1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ainat [17]
3 years ago
8

Is a protocol that allows users to log on to and access a remote computer?

Computers and Technology
1 answer:
kompoz [17]3 years ago
6 0
The answer is yes I hope this help ya out

You might be interested in
In round-robin scheduling,a) the time quantum should be larger than the context switch time. b) the time quantum should be as sm
pickupchik [31]

Answer: d. the time quantum should be as small as possible.

Explanation: Round robin is a CPU scheduling algorithm. If the time quantum is extremely small, number of context switches is very high, round robin scheduling will be same as processor sharing algorithm. Then the algorithm is good. Very large time quantum will make response time of processes too much which may not be tolerated in interactive environment.

3 0
3 years ago
Which type of word processing programs enables users to include illustrations within the program?
Nookie1986 [14]
Microsoft Word, Libre, and Google Docs have always enabled me to insert illustrations. Look for an image icon in the task icon, here you can select an image from your files. 
4 0
3 years ago
Select the correct answer. Why is it important to identify your audience while making a presentation? A. It helps you define the
Naddika [18.5K]

Answer:B

Explanation:

7 0
3 years ago
Read 2 more answers
Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.​
Reil [10]

Explanation:

Personal Insurance

Confidentiality in the workplace: What you need to know

When you give advice to clients or patients for a living, you'll know that protecting sensitive and personal information is crucial. But are you clear on what counts as a breach of confidence or what to do if one occurs?

From how to protect confidential information, to what breaches of confidence look like for different jobs, here's what you need to know about confidentiality in the workplace.

What is a breach of confidentiality?

In short, a confidentiality breach is the disclosure of information to someone without the consent of the person who owns it. In other words, failing to respect a person's privacy or the confidence in which they gave the information or data to you, by passing it onto someone else.

Why is confidentiality important?

Protecting confidential information is vital. If you're in a position where you have access to or are given this type of data at work, your career relies on your ability to keep patient or client confidentiality. If you don't, you could lose trust and integrity in the eyes of your existing (and potential future) clients, who could terminate your contract and take legal action against you.

Therapist/patient confidentiality

Unsurprisingly, patient confidentiality is highly important for therapists and counsellors. It forms part of the therapeutic frame of appropriate boundaries, which creates a safe space for a good working relationship to form.

Here’re some examples of ways you could unintentionally break patient/therapist confidentiality:

Sharing confidential information about a client with a family member or friend

Talking about confidential information somewhere you can be overheard

Leaving your computer containing confidential information open to others

Continuing to work with a client when there's a conflict of interests (for example, they know one of your family members or friends)

When permission to share information is given but isn't specific, this can create confusion and result in a potential breach (for example, a patient may give permission for their information to be shared with a teacher but not their GP)

7 0
4 years ago
sales reps at universal containers use salesforce on their mobile devices. They want a way to add new contacts quickly and then
Mamont248 [21]

Answer:

Build a global action to create Contacts

Explanation:

Based on the information given the mobile solution that an app builder should recommend should be GLOBAL ACTION because global action enables new contact to be created quickly ,Global actions also enables the creation or update of records as well sending email, all without leaving the page the person is working on which is why GLOBAL ACTION is often recommended because it saves time.

6 0
4 years ago
Other questions:
  • The time between requests to a web server is exponentially distributed with mean 0.5 seconds. NOTE: This is a multi-part questio
    8·2 answers
  • Ron is the IT director at a medium-sized company and is constantly bombarded by requests from users who want to select customize
    5·1 answer
  • Which of the following types does the Java programming language support?
    9·2 answers
  • What is the Matlab command to create a vector of the even whole numbers between 29 and 73?
    11·1 answer
  • Write a SELECT statement that selects all of the columns for the catalog view that returns information about foreign keys. How m
    6·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    8·2 answers
  • Wireless networks usually use ____ signals to send data.
    11·2 answers
  • Sypherpk is good go sub 2 him
    6·2 answers
  • Differences between formula and function as used in spreadsheet​
    13·1 answer
  • Suppose that​ 30% of the female students and​ 40% of the male students in a college history class are from a major city. If ther
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!