1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KIM [24]
4 years ago
9

You grant them remote access to your computer to enable them to act as you to fix the situation. what type of os must be install

ed on your machine to allow this type of action by another person?
Computers and Technology
1 answer:
Shalnov [3]4 years ago
8 0
*nix has the su (Substitute User) command and Windows has the runas command. In addition, *nix has the sudo (Super User DO) that can be used for individual commands without giving up a priveledged password.
You might be interested in
A ________ is a computer or other electronic device connected to a network
Tanzania [10]
A _node_ is a computer or other electronic device connected to a network.

With the _mesh_ network topology, reliability is the major advantage while high cost is the disadvantage.
8 0
3 years ago
When using an IDE, what must you do to use a class that's stored in a library? Select one: a. Nothing. Classes in libraries are
AleksAgata [21]

Answer:

Both B and C

Explanation:

In order to use methods from another class (library) in your code, the class library will have to be added or imported into your code.

This is implemented in different ways across different programming languages, for example;

Java uses the keyword import followed by the class library name

C++ uses the key word #include

C# Uses the keyword using

8 0
3 years ago
Read 2 more answers
mystery_int_1 = 3 mystery_int_2 = 4 mystery_int_3 = 5 You may modify the lines of code above, but don't move them! Above are thr
hodyreva [135]

Answer:

The solution code is written in Python

  1. import random
  2. mystery_int_1 = 3  
  3. mystery_int_2 = 4  
  4. mystery_int_3 = 5
  5. print(str(mystery_int_1) + " " + str(mystery_int_2) + " " + str(mystery_int_3))
  6. while(mystery_int_1 > 0 or mystery_int_2 > 0 or mystery_int_3 > 0 ):
  7.    mystery_int_1 = random.randint(-5, 5)  
  8.    mystery_int_2 = random.randint(-5, 5)  
  9.    mystery_int_3 = random.randint(-5, 5)  
  10.    print(str(mystery_int_1) + " " + str(mystery_int_2) + " " + str(mystery_int_3))

Explanation:

Firstly import random module (Line 1).

Next, create three variables to hold the three mystery numbers (Line 3-5). Display the first set of three mystery numbers in one line (Line 6).

While any one of the three mysteries number  still bigger than zero, the while loop will keep going (Line 8). In the loop, three new mystery numbers will be generated using the randint method (Line 9-11). We presume the random value is in range -5 to 5. Print the new set of mystery number on the same line (Line 12).  

6 0
3 years ago
When multiple frames arrive at the same location at the same time resulting in a garbled signal is called what?
Inessa05 [86]

Answer:

A

Explanation:

because there are multiple frames

4 0
3 years ago
An organization that wishes to leverage the power of social media and elastic cloud opportunities to help accomplish its goals a
Kruka [31]

Answer:

The answer is "technology"

Explanation:  

In the ideal scenario, a company which needs to leverage social networking resources and open cloud tools to achieve its objectives and priorities must use the information systems division of all its IT team.

  • It is used to achieve goals through knowledge, techniques, and methods.
  • It typically serves as a generic term for computer and their networks, but it includes other IT technology, including TV and smartphones.
6 0
3 years ago
Other questions:
  • What can be described as a measure of the amount of matter or material an object contains as well as taking gravitational pull i
    11·1 answer
  • Which boolean operator (and, not, or or) gives you the least results? *?
    6·1 answer
  • 1.The character escape sequence to force the cursor to go to the next line is________: 2. The character escape sequence to force
    8·1 answer
  • When a startup failure occurs before the logon user interface appears, the problem could be hardware-related but it is most like
    14·1 answer
  • Which type of tools enable you to choose only a portion of the image
    13·1 answer
  • This morning when Paul turned on his computer at work, it would not boot. Instead, Paul reported that he heard a loud clicking n
    12·1 answer
  • A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
    8·1 answer
  • Do not use the scanner class or any other user input request. You application should be self-contained and run without user inpu
    5·1 answer
  • What steps can you take to secure your private information?.
    8·1 answer
  • What does a good résumé help you do?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!