answersLogoWhite

0

Because it could be accessed remotely. I do it almost every day.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What passwords were used in 1940?

Computer passwords really were not used in 1940 because few people had any clue how to use a computer and access control to the very few existing computers was maintained via control of physical access to the computers. Since the computers were not networked, there was no concern about someone coming in over a (nonexistent) network.


How do you save a lyrics from computer to a computer?

If these two computers that you are talking about is networked, then you can access the other computer and simply as saving it there. But if not, use a USB/Flash Drive in order to transfer the file. If you do not have a USB/Flash Drive, then attached it to your email, then access your email on the other computer and save it there.


In a networked environment no authorized computer user can access data and information stored on other computers on the network?

I believe you mean "unauthorized user'. An authenticated user will be able to access data and information on other networked computers on the network if the permissions allow them to. An non-authenticated user has no access, and no permissions to do so. I understand what you mean, and the answer to that is FALSE.


What is a remote computer?

Remote Computer is a computer to which a user does not have physical access, but which he or she can access/ manipulate via some kind of network.


What is physical access restriction?

Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network."


What is physical restriction?

Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network."


How do you monitor activity of sockets?

A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria.


What precautions would be part of a physical access security strategy?

Pick one (all are applicable) 1. you should prevent physical access to switches, routers, and servers. 2. you should prevent physical access to access points. 3. you should use lockable enclosures for access points or mount them in physically secure locations, such as locked rooms.


What is the definition of internet cloud?

An internet cloud is a large group of servers that are networked so as to allow shared storage and access to computer data. Google and Amazon are two major providers of this service.


How do you prevent physical access to the server?

Locked doors, secure cabinets,etc.


3 Discuss techniques to prevent unauthorized computer access and use?

Below is additional information about helping to secure your computer and prevent any unauthorized access from other people or software programs; helping keep your information safe.


How do i get a slideshow i have saved on my computer to come up at a friends computer. i want to access it myself?

Unless you have the computers networked, you can't. You'd have to save the slideshow on a flash drive or other writable media (such as a DVD) and bring the device to the friend's computer in order to watch it. Alternately, you could upload the slideshow to the Internet from your computer and download it on your friend's computer.