1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elden [556K]
3 years ago
12

You install a teanviewer on your work station at home so that you can access it when on the road. How can you be assured that un

known users can’t access your computer
Computers and Technology
1 answer:
katen-ka-za [31]3 years ago
6 0

TeamViewer has a username and password system to make sure that only people with those can access your computer. Additionally, team viewer most likely has a service to make sure only connections through TeamViewer are allowed

You might be interested in
True/False: Each individual element of an array can be accessed by the array name and an element number, called a subscript. Tru
Dahasolnce [82]

Answer:

True

Explanation:

3 0
2 years ago
Select the true statement from the choices below. Group of answer choices Invalid code may cause browsers to render the pages sl
IrinaK [193]

Answer:

(A) A web page will not display in a browser unless it passes syntax validation testing.

(C)A web page must pass syntax validation testing before it is used.

Explanation:

A website is a collection of related web pages. A web page is an electronically arranged content page, designed and developed using web development application and language tool and hosted on a web server.

Web page or application development follows a series of well defined stages called software development life cycle (SDLC). The web application must go through these processes from birth to the end-of-life of the application.

The validation testing in SDLC, consisting of unit, acceptance and loading testing, which checks for syntax error or bugs on the written codes, because bugs could slow the loading of the page or even the display and browser compatibility of elements in the code.

5 0
3 years ago
Samantha is in the beginning stages of OOP program development. What are the five steps she must follow for creating an OOP prog
lora16 [44]

Answer:

1. Classes and objects

2. Inheritance

3. Polymorphism

4. Data hiding/ encapsulation

5. Interfaces.

Explanation:

Classes and objects depict the major component of the OOP (object oriented programming). It explains the object like a ball in a soccer game development.

The inheritance is like the subclass of the object. Data hiding is a stage in oop where the codes or data are hidden from another users.

In the polymorphism stage, the object is given the ability to change to a sub-object, while in the interface stage a function or method signature is defined without implementing it.

3 0
3 years ago
Read 2 more answers
Find the propagation delay for a signal traversing the in a metropolitan area through 200 km, at the speed of light in cable (2.
Ede4ka [16]

Answer:

t= 8.7*10⁻⁴ sec.

Explanation:

If the signal were able to traverse this distance at an infinite speed, the propagation delay would be zero.

As this is not possible, (the maximum speed of interactions in the universe is equal to the speed of light), there will be a finite propagation delay.

Assuming that the signal propagates at a constant speed, which is equal to 2.3*10⁸ m/s (due to the characteristics of the cable, it is not the same as if it were propagating in vaccum, at 3.0*10⁸ m/s), the time taken to the signal to traverse the 200 km, which is equal to the propagation delay, can be found applying the average velocity definition:

v = \frac{(xf-xo)}{(t-to)}

If we choose x₀ = 0 and t₀ =0, and replace v= 2.3*10⁸ m/s, and xf=2*10⁵ m, we can solve for t:

t =\frac{xf}{v}  =\frac{2e5 m}{2.3e8 m/s} =8.7e-4 sec.

⇒ t = 8.7*10⁻⁴ sec.

4 0
3 years ago
if you wanted to predict the value of the y variable when the x variable is 15, you would be _____ the data. correlating extrapo
Simora [160]

interpret is my answer


3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the difference between an internal and an external method call? In what situation would only internal calls be needed?
    11·1 answer
  • Give an example of a language L such that |L|=5 and |L^2|=16.
    5·1 answer
  • A benefit of flashcards is that they are
    7·2 answers
  • Namecoin is an alternative blockchain technology that is used to implement decentralized version of Routing Banking System.A. Tr
    14·1 answer
  • You would like to narrow your search on this topic.
    15·2 answers
  • In many supermarkets customers can pay for their shopping using credit cards. (a) Name two items of information stored on the ma
    8·1 answer
  • Please help I will mark brainliest ⚡️⚡️⚡️⚡️
    12·1 answer
  • Ethan wants to change the font in his document. He should _____.
    8·1 answer
  • If you need assistance or have questions related to your sevis record, i-20, admission, or course registration which phone numbe
    5·1 answer
  • personalization allows customers to modify the standard offering, such as selecting a different home page to be displayed each t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!