1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
3 years ago
9

you install teamviewer on your workstation at home so that you can ac ess it when on the road. how can you be assured that unkno

wn users cant access your computer through team viewer?
Computers and Technology
1 answer:
Art [367]3 years ago
8 0

Obviously, they have to know your User ID and password.

Team Viewer is an effective tool that allows a zero configuration desktop session using a 3rd party server. When you install and run it, you are assigned an ID which is the username, and a password generated by team viewer broker servers. Whoever wishes to connect to a remote desktop must acquire the pin codes from the client. You cannot access a remote computer without both the username and the password of the client.

You might be interested in
The document responsible for describing the type of data stored in the database is called the:
vredina [299]

it's called the data dictionary

6 0
3 years ago
8.10 quiz edhesive A swap is: a variable used to find the smallest value in an array an algorithm used to find a value in an arr
zmey [24]

Answer:

A swap is: an algorithm exchanging two values stored in variables

Explanation:

I just did it and got it right

8 0
3 years ago
Please help me ASAP
jeka57 [31]

Answer:

Troubleshooting

Explanation:

These actions are called troubleshooting.

Troubleshooting is used to diagnose the unexpected error while you are performing some action on the computer. For example

You are running skype, and a one-day mic or sound performing unexpected error. What will you do? You have to perform the troubleshooting for MIC and sound to diagnose the problem.

During troubleshooting, you will wizard through steps of the procedure to diagnose the problem step by step. If the problem will be identified, the solution will be suggested.

You may experience sometimes your Wifi router at home not working. For this to identify the unexpected error you will perform the troubleshooting.

In short, troubleshooting is used to diagnose unexpected error while performing some action on the computer. If troubleshooting does not work, then close all the programs running on your machine, then shut down your computer. Wait a couple of minutes, and then start your computer and see, the problem may have been alleviated.  

3 0
3 years ago
And what way do you mixed and market economy support the ideals of democracy​
PolarNik [594]
Mixed and market economies protect individuals' ability to make their own economic decisions.
5 0
3 years ago
A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundanc
balandron [24]

Answer:

"Mesh topology" is the correct answer.

Explanation:

  • A mesh topology seems to be a network configuration where there has been an interconnection between each hardware and communications system. This topology configuration allows the distribution of many of these signals, although one of the connexons starts going down.
  • This topology needs to connect each destination to any other end destination, thus creating a completely pointless channel.
3 0
3 years ago
Other questions:
  • Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
    6·1 answer
  • What types of automation device might require specialist installer training?
    5·1 answer
  • I don’t know technically
    9·2 answers
  • How do you design video games
    5·1 answer
  • There are two activities on your schedule, which are: 1) install server in lab 2) move server into the data center. however, the
    6·1 answer
  • If you have a charger that’s not from Apple, then could that damaged your iPhone or not?
    5·1 answer
  • Type the correct answer in the box. In which phishing technique are URLs of the spoofed organization misspelled? _____ is a phis
    11·1 answer
  • The pay of an hourly worker is calculated by multiplying the hours worked by the hourly rate—up to 40 hours; any hours worked be
    11·1 answer
  • Which of the following is not an advanced strategy you may use to help you conduct a search on the Internet?
    15·2 answers
  • What method is used in the following line of code to associate clicking the left button with the event handler "clickSingle"?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!