1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna71 [15]
3 years ago
7

The Windows Remote Desktop Web connection that allows users to connect to a work or home computer and access files is considered

an insecure connection (T/F)
Computers and Technology
2 answers:
Volgvan3 years ago
8 0

Answer:

True

Explanation:

Windows Remote Desktop Web connection is an insecure connection because it can be used to run Remote Desktop sessions from within a browser such as Internet Explorer without installing any software on the the second computer. This also allow the user of the second computer to access the parent computer system without any prior notice to the owners of the files, folders or other documents in the parent system which may results to theft or copying of copyright documents. System's malware may also be transferred electronically either from the parent to the second computer or vise versa.

Lady_Fox [76]3 years ago
6 0

Answer:

It's true. The windows Remote Desktop web connection that allows users to connect to a work or home computer and access files is considered an insecure connection.

You might be interested in
Identify measures to protect your computer against threats from human actions. You cannot access a file in a computer that belon
scZoUnD [109]

Answer:

Firewalls

Explanation:

A firewall is simply a network security system whose main duty is. to prevent unwanted access to. private network.

Firewalls is measures to protect your computer against threats from human actions.

It is also the one singular thing that prevents you from accessing the file on your friends system.

5 0
3 years ago
Can I make all front end project with Javascript OOP(Object Oriented Programming)?
anyanavicka [17]

Answer:

yeah u can my brother go for it

6 0
2 years ago
Briefly explain the cooling mechanism implemented in FANLESS Laptops
Akimi4 [234]

The primary function of a fan in a computer system is to cool down the internal components and prevent overheating. Fanless computers use alternative cooling methods and lower-powered components that give off less heat. As a result, these machines are quieter during operation, use less energy and are often more compact than fan-based computers. These advantages are particularly important in business settings.
8 0
3 years ago
You and three of your friends decide to hike the Appalachian Trail, a 2175-mile trail running from Georgia to Maine, starting wh
kozerog [31]

Answer:

The things to do:

a. Lie down flat.

b. Call your friend on phone to inform him of the situation, if he is not already aware.

c. Instruct him to call the rescue team and a helicopter ambulance.

d. Make a video call to your doctor and ask her for first aid instructions.  She can use HIPAA compliant video-conferencing tools to initiate consultations and treatment with you from the far distance.

e. Follow your doctor's instructions.

Explanation:

Telemedicine is the extension of medical services to patients in remote places.  This practise is facilitated by the use of telecommunication devices and telemedical equipment.  Telemedicine is made possible by technological advancements.  Many healthcare practitioners have embraced the practice and offer their patients telemedical services as the need arises.

Modern technology has enabled doctors to consult patients by using HIPAA compliant video-conferencing tools.

HIPAA stands for the Health Insurance Portability and Accountability Act of 1996, which was enacted by the 104th United States Congress and signed by President Bill Clinton in 1996.  The Act encourages Healthcare access to remote patients, medical consultation and treatment portability, and secures health information, among others.

7 0
3 years ago
What layer is responsible for routing messages through an internetwork in the tcp/ip model?
Paul [167]

Answer:

<h2>The TCP/IP model consists of four layers: application, transport, internet, and network access. Of these four layers, it is the internet layer that is responsible for routing messages.</h2>
4 0
2 years ago
Other questions:
  • You’ve received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before ex
    15·1 answer
  • Which of the following is NOT one of the most important elements when designing a website?
    8·2 answers
  • one business rule is that each project has one manager. Identify two (and no more than two) problems with the data structure or
    9·1 answer
  • What advantage do ExpressCard modules and U.S.B adapters offer over expansion cards?
    10·1 answer
  • If you copy a drawing from the Internet and use it in a report, you might be violating the artist's
    8·1 answer
  • In news writing, which is bigger , a topic or a angle
    10·1 answer
  • Select the correct answer. Which is the bottom-most layer in the OSI model?
    9·1 answer
  • Describe your previous personal or professional experience with Microsoft Word.
    9·1 answer
  • Draw a flow chart to access the marks of three students. calculate the total avarage and display the result​
    11·1 answer
  • Immigrants are allowed to enter the country to work when they have a(n)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!