1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VikaD [51]
3 years ago
6

You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away

. You get a call from a user who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what he is doing that might be causing the problem. What should you do?
Computers and Technology
1 answer:
wel3 years ago
5 0

Answer:

access the computer remotely

Explanation:

The best option would be to access the computer remotely. This allows you to remotely view the computer and control it from anywhere in the world. This allows you to take full control, analyze, and fix the problem that the individual is having without having to explain step by step to the user what they have to do. This can be accomplished through a direct IP connection or through a third-party software, which the user will need to have installed on their computer.

You might be interested in
To activate the Table Tools tab, _____.
igor_vitrenko [27]

Answer:

The answer is "select the table"

Explanation:

3 0
4 years ago
You are out on the water. you do not understand what another boater intends to do. what sound signal should you make?
olchik [2.2K]
When you do not understand what another boater intends to do, you are required to communicate this to the boater by sounding five or more short and rapid blasts. A short blast means a blast that takes about one second. The two vessel must stop or slow down until they clearly understand each other intent.
7 0
3 years ago
Which type of document would be best created in Word?
givi [52]

Answer:

it would be Animation I declare

6 0
2 years ago
What special responsibilities do computer professionals have with respect to understanding and protecting the privacy rights of
Lerok [7]

Explanation:

There are ethical responsibilities that must be linked to the use of technological systems by computer professionals in relation to the protection of the privacy rights of their fellow citizens.

Exercising ethical behavior is essential for computing to be used for its central benefits, which is to make life and tasks simpler and more dynamic, and not for technical knowledge about computer science to be used for personal or other benefits. , therefore, it is ideal that there is ethical responsibility for computer professionals so that ethical decisions are taken so that knowledge is used for the benefit of society and not to commit illegal acts.

7 0
3 years ago
Spanning Tree Protocol (STP) is a loop-prevention mechanism used in modern networks. STP is, however, vulnerable to misconfigura
maks197457 [2]

Answer:

Any of the following:

1. Root Guard

2. BPDU Guard

3. BPDU Filtering

Explanation:

Given that STP an acronym of Spanning Tree Protocol, and its major purpose is to stop the bridge loops and the broadcast radiation that emanates from its topology.

Cisco carried out three instruments or tools to protect the STP topology. These protection tools accompany the STP, and they are the following:

1. Root Guard

2. BPDU Guard

3. BPDU Filtering

3 0
3 years ago
Other questions:
  • HELLLLLP ill make you brainiest and ill give u a lot of points if you HELP ME Directions Part One.
    12·2 answers
  • Brandon purchased a new processor online as an upgrade. When he purchased the processor, he made sure that it used the same sock
    14·1 answer
  • Meadowdale Dairy Farm sells organic brown eggs to local customers. It charges $3.25 for a dozen eggs, or 45 cents for individual
    6·1 answer
  • What is the only line in a photograph that can imply motion
    8·1 answer
  • Which category of system software provides a platform for application software to run on?
    12·2 answers
  • You use ddl to create, modify, and delete the ___________________________ of a database.
    6·1 answer
  • In this assignment you'll write a program that encrypts the alphabetic letters in a file using the Vigenère cipher. Your program
    12·2 answers
  • Of the following choices what was the best thing to do with electronic equipment you no longer want
    7·1 answer
  • What is the output?
    11·2 answers
  • What does it mean that the right mouse button is context-sensitive?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!