1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna71 [15]
4 years ago
7

The Windows Remote Desktop Web connection that allows users to connect to a work or home computer and access files is considered

an insecure connection (T/F)
Computers and Technology
2 answers:
Volgvan4 years ago
8 0

Answer:

True

Explanation:

Windows Remote Desktop Web connection is an insecure connection because it can be used to run Remote Desktop sessions from within a browser such as Internet Explorer without installing any software on the the second computer. This also allow the user of the second computer to access the parent computer system without any prior notice to the owners of the files, folders or other documents in the parent system which may results to theft or copying of copyright documents. System's malware may also be transferred electronically either from the parent to the second computer or vise versa.

Lady_Fox [76]4 years ago
6 0

Answer:

It's true. The windows Remote Desktop web connection that allows users to connect to a work or home computer and access files is considered an insecure connection.

You might be interested in
A large corporation uses:<br>LAN<br>WAN<br>Wireless network<br>Ethernet connection​
Katen [24]

Answer:

Probably would use LAN

Explanation:

Schools use LAN to connect students to their networks, so it would make sense for them to use LAN for offices. They could use ethernet if all their PCs are hard wired in, though.

3 0
4 years ago
Read 2 more answers
Walter’s health insurance premium increased by 22 percent this year. Now he pays $488 every month for health insurance. What was
ElenaW [278]

Answer:

$380.64

Explanation:

So he what you do is take $488 multiply it by 22% to get $107.36 you then subtract $488 from $107.36 to get what he was paying before premium increase which is $380.64

7 0
4 years ago
Columns are most useful for which tasks ?
amid [387]
Laying out newsletters and creating a visual appeal without images
5 0
3 years ago
What questions do they ask for the 08.03 Discussion- Based Assesment in Drivers Ed?? Thanks.
mel-nik [20]

When should my headlights be turned on?

Why shouldn't one take medication before driving?

Why must you use a turn signal?

I'm not sure about that last one because I forgot but I think its right.

6 0
4 years ago
Assume that x and y are boolean variables and have been properly initialized. !(x || y) || (x || y) The result of evaluating the
LenaWriter [7]

Answer:

The answer is "Always true "

Explanation:

Following are the program to this question:

#include <iostream>//header file

using namespace std;

int main()//main method

{

bool x=true;//defining bool variable x and assign value

bool y=false;//defining bool variable y and assign value

if(!(x || y) || (x || y))//use given condition with if block

{

   cout<<"True";//print true message

}

else//defining else block

{

   cout<<"false";//print false message

}

   return 0;

}

In the above code two bool variable is declared, that hold ture and false, and used in the given expression with the condition statement, that checks the given value. In the code the logical gate OR gate that always print the true value.

3 0
3 years ago
Other questions:
  • A dmz is a subnet of _____________ accessible servers placed outside the internal network.
    10·1 answer
  • The website of an international human rights organization stores a large database of information and provides search functionali
    15·1 answer
  • Which of the following means to find and fix errors in code?Which of the following means to find and fix errors in code?
    5·1 answer
  • What is the final value for X ?<br><br> x= 1<br><br> x=13<br><br> x= x+3<br><br> x=0
    9·1 answer
  • The methodology used by web project teams is usually:
    9·1 answer
  • Someone receives and email that appears to be from their bank requesting them to verify account information, this type of attack
    10·1 answer
  • Animations<br> Animations are !<br> Blank which can be Applied to blank in a presentation?
    7·1 answer
  • Imaging a computer is part of what phase of conversion?
    14·1 answer
  • List resource you can utilize if you are experiencing technology issued
    5·1 answer
  • Pls anyone answer this Resource sharing is the need of network because?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!