1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
3 years ago
6

Explain how an off-site computer can be used to modify a drawing held at another computer location.

Computers and Technology
1 answer:
Otrada [13]3 years ago
3 0

Answer:

Through a remote network shared by both computers

You might be interested in
What are the two broad categories that individual definitional techniques fall under? Check all that apply. Demonstrative defini
insens350 [35]

The two broad categories that individual definitional techniques fall under Extensional (denotative) definitions and Intentional (connotative) definitions.

<h3>What is Extensional (denotative) definitions?</h3>

These definitions are those which use more applicable information than other type of definitions. These definitions relate with the objective reality.

Thus, the correct options are C and D.

Learn more about Extensional (denotative) definitions

brainly.com/question/947482

#SPJ1

5 0
2 years ago
One difference between setters and getters is: a setter has one or more parameters; a getter has no parameters.
tangare [24]
Boiiiiiiiii.
This is not a question
7 0
4 years ago
What methods do phishing and spoofing scammers use? List and explain methods to protect against phishing and spoofing scams.
Elza [17]

How can you protect against phishing and spoofing scams?

Anti-spyware and firewall settings should be used to prevent phishing attacks and users should update the programs regularly. Firewall protection prevents access to malicious files by blocking the attacks. Antivirus software scans every file which comes through the Internet to your computer.

6 0
3 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
4 years ago
What is the best wi-fi name you have ever seen?
elena-s [515]

Answer:

bill wi the science fi

Explanation:

8 0
3 years ago
Other questions:
  • Given the following code:
    9·1 answer
  • A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
    13·2 answers
  • Why might a neurosurgeon receive a higher wage than a nail technician ?
    12·2 answers
  • What critical-thinking tool is being used when asking the question, Is this information specific enough?
    9·1 answer
  • Which of these tools can best be used as a self assessment for career planning purposes?
    6·2 answers
  • How to save an edited document.​
    6·1 answer
  • .
    5·1 answer
  • Write javascript code for the form that appears in the image below. you are expected to add validation to the name field, email
    10·2 answers
  • Electronic data interchange (EDI) and electronic funds transfer (EFT) are forms of__________e-commerce transactions.
    13·1 answer
  • A data analyst uses _____ to decide which data is relevant to their analysis and which data types and variables are appropriate
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!