in the mary folder.
  • Option 3 states about the cd etc which is used to take the user on the etc folder which is in the current folder.
  • Option 5 states about the cd\etc which gives the error.
8 0
3 years ago
Mail merge documents use ______ to represent personal information that stored in a table.
Mice21 [21]
Mandatory
Mark brainliest please
6 0
3 years ago
Consumers may receive an​ e-mail, supposedly from their bank or credit card​ company, saying that their​ account's security has
Gnom [1K]

Answer:

Phishing

Explanation:

Phishing is a term used when a person fraudly or illegally uses a digital communication channel i.e. emails, by using the name of some reputed company or banks to get another person's personal data i.e login credentials, credit card details by telling them to log in the webpage given by them.

Phishing is one of the most happening cybercrimes which uses Email as their medium to reach the other person whose data they want to steal. Phishing is one of the terms of hacking.

6 0
3 years ago
What provision of the Government Paperwork Elimination Act was designed to encourage a paperless society?
Ratling [72]
<span>Validation of electronic signatures was designed to encourage a paperless society.</span>
8 0
3 years ago
Read 2 more answers
Other questions:
  • In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the
    11·1 answer
  • Which of the following are potential drawbacks to the Internet in regard to politics? Select all that apply. Overexposure of can
    10·2 answers
  • Why ues storage unit?​
    12·1 answer
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    5·1 answer
  • Any part of the computer that you plug into the CPU like a phone, tablet, headphones etc. are called
    5·1 answer
  • Difference between Hard copy and Soft copy?​
    13·1 answer
  • When you cut and then paste a file, what are you doing?
    7·2 answers
  • Which of the following methods is a static method? The class in which the method is defined is given in parentheses following th
    5·1 answer
  • People think that they can send email messages from their personal computers and that it cannot be traced. This is called the __
    13·1 answer
  • Need comments added to the following java code:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!