answersLogoWhite

0

The process is called 'remote access' - you basically allow someone else on another computer to access your computer and everything on it !

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What are other methods of connecting your computer to the internet?

using a dial-up network or a broadband network


How do you know if you have a hard drive if you will not open your computer?

If you can boot your computer without connecting or inserting anything and not being connected to a network, its pretty safe to say you a hard drive. Booting a computer without using one of the above methods is possible, but rare.


What is the method for getting information out of the computer?

To retrieve information from a computer, you can use various methods such as browsing the internet, accessing files and folders on the computer's storage, running commands in the terminal, using applications to extract data, or connecting to external storage devices. Each method depends on the type of information you need and how it is stored on the computer.


When was Logical Methods in Computer Science created?

Logical Methods in Computer Science was created in 2005.


Getting a Windows Error Recovery message for Windows Vista on a Dell desktop after starting computer How do you get passed this after startup restore said that the cause of the problem cannot be found?

Use the backup recovery method that your computer has or reboot using different rebooting methods in config. Mode


Do you have to have a telephone line to connect to the Internet?

No. There are other methods of connecting to the internet, such as cable internet and 3G.


When users invite a technician to help repair their computer what is this called?

When a user invites a technician to help repair their computer, it is commonly referred to as "remote desktop support" or "remote assistance." This process involves the technician accessing the user's computer from a remote location to diagnose and resolve technical issues. It is a convenient and efficient way to address computer problems without the need for an in-person visit.


What is the difference between proxy and VPN?

Proxy and VPN are two methods of connecting over the internet. Proxy servers act for a different computer. VPN stands for Virtual Private Network and allows for a connection to occur while activity remains private.


How do you add heart by name on farm town?

To change your name go to avatar and you'll be allowed to. You add the heart as you would whenever you add a heart. Num lock turned on you hit alt+L on a laptop, or just alt+3 on a desktop (the 3 on the side pad of numbers). these are two of the methods but it varies from computer to computer.


What is the definition of computer hacker?

someone who illegally uses technological methods to break into a computer system


Does excessive shortcuts slow your computer?

It is said that too many shortcuts putting on the desktop can slow down your computer. But this opinion is objected by others.Personally, I keep the size of contents on my desktop as minimam as possible to keep a comparative fine speed of my computer. But for those who have a well-configurated computer, they have many files and shortcuts on their desktop, and it seems like that they still have a fairly fast speed.For other methods to prevent your computer from running slowly, you can google that problem and you will find the following answer:There are many reasons that cause a slow running computer:* Bloated registry with errors* Fragmented registry and hard disk* Too many junk files take up the memory* ......In order to speed up computer, there are quite a lot of work to do: clean and fix registry errors, defragment registry, clean hard disks, optimize Windows system, etc.Most of these tasks can't be done manually, thus you'd better use a Windows system optimizer to have them done. Go and learn such software and you will know how to speed up your computer.


What has the author Stefania Gnesi written?

Stefania Gnesi has written: 'Formal methods for industrial critical systems' -- subject(s): COMPUTERS / Computer Engineering, Formal methods (Computer science)