1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jek_recluse [69]
3 years ago
13

A simulation system is a technology that enables you to take over a customer’s screen, mouse, or other connected device in order

to perform tasks such as troubleshooting incidents, transferring files, and providing training.
A) True
B) False
Computers and Technology
1 answer:
Mademuasel [1]3 years ago
7 0

Answer:

B) False

Explanation:

The simulation system is a process that operates with the task related to the real world. when a computer system used to process multiple tasks with the simulation, such systems are known as simulation systems.

When one user wants to connect to another user system to get its access to a mouse, screen and other connected devices, one should use the remote controlling applications. some of them are anydesk, Teamviewer, ammy admin, etc.

So the given statement is false.

You might be interested in
You are troubleshooting an issue where a PC can reach some hosts on the Internet (using either DNS name or IP address), while se
wolverine [178]

The options are missing from the question,below are the options to choose from;

A) incorrect (or missing) routes in a routers routing table

B) incorrect DNS configuration on the PC

C) incorrect default gateway configuration on the PC

D) duplicate IP addresses on your LAN

Answer: The correct answer to the question is option A

INCORRECT (OR MISSING) ROUTES IN A ROUTERS ROUTING TABLE.

Explanation: When it is possible for a PC to ping some devices but not actually all,we can then make an assumption that either it has a wrong subnet that is configured or the router from the path to the remote device actually has an incorrect or a missing routes to the device.

5 0
3 years ago
One of the ways attackers can access unencrypted data being transmitted on your network is by
nikdorinn [45]
<span>One of the ways attackers can access unencrypted data being transmitted on your network is by </span>collecting electronic emissions that come from your networking closet or Ethernet cables. 
5 0
3 years ago
PLEASE HELP
Schach [20]

Answer:

Here

Explanation:

If you use a single user account on your computer, everyone will share the same application settings, files, and system permissions. Application Settings: When you use a single user account, everyone using the computer will use the same browser. Most programs will use different settings for each user account.User accounts also serve as a means for granting permissions, applying logon scripts, assigning profiles and home directories, and linking other working-environment properties to a user.

hope it helps ;P

7 0
3 years ago
Which program, available on all operating systems, provides all types of information from a dns server and allows you to query a
JulsSmile [24]

The program Nslookup, is available on all operating systems and provides all types of information from a DNS server and allows you to query all types of information from a DNS server and change how your system uses DNS.

The network administration command-line tool nslookup can be used to verify that your DNS servers can resolve external domain names.

6 0
3 years ago
Select the correct answer.
konstantin123 [22]
Hello!

Similar to the keyboard character keys F and J, the number 5 on the numeric keypad has a bump on it.

This is to also help position your fingers on the keypad when typing numbers.

Hope this helps!
5 0
2 years ago
Other questions:
  • A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu
    9·1 answer
  • Use the Web as a resource to study the PDF format. a. Describe how PDF provides output that is consistent across different types
    8·1 answer
  • If you want to wrap text so that it fits a particular cell size, which formatting section would you use?
    9·2 answers
  • What natural resource are available on the coast but not somewhereelse
    13·1 answer
  • A Ground Fault Circuit Interrupter (GFCI) works by comparing the amount of current going to and returning from equipment along t
    10·2 answers
  • Computer keyboard failures can be attributed to electrical defects or mechanical defects. A repair facility currently has 25 fai
    14·1 answer
  • How do I write the yearly salary for something without copying it word for word? I'm doing a PowerPoint ( which you had to choos
    15·1 answer
  • Write a function check_palindrome that takes a string as an input and within that function determines whether the input string i
    12·1 answer
  • when you insert a new column, the existing columns are shifted to the ____ and the new column has the same width as the column d
    10·1 answer
  • What is ‘situational awareness” in game design?please answer in a full sentence!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!