1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
2 years ago
13

You are the system administrator for Precision Accounting Services, which employs 20 accountants and 25 accounting assistants. T

he accounting assistants sit at different computers each day in a shared workspace. You want to give them a consistent desktop experience no matter which computer they sign in to. How can you do this
Computers and Technology
1 answer:
Naddik [55]2 years ago
4 0

What can  be done is to provide the computers with  remote access.

<h3>What is Remote access?</h3>

This involves the use of softwares that enables a single computer to view

or control others from any area.

Adopting this method means all the workers will have access to a

consistent desktop experience no matter which computer they sign in to

for work.

Read more about Remote access here brainly.com/question/26327418

You might be interested in
What’s the difference packet switching and message switching??
Sphinxa [80]
Im not sure but the person above is right x :)))


Explanation dudjdb
6 0
3 years ago
Which is a copyright
Levart [38]
The correct answer is D all of the above
5 0
3 years ago
Read 2 more answers
Which part of a computer is responsible for executing the software programs?
mamaluj [8]

Answer:

c. CPU

Explanation:

7 0
3 years ago
What is a collection of computing resources that are elastic and highly virtualized?
In-s [12.5K]

Answer:

private cloud

Explanation:

I just know

5 0
3 years ago
Pete would like to respond only to users within his organization with an automatic reply. He is configuring the automatic respon
zepelin [54]

Answer:

It is inside my organization tab

Explanation:

Correct on edg

7 0
3 years ago
Other questions:
  • Find the error in the following pseudocode. Module main () Call raiseToPower (2, 1.5) End Module Module raiseToPower (Real value
    10·1 answer
  • What computing platform was designed to help a beginner create interactive objects that receive input from sensors and use that
    11·1 answer
  • If your attack seems unsuccessful, one thing that you can investigate is whether the SYN cookie mechanism is turned on. SYN cook
    5·1 answer
  • Write a program that reads a sentence as input and converts each word to "Pig Latin". In one version of Pig Latin, you convert a
    7·1 answer
  • Which statement describes earthquakes?
    6·1 answer
  • Given a long integer representing a 10-digit phone number, output the area code, prefix, and line number using the format (800)
    11·1 answer
  • Write a program that accepts an integer value called multiplier as user input. Create an array of integers with ARRAY_SIZE eleme
    7·1 answer
  • Does anybody have the full answer sheet for Cisco Packet Tracer 11.10.1 (Design and implement a vlsm addressing scheme)? Will gi
    14·1 answer
  • One vulnerability that makes computers susceptible to walmare is:
    13·2 answers
  • ____________ is a process of reverse calculation to achieved a desired result. a. Data Consolidation
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!