1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elodia [21]
4 years ago
15

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them t

o display and control any computer on the network is called ___ desktop software.
Computers and Technology
1 answer:
Alborosie4 years ago
6 0

Answer:

Remote Desktop is the answer for the question.

Explanation:

Because It is an application which provides the ability to connect with the another computer through the internet connects whether that system is anywhere in this world but they required a proper internet connection. They also connects with no internet connection but they required the both systems in a proper range.

You might be interested in
A network technician has created a network consisting of an external internet connection, a DMZ,
Elden [556K]

Answer:

B.The admin private network allowing only admin access.

Explanation:

When the network technician created the network that consists of an external internet connection ,an internal private network,an administrative network and a DMZ.All the routers and the switches should be configured so that they can accept SSH connections from the admin private network that allows only admin access.

6 0
4 years ago
Tara has found a CTSO she’s interested in joining. How can Tara become a member of the CTSO? Tara can become a member of the CTS
Alex787 [66]
I'm not understanding this question, are there any options for the answer?
3 0
3 years ago
Read 2 more answers
The actual database of Active Directory shared resources is stored on one or more computers designated as:
RideAnS [48]

Answer:

2. domain controllers.

Explanation:

  • A domain is defined as a collection of users, computers, database servers, etc that are grouped together for some common purpose.
  • The database of these shared groups and resources is stored on one or more computers known as domain controllers.
  • It is a server that manages these groups that work together on the same network.
  • It is also responsible for administrating security and managing permissions in order to control access to the resources which are shared between multiple computers and users in one or more domains.
  • These permissions involve user authentication and authorization. Domain controllers is used to acknowledge authentication requests of users by verifying their username and password.
  • Domain controllers simplify security management in larger networks.
  • However domain controller serves need more hardware and resources for the purpose of securing shared information.
5 0
3 years ago
Chegg A full bootstrap program Select one: a. may be infected by viruses. b. is stored in ROM to ensure to avoid any infection f
harina [27]

Answer:

Option b = "is stored in ROM to ensure to avoid any infection from viruses. "

Explanation:

In order to to understand the fundamentals of an Operating system in computer one needs to know what the bootstrap program is.

The BOOTSTRAP PROGRAM is first program that will run when the computer is switched on, thus the program( the BOOTSTRAP PROGRAM) will be the program to open the OPERATING SYSTEM.

The device in laptops and personal computers known as ROM is an acronym that stands for Read-Only Memory and it is a storage medium. Because of ROM inability to get Virus it is used in the storage of Bootstrap program.

8 0
3 years ago
Select all the mistakes in the following: There may be more than one.
sdas [7]

The if statement should have two equal signs, the elseif should be elif, and the else statement should have a colon at the end of it.  There might be more errors in the indentation but I cant know unless I see a picture of the problem. The print statement should be indented into the if, elif, and else statements.

4 0
3 years ago
Other questions:
  • Which of the following is NOT a search engine ( Bing, Yahoo, Ask, Twitter)
    6·2 answers
  • Which of the following is the java comparison operator for "not equal to"
    10·1 answer
  • Mechanisms of evolution
    7·1 answer
  • Why is fluency in information technology becoming increasingly important for many college majors?
    9·2 answers
  • To hide the shaded space between pages, ____. select one:
    10·1 answer
  • Describe the following types of Cloud services:
    11·1 answer
  • I have 2 questions How do i send a picture for someone to answer the hw?
    6·2 answers
  • The encapsulating security ______ protocol provides secrecy for the contents of network communications as well as system-to-syst
    14·1 answer
  • Which of the following responses is the best example of a problem that can be solved using a computer program?
    6·2 answers
  • An 802. 11 frame contains a number of fields. Which field describes the version of 802. 11 that is being used?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!