1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetllana [295]
4 years ago
12

Your boss wants you to devise a way for remote contractors to be able to access the server desktop. There is one stipulation, ho

wever, in that your boss wants to ensure that the local user can see everything that the remote contractor is doing in real time. What do you suggest?
Question 4 options:
A. Install GoToMyPC on the server.
B. Install TeamViewer on the server.
C. Configure a VPN connection on the server.
D. Configure RDP within the server's web browser.

I think I know but I want to make sure .... Thank you
Computers and Technology
1 answer:
Dima020 [189]4 years ago
3 0

The answer is : A. Install GoToMyPC on the server. GoToMyPC is a remote desktop software that allows users to access computers remotely using a web browser. your computer is always a couple taps away. Just log in from another computer or mobile device.

You might be interested in
Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed
zmey [24]

Answer:

C. Must be respected if we are to function as complete, self-governing agents.

Explanation:

<em>Privacy</em> is the boundaries that are set up to protect us against unwanted intrusion or interference, and it forms the basis of our interaction with the world.

<em>Privacy laws</em> are set-up to protect individuals from unwanted and unapproved access to privacy by individuals, organizations, and government. This is greatly adhered to in many countries.

To some extent, privacy is considered to overlap with security, because, when private information such as social security number, bank card details, account names, and details, etc. are accessed inappropriately, the individual's security is greatly compromised.

Therefore, privacy must be greatly respected if we are to function as complete, self-governing agents.

8 0
3 years ago
In number theory, a perfect number is a positive integer that is equal to the sum of its proper positive divisors, that is, the
rusak2 [61]

Answer:

Explanation:

def the_perfect(n):

  try: #exception handling if n is a negative number

       n > 0

   except: #return -1 if the error is reached

       return -1

  else:

        total = 0

        for i in range(1, n): #for loop from 1 to the target number

           if n % i == 0:

               total += i

   return total == n  #should return true if number is perfect number

print(perfect_number(8))

8 0
3 years ago
Exercise 1-12 <br> This information is for Windsor, Inc. For the year ended December 31, 2017
Agata [3.3K]

Answer:

Please check the attachment.

Explanation:

Net change in cash, is the net increase in the cash from previous year which is 11900 here, and since the cash in hand is 17200, the net increment is 17200-11900 = 5300 from past year.

And the Cash forecast depends upon cash in hand, and which is 17200, and this is while disregarding future profit.

Rest of the details are in the file attached.

Download xlsx
8 0
3 years ago
Anybody, Know the answer? Pls no joking around the last time that i asked this same question the guy joked around.
Degger [83]

Answer:

i think it's the king was not impressed by cacao seeds brought to him by Columbus

Explanation:

4 0
3 years ago
What became of "the secret?" *<br> In hachet
mariarad [96]

Answer:

Answer and Explanation: In the book Hatchet, Brian refers often to the "Secret," which haunts him at the beginning and remains his secret at the end of the book. The "Secret" is that his mother has become involved with another man and that this situation has led to his parents' impending divorce.

Explanation:

5 0
4 years ago
Other questions:
  • The problem solving process begins by first ______ the problem.
    11·1 answer
  • How long would you need to work at McDonalds to earn enough money to buy a optiplex 3050, monitor, mouse and keyboard all from d
    7·2 answers
  • When do posts on social media networks disappear? A. After 5 years B. Once you've posted enough where it's too far to scroll bac
    5·2 answers
  • Match the careers with the education required for each job
    5·1 answer
  • A measuring cylinder is used to measure the volume of an irregular<br>solid object.​
    5·1 answer
  • How do i get the schools admin password for the good wifi
    10·2 answers
  • The programs in a computer are called
    7·1 answer
  • What is syntax?
    15·1 answer
  • Give four example of computer virus​
    13·1 answer
  • 4. Return the card number, first name, last name, and average late fee of each customer. Name this column as "Fee".
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!