1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna71 [15]
4 years ago
7

The Windows Remote Desktop Web connection that allows users to connect to a work or home computer and access files is considered

an insecure connection (T/F)
Computers and Technology
2 answers:
Volgvan4 years ago
8 0

Answer:

True

Explanation:

Windows Remote Desktop Web connection is an insecure connection because it can be used to run Remote Desktop sessions from within a browser such as Internet Explorer without installing any software on the the second computer. This also allow the user of the second computer to access the parent computer system without any prior notice to the owners of the files, folders or other documents in the parent system which may results to theft or copying of copyright documents. System's malware may also be transferred electronically either from the parent to the second computer or vise versa.

Lady_Fox [76]4 years ago
6 0

Answer:

It's true. The windows Remote Desktop web connection that allows users to connect to a work or home computer and access files is considered an insecure connection.

You might be interested in
Consider sending a 2400-byte datagram into a link that has an mtu of 700 bytes. suppose the original datagram is stamped with th
Feliz [49]

Explanation:

Let, DG is the datagram so, DG= 2400.

Let, FV is the Value of Fragment and F is the Flag and FO is the Fragmentation Offset.

Let, M is the MTU so, M=700.

Let, IP is the IP header so, IP= 20.

Let, id is the identification number so, id=422

Required numbers of the fragment = [\frac{DG-IP}{M-IP} ]

Insert values in the formula = [\frac{2400-20}{700-20} ]

Then,        = [\frac{2380}{680} ] = [3.5]

The generated numbers of the fragment is 4

  • If FV = 1 then, bytes in data field of DG= 720-20 = 680 and id=422 and FO=0 and F=1.
  • If FV = 2 then, bytes in data field of DG= 720-20 = 680 and id=422 and FO=85(85*8=680 bytes) and F=1.
  • If FV = 3 then, bytes in data field of DG= 720-20 = 680 and id=422 and FO=170(170*8=1360 bytes) and F=1.
  • If FV = 4 then, bytes in data field of DG= 2380-3(680) = 340 and id=422 and FO=255(255*8=2040 bytes) and F=0.

3 0
4 years ago
The ____ algorithm tries to extend a partial solution toward completion
Fittoniya [83]

Answer: Backtracking

Explanation:

Backtracking algorithm approaches a solution in a recursive fashion whereby it tries to build answers and modify them in time intervals as we progress through the solution. One such backtracking algorithm is the N Queen problem whereby we place N Queen in a chessboard of size NxN such that no two queens attack each other. So we place a queen and backtrack if there is a possibility that the queen is under attack from other queen. This process continues with time and thereby it tends to extend a partial solution towards the completion.

8 0
4 years ago
What is a possible effect of malicious code cyber awareness 2022.
ANEK [815]

The possible effect of malicious code cyber awareness 2022 is that It can

  • damage or compromise digital files.
  • Erase  hard drive and give room for hackers access to  PC.

<h3>What are  malicious code?</h3>

They are codes that are dangerous to operation of our computer system and includes;

  • viruses, trojan
  • horses, worms
  • macros

Learn more about effect of malicious code at:

brainly.com/question/17209742

5 0
3 years ago
Ben is creating a presentation on the causes and effects of World War II. On a slide, he organizes text across two columns and u
podryga [215]
Ben can use the "Appear" animation, but he has to make sure he sets the effect options to "By paragraph", otherwise all bullets appear at the same time. I'm sure Ben can figure that out.
7 0
3 years ago
Read 2 more answers
Suppose that, on average, 4 percent of all cd drives received by a computer company are defective. the company has adopted the f
kicyunya [14]

The fraction of shipments that will be accepted is 0.1299.

<h3>How to calculate the probability?</h3>

Probability of a defective DVD = 0.04

Using Binomial distribution,

Fraction of shipments accepted = Probability of zero defects in sample of 50 = P(X = 0)

= 50C0 * 0.040 * (1 - 0.04)⁵⁰

= 0.96⁵⁰

= 0.1299

Fraction of shipments accepted = Probability of zero or one defects in sample of 50 = P(X = 0) + P(X = 1)

= 50C0 * 0.040 * (1 - 0.04)50-0 + 50C1 * 0.041 * (1 - 0.04)50-1

= 0.9650 + 50 * 0.04 * 0.9649

= 0.4005

Learn more about probability on:

brainly.com/question/24756209

#SPJ1

6 0
2 years ago
Other questions:
  • Janice has a "jammed" key on her keyboard. Every time she strikes the "S" key it sticks and doesn't pop back. What should Janice
    6·2 answers
  • Which of the following domain types is most trustworthy 1) .com 2) .tv 3).org 4) .edu
    15·2 answers
  • Some people are unable to arrange six matches to form four equilateral triangles because they fail to consider a three - dimensi
    6·1 answer
  • Which transmission media is faster? Fibre Optic or Radio-waves? I want full explanation!
    10·1 answer
  • What does the opacity effect do
    8·2 answers
  • A _____ is a type of legal protection for which person can apply to protect an invention or a discovery.
    9·1 answer
  • Similarities between inline css and internal css​
    6·1 answer
  • Why do people enjoy codehs
    15·1 answer
  • The sun emits invisible _____&gt; A) electromagnetic waves B) Waves C) Radiation D) Wavelength E) Ultraviolet Light
    8·1 answer
  • wooooooooo helll yeaaa made it to ACE baby now road to whatever next, lil present imma be doing You tube soon soo ideas will be
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!