answersLogoWhite

0

You can access your computer from home by using a VNC, a Virtual Network Connection. They can be purchased at any computer for $60-$80 depending on the brand. You input your information and it saves it so later you can remote access your computer.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

How do you define cloud computing when it comes to what it does?

Cloud computing simply means that the data and programs are stored somewhere other than the user's computer and they access them through the internet. Therefore, they have access to what they need no matter what computer they are one.


How do you find out about motherboard without tearing computer apart?

If you go to the Cisco site, they have a virtual computer to set up. But you have to have an account or be a Cisco student to access this. Other than that, I don't know of any other solutions to this question.


What are the uses of home computer other than palying games?

to email friends surf the web and chat with people


Can you sync your iPod touch to more than one PC For example do the first sync on an additional computer and then sync it later with my normal computer as I don't have access to my normal PC.?

yes but if u do it will all erase on the other computer


Can you use email address on other computers other than your own?

The same e-mail addresses can be sent and received on any computer. The main purpose of computer cafes is to provide e-mail / internet access to anyone, anywhere.


How does the World Community Grid's average processing power compare to modern supercomputers?

On a single home computer? Significantly smaller. But when you combine that home computer with every other volunteer computer on the grid, it is much more powerful and efficient than any supercomputer.


What is the best system and memory for a home computer?

Most computer users will be happy with a 1 gigaHertz processor with between 512 megabytes and 1 gigabyte of Random Access Memory on the motherboard. This is more than adequate for almost all applications.


What occurs when persons other than authorized users gain access or potential access for other than authorized purposes?

Internation disclosures


What occurs when persons other than authorized users gain access or potential access to such information for other than?

When people gain access or potential access to such information for purposes that are not authorized, this is known as intentional disclosures.


What occurs when other than authorized users gain access or potential access to such information for other than authorized purposes?

When people gain access or potential access to such information for purposes that are not authorized, this is known as intentional disclosures.


What occurs when persons other than authorized users gain access or potential access to such information for other than authorzied purposes?

Intentional Disclosure


What occurs when a person other than authorized users gain access or potential access or such information for other than authorized purposes?

Intentional disclosures