1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skad [1K]
2 years ago
5

What is the difference between Remote Assistance and Remote Desktop?

Computers and Technology
1 answer:
9966 [12]2 years ago
7 0
Remote Desktop allows remote connections and controls how long an invitation to connect remains open; Remote Assistance lets you choose whether to allow connections, not allow connections, and add or remove certain
You might be interested in
Business intelligence is gained through industrial espionage and the gathering of this information often includes illegal or une
Nataly [62]

Answer:

A) True

Explanation:

Industrial espionage utilizes both illegal and unethical methods in gathering information about a corporate organization in order to get business intelligence. This involves stealing intellectual property and trade secrets to use them for a competitive advantage.  because Information about company's products, services, finances, sales, etc can be toold for  economic warfare

3 0
3 years ago
What is the name for the type of flash memory that is used by mobile devices to store their apps and data?
tankabanditka [31]
D. Solid state is correct
5 0
3 years ago
A10:A20 Refer to values in
Keith_Richards [23]
The range of cells in column A and rows 10 through 20
8 0
2 years ago
True or false for a given set of input values, a nand
Katen [24]
Nand stands for "not and". The truth table for a nand is:

a b | a nand b
0 0 |      1
0 1 |      1
1 0 |      1
1 1 |      0

Hopefully this helps you answer your question.
6 0
2 years ago
These factors influence the design of a network.
REY [17]
Availability ,devices and applications, performance, security, scalability.
8 0
2 years ago
Read 2 more answers
Other questions:
  • 1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
    6·1 answer
  • In this context, the word “session” refers to _____.
    5·2 answers
  • Which style did Jack use on the vocabulary words in reports?
    14·2 answers
  • The challenge of preparing for ____________________ is in ensuring that employees do not feel that they are being prepared for t
    7·1 answer
  • Write a recursive method called lengthOfLongestSubsequence(a, b) that calculates the length of the longest common subsequence (l
    15·1 answer
  • What is one disadvantage of transmitting personal data using digital signals?
    15·2 answers
  • SINCE I CANT SEE IT KANG LOOK
    6·2 answers
  • PLSS HELP ASAP ILL GIVE BRAINLIES THANKS
    7·2 answers
  • (lesson 7.9: acceptance-rejection --- continuous examples.) consider the constant . on average, how many iterations (trials) wil
    6·1 answer
  • what component of virtualization controls all physical memory, and thus has the ability to make any unused memory pages in each
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!