1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna71 [15]
3 years ago
7

The Windows Remote Desktop Web connection that allows users to connect to a work or home computer and access files is considered

an insecure connection (T/F)
Computers and Technology
2 answers:
Volgvan3 years ago
8 0

Answer:

True

Explanation:

Windows Remote Desktop Web connection is an insecure connection because it can be used to run Remote Desktop sessions from within a browser such as Internet Explorer without installing any software on the the second computer. This also allow the user of the second computer to access the parent computer system without any prior notice to the owners of the files, folders or other documents in the parent system which may results to theft or copying of copyright documents. System's malware may also be transferred electronically either from the parent to the second computer or vise versa.

Lady_Fox [76]3 years ago
6 0

Answer:

It's true. The windows Remote Desktop web connection that allows users to connect to a work or home computer and access files is considered an insecure connection.

You might be interested in
Mail merge requires an MS Word document in order to work.<br><br> True<br> False
Kipish [7]

True is correct. Hope it helps


3 0
3 years ago
Read 2 more answers
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
2 years ago
"What is the running time of HEAPSORT on an array A of length n thatis already sorted in increasing order?
Harrizon [31]

Answer:

The answer to this question is O(NlogN).

Explanation:

The time complexity of Heap Sort on an array A is O(NLogN) even if the array  is already sorted in increasing order.Since the Heap Sort is implemented by creating the heap from the array and then heapifying and then repeatedly swapping first and last element and deleting the last element.The process will be done for the whole array.So the running time complexity is O(NLogN).

5 0
3 years ago
_________ cloud offers the services to a limited and well defined number of parties
denpristay [2]

Answer:

Private

Explanation:

5 0
2 years ago
2.4 Code Practice: Question 2
trasher [3.6K]

Answer:

num = float(input("Enter a number: "))

x =int(num)

y =float(num - x)

print(y)

Explanation:

It works I just did it!

5 0
3 years ago
Other questions:
  • When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihoo
    5·1 answer
  • Wich type of operating system is usually used in personal computers
    6·2 answers
  • Sometimes, fourth-generation languages (4GLs) are called procedural languages
    9·1 answer
  • John was carrying on at the water cooler the other day, trying to show off his knowledge of networking. He claimed that the comp
    10·1 answer
  • What form of note taking would be MOST beneficial for a visual learner who needs to see the connections between ideas?
    7·1 answer
  • (15) What is the best definition of a contextual tab?
    8·1 answer
  • Anyone got E-aqa login?​
    12·1 answer
  • Each pixel includes 3 colors; Red, Green and Blue. Each color uses 8 bits to store it's intensity. How many Bytes are needed for
    12·1 answer
  • Primary functions of lighting are sufficient light to...
    13·1 answer
  • Carlos had 194 seeds and 11 flower pots he put the same number of seeds in each flower pot which is the best estimate for the nu
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!