You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote Desktop Connection from saving information to the local computer?​

Answers

Answer 1

Answer:

You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote ...


Related Questions

in a table from identify any three differences between data and information​

Answers

Answer:

Find the differentiation below.

Explanation:

The differences between data and information can be found below;

        Data                                                    Information

1. Data is an assembly of facts.         Information is a collection of facts but with                                                               meaning attached.                                                                                                                                                                                                                      

2. Data is unstructured.                     Information is structured.

3. Data is easily comprehended.      Information is easily comprehended  

                                                           because of its organized nature.                            

                                                           

Which company has the highest number of operating system versions on the market?

Linux

Microsoft

Apple

IBM

Answers

Microsoft has the highest number of operating system versions on the market, including Windows 11, Windows 10, Windows 8, Windows 7, Windows Vista, Windows XP, Windows 2000, Windows NT, Windows ME, Windows 98, Windows 95, Windows 3.1, Windows 3.0, Windows 2.0, and Windows 1.0.

The correct answer is Microsoft

How did the case Cubby v. CompuServe affect hosted digital content and the contracts that surround it?

Answers

Although CompuServe did post libellous content on its forums, the court determined that CompuServe was just a distributor of the content and not its publisher. As a distributor, CompuServe could only be held accountable for defamation if it had actual knowledge of the content's offensive character.

What is CompuServe ?

As the first significant commercial online service provider and "the oldest of the Big Three information services," CompuServe was an American company. It dominated the industry in the 1980s and continued to exert significant impact into the mid-1990s.

CompuServe serves a crucial function as a member of the AOL Web Properties group by offering Internet connections to budget-conscious customers looking for both a dependable connection to the Internet and all the features and capabilities of an online service.

Thus,  CompuServe could only be held accountable for defamation if it had actual knowledge of the content's offensive character.

To learn more about CompuServe, follow the link;

https://brainly.com/question/12096912

#SPJ1

The largest form of a computer network is called
कम्प्युटर नेटवर्कको सबैभन्दा ठूलो रूप
aekar.xe.​

Answers

Answer:

Internet.

Explanation:

In computing, WWW simply means World Wide Web. The world wide web was invented by Sir Tim Berners-Lee in 1990 while working with the European Council for Nuclear Research (CERN); Web 2.0 evolved in 1999. Basically, WWW refers to a collection of web pages that are located on a huge network of interconnected computers (the Internet). Also, users from all over the world can access the world wide web by using an internet connection and a web browser such as Chrome, Firefox, Safari, Opera, etc.

In a nutshell, the World Wide Web is an information system that is generally made up of users and resources (documents) that are connected via hypertext links.

The largest form of a computer network is called internet because it comprises of several groups of computer that are interconnected.

Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.

HELP WILL MARK BRAINLEST

Answers

Answer:

10 - true

11 - true

12 - analytic

13 - factory robots

Explanation:

:)

I need to create a python program with these guidelines can someone please help me.
It needs to be a list of numbers

Take inputs and add them to the list until there at 10 items.
- Prints the initial list and a count of the items in the initial list
- Sums all the items in the list and prints the sum.
- Multiplies all the items in the list and prints the product.
- Gets the largest number from the list.
- Gets the smallest number from the list.
- Removes the largest and smallest numbers from the list.
- Prints the final list and a count of the items in the final list.

Answers

l=[]

for x in range(10):

   l.append(float(input('Enter a number: ')))

print(str(l)+'\n'+'There at '+str(len(l))+' items in the list')

print('The sum of the elements in the list is: '+str(sum(l)))

t=1

for x in l:

   t*=x

print('The product of the elements in the list is: '+str(t))

print('The largest number in the list is: '+str(max(l)))

print('The smallest number in the list is: '+str(min(l)))

l.remove(max(l))

l.remove(min(l))

print(str(l)+'\n'+'There are '+str(len(l))+' items in the list')

I wrote my code in python 3.8. I hope this helps

Design and implement a program that reads a series of 10 integers from the user and prints their average. Read each input value as a string, and then attempt to convert it to an integer using the Integer.parseInt method. If this process throws a NumberFormatException (meaning that the input is not a valid number), print an appropriate error message and prompt for the number again. Continue reading values until 10 invalid integers have been entered.

Answers

Answer:

Explanation:

The following program was written in Java. It creates a loop that asks the user for numbers. If it can convert it to an integer it accepts it and adds it to the sum variable otherwise it ouputs that it is not a valid number. Once all 10 integers are added it prints the Average of the values entered.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int count = 0;

       int sum = 0;

       while (count != 10) {

           System.out.println("Enter a number: ");

           String answer = in.nextLine();

           try {

               int intAnswer = Integer.parseInt(answer);

               sum += intAnswer;

               count += 1;

           } catch (NumberFormatException e) {

               System.out.println("Not a valid number.");

           }

       }

       int average = sum / count;

       System.out.println("Average: " + average);

   }

}

The goal of this problem is to cover all roads with cameras. A camera placed at a station can cover all the roads connected to it. For example, if we place a camera at station 0, the roads (or edges) (0,3) and (0,8) are covered. Note: the edges (0,3) and (3,0) are the same. We want to find all solutions that can cover a network. For example, one solution is to place a camera at each station will cover all roads. In G2, which has 10 stations, this solution is the set {0,1,2,3,4,5,6,7,8,9} or [True, True, True, True, True, True, True True, True, True). Another solution for G2 is {2, 3, 5, 8} or [False, False, True, True, False, True, False, False, True, False, False]. Any road/edge in G2 is connected to one of these 2 or 3 or 5 or 8. Therefore, {2,3,5, 8} is one of the solutions we look for. The code below is almost complete in printing out all solutions, i.e. sets of stations that cover an entire network. What you need to do for this problem is modyfing the is_coverage function, which returns True if the solution is a coverage, and False if it is not. At this time, it's just a placeholder, which always returns True. This is obviously incorrect. You need to fix it. [42]: def is_coverage (solution, G): return True def get_stations(s): return set([i for i in range(len(s)) if s[i]==True]) def cover(G, solution, i): if i==len(solution): if is_coverage (solution, G): print(get_stations ( solution)) else: solution[i] = True cover(G, solution, i+1) solution[i] = False cover(G, solution, i+1)

Answers

Answer:

srry dont know

Explanation:

What is wrong with the following code?
int name = "Steve":
if (name = "Steve") {
System.out.prſntln("Hi Steve!);
}

Answers

what language code are you using?

write the program to accept the radius of circle and find its diameter coding

Answers

Um is there a picture for I can help because u forgot to put a picture:(

What are the purposes of a good web page design?
The purpose of a good web page design is to make it
and

Answers

Answer:

functional and aesthetically pleasing/look nice

Answer:

Link and lokk nise and spell word correctly

Explanation:

Hope it help if im wrong im sorry

Hey tell me more about your service

Answers

Answer:

look below!

Explanation:

please add more context and I’ll be happy to answer!

This type of network may not be connected to other networks.


A) LAN
B) MAN
C) WAN

Answers

Answer:

LAN

Explanation:

brainliest?:(

Answer:

A) LAN (Local Area Network)

How to write a java program that asks the user for grades of students. Once the user enters 0 (zero), the program should print the largest of the marks of the students.

Answers

Answer:

import java.util.Scanner;

public class GradeProgram {

   public static void main(String[] args) {

       Scanner sc = new Scanner(System.in);

       System.out.println("Please enter the student grades: ");

       int grade = sc.nextInt();

       int largestGrade = 0;

       while (grade != 0) {

           if (grade > largestGrade) {

               largestGrade = grade;

           }

           grade = sc.nextInt();

       }

       System.out.println("The largest grade is: " + largestGrade);

   }

}

Explanation:

Assume you are a manager in the security department of a high-tech corporation. You are mentoring Mary, an entry-level network technician, who is considering a career change to specialize in security. She asks you for advice as to whether she should self-study to become a security professional or seek formal education, such as a bachelor's degree in information security. What is your advice to Mary

Answers

Answer:

Seek a bachelor's degree.

Explanation:

Seems more compromised and education from people with experience already.

Mary, my advice to you would be to pursue formal education such as a bachelor's degree in information security, to specialize in the field.

Why should Mary consider pursuing a bachelor's degree in information security?

By obtaining a formal education in information security, such as a bachelor's degree, you will gain a comprehensive understanding of the fundamental principles, theories, and practices of security.

This will provide you with a solid foundation and knowledge base to excel in your career as a security professional. Additionally, pursuing a degree will often expose you to practical hands-on experiences, internships, and networking opportunities which will greatly enhance your learning and help you establish valuable connections within the industry.

Read more about security manager

brainly.com/question/32458782

#SPJ2

which type of computer is used to process large amount of data​

Answers

Answer:

Mainframe Computer

Explanation:

Supercomputers

if you are looking for a different answer, please let me know and i will take a look! i'd love to help you out with any other questions you may have

To qualify for a particular scholarship, a student must have an overall grade point average of 3.0 or above and must have a science grade point average of over 3.2. Let overallGPA represent a student’s overall grade point average and let scienceGPA represent the student’s science grade point average. Which of the following expressions evaluates to true if the student is eligible for the scholarship and evaluates to false otherwise?

a: (overallGPA > 3.0) AND (scienceGPA ≥ 3.2)
b: (overallGPA > 3.0) AND (scienceGPA > 3.2)
c: (overallGPA ≥ 3.0) AND (scienceGPA ≥ 3.2)
d: (overallGPA ≥ 3.0) AND (scienceGPA > 3.2)

Answers

Answer:

([tex]overallGPA \ge 3.0[/tex]) AND ([tex]scienceGPA > 3.2[/tex])

Explanation:

Given

[tex]overallGPA \to[/tex] Overall Grade Point Average

[tex]scienceGPA \to[/tex] Science Grade Point Average

Required

The expression that represents the given scenario

From the question, we understand that:

[tex]overallGPA \ge 3.0[/tex] --- average [tex]greater\ than\ or[/tex] equal to [tex]3.0[/tex]

[tex]scienceGPA > 3.2[/tex] --- average [tex]over[/tex] 3.2

Since both conditions must be true, the statements will be joined with the AND operator;

So, we have:

([tex]overallGPA \ge 3.0[/tex]) AND ([tex]scienceGPA > 3.2[/tex])

This image shows a web designer's grids for different pages on a website. The uppermost box on each page is the website's identity. Which important
feature of a good website has the designer violated?
A simplicity
B.
consistency
Ос
clarity
D. harmony

Answers

Answer: d

Explanation: hope this helps

Answer:

consistency

Explanation:

i got it right on plato

In a network, servers receive requests from which of the following?
clients, which are the networked computers that request data.
O other networked computers, which use encrypted messages.
O ISPs, which control the type of data that can be sent on the network.
O routers, which direct the data to the correct destination.

Answers

Answer: routers, which direct the data to the correct destination.

Explanation:

In a network, servers receive requests from the routers, which direct the data to the correct destination.

The router simply refers to the networking device which helps in the forwarding of data packets between the computer networks. When a data packet is sent through one of the lines, then the information regarding the network address will be read by the router which will help it in determining the destination.

Answer:

A. clients, which are the networked computers that request data

100% right!

plz i need help what is wrong on line 14

Answers

Indentation is very important in python. You need to indent code inside while loops, for loops, if statements, etc. You don't seem to be indenting.

In this example:

while (secretNum != userGuess):

   userGuess = int(input("Guess a number between 1 and 20: "))

Although, you might need to indent more than only this line. I hope this helps.

Hi, I have a CodeHS Python assignment called "Exclamation Points"


the assignment is as follows and I have no idea where to start with this if someone could help me please:


"Words are way more edgy when you replace the letter i with an exclamation point!


Write the function exclamations that takes a string and then returns the same string with every lowercase i replaced with an exclamation point. Your function should:


Convert the initial string to a list

Use a for loop to go through your list element by element

Whenever you see a lowercase i, replace it with an exclamation point in the list

Return the stringified version of the list when your for loop is finished"

Answers

Using the knowledge in computational language in python it is possible write the function exclamations that takes a string and then returns the same string with every lowercase i replaced with an exclamation point.

Writting the code;

my_string = input("Enter text: ")

my_list = list(my_string)

for item in my_list:

   if item == "i":

       print "!"

       my_list.remove("i")

   print item

(" ").join(my_list)

my_string = list(input('Enter string: '))

for i, char in enumerate(my_string):

   if char == 'i':

       my_string[i] == '!'

print(''.join(my_string))

my_string = input("Enter text: ")

my_list = list(my_string)

for item in my_list:

   if item == "i":

       print "!"

       my_list.remove("i")

   else:

       print item

(" ").join(my_list)

See more about python at  brainly.com/question/18502436

#SPJ1

Pharming involves: setting up fake Wi-Fi access points that look as if they are legitimate public networks. redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. pretending to be a legitimate business's representative in order to garner information about a security system. using emails for threats or harassment. setting up fake website to ask users for confidential information.

Answers

Answer:

Explanation:

Pharming involves redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. An individual can accomplish this by changing the hosts file of the web address that the user is trying to access or by exploiting a DNS server error. Both of which will allow the individual to convince the victim that they are accessing the website that they were trying to access, but instead they have been redirected to a website that looks identical but is owned by the individual. The victim then enters their valuable and private information into the website and the individual can see it all and use it as they wish. Usually, this is done to steal banking information.

A nested folder can best be described as what?
O a folder that is empty
a folder that contains more than one file
O a folder contained within another folder
O a folder that contains exactly one file

Answers

A folder contained within a folder

In this problem, you will derive the efficiency of a CSMA/CD-like multiple access protocol. In this protocol, time is slotted and all adapters are synchronized to the slots. Unlike slotted ALOHA, however, the length of a slot (in seconds) is much less than a frame time (the time to transmit a frame). Let S be the length of a slot. Suppose all frames are of constant length L = kRS, where R is the transmission rate of the channel and k is a large integer. Suppose there are N nodes, each with an infinite number of frames to send. We also assume that dprop < s,="" so="" that="" all="" nodes="" can="" detect="" a="" collision="" before="" the="" end="" of="" a="" slot="" time.="" the="" protocol="" is="" as="">

⢠If, for a given slot, no node has possession of the channel, all nodes contend for the channel; in particular, each node transmits in the slot with probability p. If exactly one node transmits in the slot, that node takes possession of the channel for the subsequent k â 1 slots and transmits its entire frame.

If some node has possession of the channel, all other nodes refrain from transmitting until the node that possesses the channel has finished transmitting its frame. Once this node has transmitted its frame, all nodes contend for the channel.

Note that the channel alternates between two states: the productive state, which lasts exactly k slots, and the nonproductive state, which lasts for a random number of slots. Clearly, the channel efficiency is the ratio of k/(k + x), where x is the expected number of consecutive unproductive slots

a. For fixed N and p, determine the efficiency of this protocol.
b. For fixed N, determine the p that maximizes the efficiency.
c. Using the p (which is a function of N) found in (b), determine the efficiency as N approaches infinity
d. Show that this efficiency approaches 1 as the frame length becomes large

Answers

Answer:

He is correct

Explanation:

How many rows are in the SFrame?

Answers

Answer: It's not possible for me to know how many rows are in a specific SFrame without more information. The number of rows in an SFrame will depend on the data that it contains and how it was created.

Explanation: SFrame is a data structure for storing large amounts of data in a tabular format, similar to a spreadsheet or a SQL table. It was developed by the company Turi, which was later acquired by Apple. SFrames are designed to be efficient and scalable, and they can store data in a variety of formats, including numerical, categorical, and text data.

What benefit do internal networked e-mail systems provide over Internet-based systems?

A) They enable the transmission of videos.
B) They allow e-mail to be sent to coworkers.
C) They allow files to be shared by sending attachments.
D) They provide increased security.

Answers

Answer:

The correct answer is D) They provide increased security.

Match each characteristic to its operating system.

[A] This system can be ported to more computer platforms than any of its counterparts.
[B] The operating system functions require many system resources.
[C] The operating system works only with specific hardware.

[1] Microsoft Windows Operating System
[2] Linux Operating System
[3] Apple Operating System

Answers

Answer:

[A] This system can be ported to more computer platforms than any of its counterparts. - [2] Linux Operating System

[B] The operating system functions require many system resources. - [1] Microsoft Windows Operating System

[C] The operating system works only with specific hardware. - [3] Apple Operating System

disk based recording systems are always (A) digital (B) analog (C) Both digital and analog

Answers

Answer:Disk based recording systems are always Digital.

A table student consists of 5 rows and 7 columns. Later on 3 new attributes are added and 2 tuples are deleted. After some time 5 new students are added. What will be the degree and cardinality of the table?​

Answers

Answer:

The degree of a table refers to the number of attributes (columns) it has. In the case you described, after the 3 new attributes are added, the degree of the table would be 7 + 3 = 10.

The cardinality of a table refers to the number of rows (tuples) it has. In the case you described, after 2 tuples are deleted, the cardinality of the table would be 5 - 2 = 3. After 5 new students are added, the cardinality would increase to 3 + 5 = 8.

arrange the following numbers in ascending order -2/3, 7/-18 , 5/-19​

Answers

Answer:

2/3 5/19 7/18

Explanation:

Other Questions
True or false: Passing the CPA exam, or its equivalent in other countries, establishes only the minimum threshold of competence needed to conduct a high-quality audit. What is cultural innovation theory? FRENCH IAVOIR and ITS EXPRESSIONSDirections: Choose the best answer for each item.Il ______ cinq stylos. (1 point) as a aiNous ________ raison. (1 point) sommes allons avonsJ'ai froid. (1 point) I am hot. I am cold. I am hungry._______-vous une voiture? (1 point) Avez Allez AvonsTu ______ quinze ans? (1 point) as vas esElle a tort, n'est-ce pas? (1 point) She is hungry, isn't she? She is wrong, isn't she? She is late, isn't she?J(e)'________ un cours de franais. (1 point) ai as aNous avons faim. (1 point) We are cold. We are hungry. We are thirsty.Ils _______ tort. (1 point) ont sont vontAs-tu soif? (1 point) Are you hungry? Are you sleepy? Are you thirsty?J'ai sommeil. (1 point) I'm sleepy. I'm thirsty. I'm hot.Vous _______ raison. (1 point) allez avez allonsElles ont chaud. (1 point) They are cold. They are sleepy. They are hot.Qui _______ faim? (1 point) a ai asMichelle et moi _________ chaud. (1 point) avons avez ontPhilippe et toi _______ raison. (1 point) avons avez ontIls ont raison! (1 point) They are right! They are wrong! They are sleepy!On ______ soif. (1 point) as ont aA-t-il raison? (1 point) Is he right? Is he wrong? Is he sleepy?J(e)' _________ sommeil. (1 point) ai as a Hi I need help on this I've tried about 55 times already and I want to smash my computer into bits so if anyone can help please I need it Which of the following devices is used for connecting multiple network hosts where the physical signal is always repeated to all ports?A. BridgeB. RouterC. HubD. Switch Ceteris paribus, if the Fed sells bonds through open market operations, the money Supply curve should shift rightward. Supply curve should shift leftward. Demand curve should shift rightward. Demand curve should shift leftward. I NEED HELP I HAVE BEEN DOING THIS FOR HOURS I ACTUALLY HAD A MENTAL BREAKDOWN PLEASE HELP ME I WILL MARK BRAINLIEST Whose footsteps will you follow and why? BRU YALL WACK I DID NOT GET NO ANNSWERS WHAT SO ever DANG THIS IS THE WACKES SiTE IVE SEEN IN 100 years 9Which is NOT a power of the Senate?A Approve all treatiesB Approve presidential appointmentsC Act as jury in trials of impeachmentDOverrule the House of Representatives The reason distributors embody economies of scale is that certain per unit costs are lower with each increasing unit. Which of the following costs are subject to this phenomenon ?A) ShippingB) TransportationC) HandlingD) All of the above What are the differences between thermionic and photoelectric emission? Which of the following were contributors to a rapid growth in cities during the late 1800's and early 1900's? NEED HELP I SUCK AT ELA(+100 POINTS)(+BRAINLEST)(+5STARS)(+THANKS ON PROFILE)Combine these sentences to create a complex sentence that begins with a dependent clause.Frank felt ill.He ate too many hot dogs.Remember: use the best possible conjunction and watch your punctuation!WHEN YOU BEGIN A SENTENCE WITH A DEPENDENT CLAUSE, YOU NEED TO HAVE A COMMA AFTERWARDS. What is the degree of polynomial 2 y Y 2y8? Mind mapping of the teaching-learning-assessment process convert 67kelvin to degrees celcius what did the colonies lose in the french and indian war? Which level of government collects property taxes and sales taxes? Select the correct answer.The class sizes of the Introductory Psychology courses at a college are shown below.121, 134, 106, 93, 149, 130, 119, 128The college adds a new Honors Introductory Psychology course with 45 students. What effect does the new class size have on the center and spread of the class sizes of the Introductory Psychology courses at the college? A. The value of the center increases and the distribution has a larger spread. B. The value of the center decreases and the distribution has a smaller spread. C. The value of the center decreases and the distribution has a larger spread. D. The value of the center increases and the distribution has a smaller spread.