1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elden [556K]
3 years ago
12

You install a teanviewer on your work station at home so that you can access it when on the road. How can you be assured that un

known users can’t access your computer
Computers and Technology
1 answer:
katen-ka-za [31]3 years ago
6 0

TeamViewer has a username and password system to make sure that only people with those can access your computer. Additionally, team viewer most likely has a service to make sure only connections through TeamViewer are allowed

You might be interested in
Which Command Prompt commands in Windows is used for listing a computer connections to shared resources
olganol [36]

Answer:

H=-17:927+79#8=8-_82”w

Explanation:

18:80:@=&’:(@0:*

4 0
4 years ago
Create the tables and appropriate constraints based on the following ER diagram. Use appropriate data types. Note that the size
SpyIntel [72]

Answer:

See explaination

Explanation:

CREATE TABLE CATEGORY

(

cid int NOT NULL,

description varchar2(1000),

PRIMARY KEY (cid)

);

CREATE TABLE PRODUCT

(

pid int NOT NULL,

description varchar2(1000),

cid int,

price int,

p_size varchar2(1),

CONSTRAINT chk_price CHECK (price>0),

CONSTRAINT chk_size CHECK (p_size in ('S','M','L')),

CONSTRAINT fk_cid FOREIGN KEY (cid) REFERENCES CATEGORY(cid)

);

7 0
3 years ago
Controlled intersections use some form of which of the following:
Genrish500 [490]
A.all of the above it is correct 
7 0
4 years ago
What does hdtv stand for
Gnesinka [82]
High Definition Television
8 0
4 years ago
Read 2 more answers
Which of the following is not a key component of a structure?
valentina_108 [34]
D. Enumerations! Because I know that is NOT a leg compentent of a structure
5 0
3 years ago
Other questions:
  • A(n) _________ is an attempt to learn or make use of information from the system that does not affect system resources.
    13·1 answer
  • The largest group of Linux users is likely to be
    7·1 answer
  • Is there a way to get back old messages that you didn't mean to delete??? I have a Samsung S5 and I really really need help. I d
    11·2 answers
  • If you were to create a new app for a smartphone or tablet that does not already exist, what would you create?
    10·1 answer
  • Which statement will properly start the main() function? def main(): def Main def main# def main[]
    14·2 answers
  • If nothings faster than light then how do the dark get there first????
    5·2 answers
  • Find a 95% confidence interval for the mean failure pressure for this type of roof panel.The article "Wind-Uplift Capacity of Re
    7·1 answer
  • Cloud computing allows organizations to rent computing resources from providers instead of having their own locally managed ____
    7·1 answer
  • . Write a toString method for this class. The method should return a string containing the base, height and area of the triangle
    10·1 answer
  • Outline the dangers arising as a result of using computers​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!