1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna71 [15]
4 years ago
7

The Windows Remote Desktop Web connection that allows users to connect to a work or home computer and access files is considered

an insecure connection (T/F)
Computers and Technology
2 answers:
Volgvan4 years ago
8 0

Answer:

True

Explanation:

Windows Remote Desktop Web connection is an insecure connection because it can be used to run Remote Desktop sessions from within a browser such as Internet Explorer without installing any software on the the second computer. This also allow the user of the second computer to access the parent computer system without any prior notice to the owners of the files, folders or other documents in the parent system which may results to theft or copying of copyright documents. System's malware may also be transferred electronically either from the parent to the second computer or vise versa.

Lady_Fox [76]4 years ago
6 0

Answer:

It's true. The windows Remote Desktop web connection that allows users to connect to a work or home computer and access files is considered an insecure connection.

You might be interested in
In the context of machine learning, an artificial neural network (ann) is most likely used for?
Marianna [84]

In the context of machine learning, an artificial neural network (ANN) exists most likely utilized for oil and gas exploration (Option c).

<h3>What is machine learning?</h3>
  • Machine learning (ML) guides to a kind of artificial intelligence based on computer algorithms capable of producing predictions without being programmed to do so.

  • Machine learning algorithms are used in various industries, including, among others, medical diagnostics, bioinformatics, image processing, modification of hygiene in production plans, etc.

  • Moreover, an artificial neural network (ANN) directs to a machine learning technique that receives inputs and then delivers explicit outputs regarding predefined activation functions.

  • This kind of computation network (artificial neural network) exists similar to neuronal biological networks carried out by neurons.

Hence, In the context of machine learning, an artificial neural network (ANN) exists most likely utilized for oil and gas exploration (Option c).

To learn more about Machine learning refer to:

brainly.com/question/25523571

#SPJ4

The complete question is,

In the context of machine learning, an artificial neural network (ANN) is most likely used for

a. Supplying explanations for solutions.

b. problems that require the use of if-then-else rules.

c. oil and gas exploration.

d. portfolio development and analysis.

7 0
2 years ago
A=3<br> b = 2<br> print (a ** b)<br> What is output?
Lady bird [3.3K]

Answer: ( 3**2)

Explanation: honestly I can't help you. Try google it is waiting for you with open harms.  

6 0
3 years ago
Read 2 more answers
Mention one application of AI from the real world and describe the use of of this application what is the type of learning used
gayaneshka [121]

Answer:

The real world AI application is Google Duplex. It is able to receive orders for making reservations. Then it calls the shop or the place and deals with the person and talks to him very fluently and informs you about the reservation. Some other general types of AI application are Google Assistant, Siri , Amazon Alexa and so on. But google Duplex is lot more advanced than them.

4 0
3 years ago
Write a definition in your own words for Raster Graphic. Do not copy and paste please.
Vlada [557]

Answer:

Raster Graphic is a bitmap. They are basically a grid of small pixels that make an image.

6 0
3 years ago
Ron was asked to maintain a database to record the height of every student in class.
Fiesta28 [93]

B. =Compare(B3;B4)

hope I helped!!!

4 0
3 years ago
Read 2 more answers
Other questions:
  • An indicator is a comprehensive analysis of critical information
    8·1 answer
  • The ____________ mechanism consists of a lever arm attached to the mousetrap spring.
    15·1 answer
  • what tool can a student use to make sure his or her work paper does not take credit for someone else's work ?
    5·1 answer
  • Convert (35.125)10 to binary
    9·1 answer
  • Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or
    8·2 answers
  • Yesterday you installed a new game on your computer. When you ran the computer, you noticed that the application was running ver
    10·1 answer
  • Which statement is true about hacking?
    11·2 answers
  • The device that store data and program for current purpose​
    6·2 answers
  • Today's manufacturing workplace is most likely to include
    8·1 answer
  • What is the difference between the wiring configurations for a residential, 8-position, 8-contact (8P8C) modular plug and jack i
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!