The user can close all the programs if he closes the open virtual desktop true false

Answers

Answer 1

The user cannot close all the programs if he closes the open virtual desktop.

What are virtual desktops?

A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.  The desktop environment is separated from the physical device used to access it.

I call it a false desktop.

It is use to separate your work activities.

Therefore, the user cannot close all the programs if he closes the open virtual desktop.

learn more on virtual desktop here: https://brainly.com/question/14332029

#SPJ12


Related Questions

Mr. Gomez notes that a Private Fee-for-Service (PFFS) plan available in his area has an attractive premium. He wants to know if he must use doctors in a network as his current HMO plan requires him to do. What should you tell him

Answers

The thing that he will be told is that he may receive healthcare services from any doctor allowed to bill Medicare.

What is Medicare?

Medicare simply means a government national health insurance program in the United States.

In this case, the thing that he will be told is that he may receive healthcare services from any doctor allowed to bill Medicare.

Learn more about Medicare on:

brainly.com/question/15074045

#SPJ12

_______ is used to transmit high-bandwidth digital data over telephone lines.

Answers

A DSL is used to transmit high-bandwidth digital data over telephone lines.

What device is used to transmit data over telephone line?

DSL is known to be a kind of a technology that is made for high-speed network or is one that is used via Internet access over voice lines.

Therefore, A DSL is used to transmit high-bandwidth digital data over telephone lines.

Learn more about modem from

https://brainly.com/question/7320816

#SPJ11

Write an algorithm to calculate the cube of a number

Answers

Explanation:

step 1 - Start

step 2 - Input l

step 3 - Cube =l×l×l

step 4 - Print the cube

step 5 - End

Which is the preferred means of trapping user input for errors?

Answers

Escaping is the preferred method used for trapping user inputs for errors.

HTML (HyperText Markup Language)

Most web pages users interact with today are designed based on the rules of HTML. In a web-based environment, a preferred means developers use to trap user input for errors is the escape string. This typically involves using mysql_real_escape_string() when coding.

You can learn more about escaping here https://brainly.com/question/14821549

#SPJ12

An end-user received an email stating his bank account was compromised, and that he needs to click a link to reset his password. When the user visited the site, he recognized it as legitimate and entered his credentials which were captured by a hacker. What type of social engineering attack does this describe

Answers

Answer:

A phishing attack

Explanation:

Phishing attack is the process of delivering fake communications that appear to come from a trusted source. It is often done by email. The purpose is to steal personal information such as credit card and login information, or to installing malicious on the victim's PC. Phishing is a widespread sort of cyber assault that everyone should be aware of in order to stay safe.

Phishing in the banking industry seeks to get personal information such as banking logins, PINs, bank account information, and credit card details. Fraudsters utilize this data to gain access to accounts, transfer funds, perpetrate credit card fraud, or sell it on the black market. Occasionally hackers are content just to obtain user's personal information and credit card details for financial benefit. In other circumstances, phishing emails are sent in order to get employee login credentials or other details for use in more hostile assaults against a small group of people or a single firm. Phishing is a sort of cyber assault that everyone should be aware of in order to protect oneself and guarantee organizational email security.

to link the data from one table to another in an access relational database, a(n) ____ must be common to each table.

Answers

To link the data from one table to another in an access relational database, a field must be common to each table.

Want is database?

It should be noted that database simply means an organized collection of structured information or data stored in a system.

In this case, to link the data from one table to another in an access relational database, a field must be common to each table.

Learn more about database on:

brainly.com/question/26096799

#SPJ12

isdn is considered to be what type of wan connection?

Answers

ISDN is considered to be a type of circuit-switched connection WAN connection.

What is a WAN?

WAN is an acronym for wide area network and it can be defined as a telecommunication network that covers a wide range of geographical locations, especially for the purpose of communication between different users in different countries or regions across the world.

Integrated Services Digital Network (ISDN) is considered to be a type of circuit-switched connection wide area network (WAN) connection.

Read more on WAN here: https://brainly.com/question/8118353

#SPJ12

Network administrators use _____ technology when they need antivirus updates to be automatically downloaded on employees' workstations

Answers

Network administrators use push technology if they need antivirus updates to be downloaded on employees' workstations.

What is a network administrator do?

Network and computer systems administrators are known to be people who are responsible for the day-to-day running of the operation of a given networks.

Note that in the case above,  Network administrators use push technology if they need antivirus updates to be downloaded on employees' workstations.

See options below

a.

push

c.

virtual reality

b.

pull

d.

SaaS

Learn more about Network administrators from

https://brainly.com/question/5860806

SPJ12

Cisco cyber security would classify this email?

Answers

Cisco cyber security would classify this email as security threats.

How do Cisco cyber security classify email security threats?

They classify them as:

Malware Delivery via Spam. Credential TheftBusiness Email Compromise, etc.

Note that in the case above, Cisco cyber security would classify this email as security threats

Learn more about Cisco from

https://brainly.com/question/23388335

#SPJ12

Computer science student jones has been assigned a project on how to set up sniffer. What just he keep in mind as part of the process?

Answers

In the case above, what just comes to  mind as part of the process is option d.

What is sniffer?

A sniffer is known to be a kind of a software or hardware tool that gives room for a person to be able to “sniff” or look through one's internet traffic in real time, getting  all the data flowing to and from a person's computer.

Therefore, In the case above, what just comes to  mind as part of the process is option d.

Learn more about sniffer from

https://brainly.com/question/14265770

#SPJ1

A consumer purchased a grass trimmer from a hardware store. He took it out of the sealed box and assembled it according to the instructions. He noticed that there were bolts and screws left over and some joints that could have accepted additional fasteners, but he just disposed of the extra hardware. As he was using the trimmer, the housing came apart and a hard piece of plastic flew off. His neighbor, who was standing nearby, was struck in the eye by the piece of plastic and suffered permanent injuries. The neighbor sued the hardware store and the manufacturer of the trimmer in a strict liability action. Through discovery, it was determined that the instructions omitted a critical step in the assembly process that would have used the extra hardware, which is why the housing came apart, and that the manufacturer had received some complaints about the instructions previously. The hardware store had no knowledge of any complaints regarding any of the manufacturer's products. As to the hardware store, the neighbor will:

Answers

As to the hardware store, the neighbor will recover because the consumer's failure to recognize the improper assembly doesn't cut off the stores liability.

What is hardware?

It should be noted that hardware means the tangible computer components that run the written instructions.

In this case, as to the hardware store, the neighbor will recover because the consumer's failure to recognize the improper assembly doesn't cut off the stores liability.

Learn more about hardware on:

brainly.com/question/24370161

#SPJ12

Technicians who perform sealed-system service on small appliances must have; Question 13 options: Type I, II, or III certification. Type I or Universal certification. Type II certification. A Universal 609 certification

Answers

The technician who performs sealed-system service on small appliances must have Type I or Universal certification. Thus, the correct option is B.

What is a Sealed-system service?

A sealed-system service may be defined as those services which are performed by the technician that can be sealed by the product of the company with the mark of OK tested.

Type I certification delivers to those technicians who service, maintain and repair small appliances that incorporate CFCs, HCFCs, or HFCs.

Technicians can hold either Type I or Universal certification which includes Type I to service appliances sheathed under Section 608.

Therefore, it is well described above.

To learn more about technicians, refer to the link:

https://brainly.com/question/5122191

#SPJ1

Your colleague needs to update details of a large campaign and wants to use structured data files (SDFs) for making these changes. Before uploading everything to Display and Video 360, they ask you to double-check the files. Which setting will cause an error

Answers

The setting will cause an error when they set up a single SDF with both line item and insertion order rows.

What are SDF?

Structured Data Files (SDF) are known to be a form of spreadsheets that are seen as csv files that is said to be very cheap to make and edit campaigns, insertion orders and others.

Note that The setting will cause an error when they set up a single SDF with both line item and insertion order rows.

See options below

They set up an SDF with rows for both editing and removing line items.

They set up an SDF for modifying inventory sources.

They set up an SDF with 100 line items in a single file.

They set up a single SDF with both line item and insertion order rows.

Learn more about structured data files from

#SPJ1

What process sends ones and zeroes across network cables

Answers

Answer:

modulation

Explanation:

Modulation is the procedure of encoding data into electrical signals for transmission through a media. For transmission, binary information, denoted by a sequence of ones and zeros, should be translated to analog or digital electrical signals. The method converts data into electrical signals suited for transmission is known as modulation.  Digital modulation is the transmission of binary signals zeroes and ones.

The process that sends ones and zeroes across network cables is modulation.

What is modulation?

Modulation is the process of encoding information from a message source in a way that is suitable for transmission

In other words,  the process by which information is encoded into electrical signals for transmission over a medium.

Binary information, are represented by a series of 1s and 0s and must be converted to analogue or digital electrical signals for transmission.

learn more on modulation here: https://brainly.com/question/14592357

#SPJ12

What are the three computer components that hold a dangerous amounts of electricity? Even when it’s unplugged.

Answers

The components of a computer that hold a dangerous amount of energy even when it's unplugged are capacitors, and inductor.

What is electricity?

Electricity is the flow of charges in a closed system. Electricity is very important to run electronic devices, but electricity can damage the tissues of human body and cause heart attack if touch it with hands.

Thus, the components of a computer that hold a dangerous amount of energy even when it's unplugged are capacitors, and inductor.

Learn more about electricity

https://brainly.com/question/12791045

#SPJ1

Suppose a family has had a house fire in which they lost many photos, and they are worried about losing more if they have another. Which of the following is a reason this family may want to digitize their photos? Choose all that apply.

A: to make it easier to e-mail photos to friends

B: to maximize file space on their hard drive

C: to minimize risk of losing photos by backing them up in virtual space

D: to save space in their home

Answers

Answer:

C - Minimize the risk of future loss.

Explanation:

All four reasons listed are valid reasons to digitize family photos, but in this instance where this family has lost photos in a house fire before, minimizing the risk of losing photos in the future might be their primary goal.

Question 2 A data analyst uses the Color tool in Tableau to apply a color scheme to a data visualization. In order to make the visualization accessible for people with color vision deficiencies, what should they do next

Answers

In order to make the visualization accessible for people with color vision deficiencies, he should make sure the color scheme has contrast.

What is a color scheme?

A color scheme can be defined as a combination or arrangement of different colors, which are used during the design and development of a software, project, etc.

In this scenario, the data analyst should make sure the color scheme has contrast so as to make the visualization accessible for people with color vision deficiencies.

Read more on data analyst here: https://brainly.com/question/27748920

#SPJ1

Devices that connect to the internet are often categorized into silos. Which silo controls network traffic?

Answers

In Computer networking, the silo that controls network traffic are known as switches and routers.

What is a silo?

A silo can be defined as a classification which is used to categorize network devices that connect to the Internet.

In Computer networking, the silo that controls network traffic are known as switches and routers because they can be used by a network administrator to control network connectivity and traffic.

Read more on router here: brainly.com/question/24812743

#SPJ12

What was the name of the first computer, developed by charles babbage?.

Answers

Answer: Analytical Engine

Explanation:

Answer:

analytical engine - 1837

What's an operating system ~ ​

Answers

Answer:

Is it software that controls and manages hardware components and translates instructions so that the hardware can do what one instructs it to do

Explanation:

An operating system is a large collection of system software which manages the resources of computer system such as memory, storage, processor, input/output devices alongside acting as an interface between machine and user.

When did Microsoft released MS-Word 2016? S When did Microsoft released MS - Word 2016​

Answers

Answer:

July 9, 2015

Explanation:

It was released on macOS on July 9, 2015, and on Microsoft Windows on September 22, 2015, for Office 365 subscribers. Mainstream support ended on October 13, 2020, and extended support for most editions of Office 2016 will end on October 14, 2025, the same day as Windows 10.

Students and classes have a _____ relationship

Answers

In the above, Students and classes have a many-to-many relationship.

What is many-to-many relationship?

A many-to-many relationship is one that often taxes place when a lot of records in a table are linked with a lot of records in another table.

Therefore, In the above, Students and classes have a many-to-many relationship as they are known to have multiple relationship or records.

See options below

a. one-to-one b. one-to-many

c. many-to-one d. many-to-many

Learn more about relationship from

https://brainly.com/question/10286547

#SPJ12

what does a dns server do

Answers

A DNS server is a type of server that translate requests for domain names into IP addresses.

What is a DNS server?

A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.

This ultimately implies that, a DNS server is a type of server that translate requests for domain names into IP addresses.

Read more on a website here: https://brainly.com/question/26324021

#SPJ12

Which set of cisco ios commands instructs the ips to compile a signature category named ios_ips into memory and use it to scan traffic?

Answers

A set of Cisco IOS commands that instructs the IPS to compile a signature category with the name IOS_IPS into memory are listed below.

What is a command?

A command can be defined as the set of instructions that is used to configure a network device such as a router, so as to make it active on a computer network and enable it perform certain tasks automatically during network communication.

In this scenario, a set of Cisco IOS commands that can be used to instruct the IPS in compiling a signature category with the name IOS_IPS into memory and use it to scan network traffic include the following:

R1(config)# IP IPS signature-category.R1(config-ips-category)# category IOS_IPS basic.R1(config-ips-category-action)# retired false.

Read more on commands here: brainly.com/question/17147683

#SPJ12

How do economists use data? check all that apply

Answers

Economists use data:

To explain trends in production and shipping.To follow and predict unemployment rates.

How do economists make predictions?

Economists  often uses data to make forecast and it is where there is the use of sample data from a population that brings about uncertainty.

Note that Economists use data:

To explain trends in production and shipping.To follow and predict unemployment rates.

See options below

How do economists use data? Check all that apply.

to follow and predict unemployment rates

to communicate with customers instantly

to ship goods to countries all over the world

to explain trends in production and shipping

to apply automation to reduce production costs

Learn more about economists from

https://brainly.com/question/9913581#SPJ12

how does python show that commands belong inside a python structure?

Answers

Python show that commands belong inside a Python structure by using indentation to define the code blocks.

What is Python?

Python can be defined as a high-level programming language that is designed and developed to build websites and software applications, especially through the use of dynamic commands (semantics) and data structures.

In Computer programming, Python show that commands belong inside a Python structure by using indentation to define the code blocks.

Read more on Python here: https://brainly.com/question/26497128

#SPJ1

Which is considered the most widely used cloud computing service?

Answers

The most widely used cloud computing service is the Amazon web services.

What is cloud computing?

It should be noted that cloud computing simply means the on-demand availability of computer resources without direct active management by the user.

In this case, the most widely used cloud computing service is the Amazon web services.

Learn more about cloud computing on:

brainly.com/question/19057393

#SPJ12

The digital divide is the difference between careers which depend on technology and those that depend on human intuition and analysis. true or false?

Answers

The digital divide is the difference between careers which depend on technology and those that depend on human intuition and analysis is a false statement.

What is the digital divide?

The digital divide is known to be a term that connote the gap that exist between demographics and areas that have room to modern information and communications technology (ICT), and those that do not really have room (access) or they do have restricted access.

Therefore, The digital divide is the difference between careers which depend on technology and those that depend on human intuition and analysis is a false statement.

Learn more about digital divide from

https://brainly.com/question/7478471

#SPJ1

of the choices listed, which is the correct protocol to access a remote computer and execute commands?

Answers

The correct protocol to access a remote computer and execute the commands is Using the winrs command

What is a remote computer?

A remote computer is a computer that a user has no access to physically, but may be able to access it remotely via a network link from another computer.

Therefore, remote computers are connected to another computer via a network link.

Hence, he correct protocol to access a remote computer and execute the commands is Using the winrs command

learn more on remote computer here: https://brainly.com/question/14951054

#SPJ11

when connecting to a wireless local area network (wlan), what is the most important fact about the service set identifier (ssid)?

Answers

The most important fact about the service set identifier (SSID) is that all the end users and all access points (AP) must be configured with matching SSIDs.

What is SSID?

SSID is an acronym for service set identifier and it can be defined as the generic name given to a wireless local area network (WLAN) connection.

In Computer networking, the most important fact about the service set identifier (SSID) is that all the end users and all access points (AP) must be configured with matching SSIDs.

Read more on wireless local area network here: https://brainly.com/question/13697151

#SPJ11

Other Questions
Read the excerpt from "The Goatherd and the Wild Goats.He gave his own goats just sufficient food to keep them alive, but fed the strangers more abundantly in the hope of enticing them to stay with him and of making them his own.When the thaw set in, he led them all out to feed, and the Wild Goats scampered away as fast as they could to the mountains.The Goatherd scolded them for their ingratitude in leaving him, when during the storm he had taken more care of them than of his own herd.One of them, turning about, said to him: "That is the very reason why we are so cautious; for if you yesterday treated us better than the Goats you have had so long, it is plain also that if others came after us, you would in the same manner prefer them to ourselves.What is the central idea of this excerpt?The goatherd wants the wild goats to join his herd.The bad weather keeps all the goats in their enclosure.The goatherd gives his own goats just enough food to survive.The wild goats leave because the goatherd mistreats his own goats. HELP THIS IS URGENT WILL GIVE BRANLIEST ANSWER 3 AND 6 Read the excerpt from "A Genetics of Justice by Julia Alvarez.By the time my mother married my father, however, she knew all about the true nature of the dictatorship. Thousands had lost their lives in failed attempts to return the country to democracy. Family friends, whom she had assumed had dropped away of their own accord, turned out to have been disappeared. My father had been lucky. As a young man, he had narrowly escaped to Canada after the plot he had participated in as a student failed. This was to be the first of two escapes. That same year, 1937, El Generalsimo ordered the overnight slaughter of some eighteen thousand Haitians, who had come across the border to work on sugarcane plantations for slave wages.What is the central idea of this excerpt? 1. A water tank measuring 80 cm by 40 cm by 30 cm is completely filled with water. Water flows out of the tank at a rate of 4 per minute. At this rate, how long will the tank be completely drained out of water? 80 cm 40 cm 30 cm 1. A water tank measuring 80 cm by 40 cm by 30 cm is completely filled with water . Water flows out of the tank at a rate of 4 per minute . At this rate , how long will the tank be completely drained out of water ? 80 cm 40 cm 30 cm Write one sentence telling what you would expect to learn about in Elizabeth cast Stantons Charles is comparing two sports he says: . I think than boxing is more dangerous that wrestling. I think that boxing is more dangerous than wrestling. I think than is more dangerous boxing that wrestling. I think that is more dangerous boxing that wrestling The United States Postal Service reports that 90% of first-class mail within the same city is delivered in two days of the time of mailing. Ten letters are randomly sent to different locations. a. What is the probability that all 10 will arrive within two days? b. What is the probability that exactly 8 will arrive within two days? c. What is the probability that 5 or fewer will arrive within two days? d. What is the mean number of letters that will arrive within two days? e. What is the standard deviation of the number of letters that will arrive within two days? The main source of information used by astronomers to learn about objects in space is. Select the correct answer. Which set of vertices forms a parallelogram? OA A2,4), B(3, 3), C6, 4), D(5, 6) OB. A(-1, 1), B(2, 2), C(5, 1), D(4, 1) OC. A(-5, -2), B(-3, 3), C3, 5), D(1, 0) OD. A(-1, 2), B(1, 3), C5, 3), D(1, 1). The main active chemical in marijuana is THC (delta-9-tetrahydrocannabinol). When someone smokes marijuana, THC goes from:A) The bloodstream to the lungsB) The lungs to the liverC) The lungs to the bloodstreamD) The heart to the brain what are the major classes of lipids Identify the figure that portrays the translation of the given preimage as indicated by the direction arrow.Preimage: (first photo) What is the freezing point of an aqueous suger (C12H22O11) solution that boils at 110C? What is boot sector virus Which choice is an example of plagiarism?A. Jane writes an essay for history class and correctly cites her sources and creates a Works Cited list. She uses all of the sources in her writing so that almost all of her essay is cited material.B. Becky researches a topic for her music class and finds the same information in many different sources. She decides to use only one source with that information. She cites that source in the text and her Works Cited page.C. Robert gathers information for a science paper and uses a combination of direct quotes and paraphrasing. In his paper and Works Cited list, he cites all references used in his writing.D. Kevin creates a presentation for his health class and decides to paraphrase information from the sources. He changes the wording from the sources to his own wording, then cites his references in the text and his Works Cited page. Convert scientific notation to decimal format. 9.8*10^-9 Please help me with my math In this excerpt from H. H. Munros The Open Window, which line reveals the effect that Framtons conversation has on other characters?She rattled on cheerfully about the shooting and the scarcity of birds, and the prospects for duck in the winter. To Framton it was all purely horrible. He made a desperate but only partially successful effort to turn the talk on to a less ghastly topic; he was conscious that his hostess was giving him only a fragment of her attention, and her eyes were constantly straying past him to the open window and the lawn beyond. It was certainly an unfortunate coincidence that he should have paid his visit on this tragic anniversary.The doctors agree in ordering me complete rest, an absence of mental excitement, and avoidance of anything in the nature of violent physical exercise, announced Framton, who laboured under the tolerably widespread delusion that total strangers and chance acquaintances are hungry for the least detail of ones ailments and infirmities, their cause and cure. On the matter of diet they are not so much in agreement, he continued.No? said Mrs. Sappleton, in a voice which only replaced a yawn at the last moment. Then she suddenly brightened into alert attentionbut not to what Framton was saying.Here they are at last! she cried. Just in time for tea, and dont they look as if they were muddy up to the eyes!A He made a desperate but only partially successful effort to turn the talk on to a less ghastly topic;B The doctors agree in ordering me complete rest, an absence of mental excitement, and avoidance of anything in the nature of violent physical exercise, C On the matter of diet they are not so much in agreement, he continued.D No? said Mrs. Sappleton, in a voice which only replaced a yawn at the last moment.I NEED SOME HELP (: Question 10 of 13 by visual inspection, determine the best-fitting regression model for the scatterplot. o a. no pattern o b. quadratic o c. exponential o d. linear please help! Jacqueline is studying a fetus's sensitivity to external stimuli by measuring changes in fetal heart rate when various repeated sounds are presented and then followed by a different sound. Jacqueline is using ________.