Store Your Files At Work; Access Them At Home?

1 Answer

Answer :

A virtual desktop is a screen that you can bring up on your home computer that is a replication of your screen at work. This is done over the internet. It gives you full access to everything that is on your work computer. You can keep your files at work, saving space on your home computer, but you can get to them no matter where you are. This is very efficient and saves you a lot of driving.

Related questions

Description : Distributed processing involves a) solving computer component problems from a different computer b) solving computing problems by breaking them into smaller parts that are separately processed by different ... ) allowing users to access network resources away from the office e) None of these

Last Answer : b) solving computing problems by breaking them into smaller parts that are separately processed by different computers

Description : How can I store my pictures externally, but access them from anywhere?

Last Answer : answer:I’m trying to future proof this solution as well I admit to being snoopy :)

Description : Does there exist a mobile app that will store all text messages I send and recieve online and let me access and sort and organize them?

Last Answer : Your question is not clear… Do you want a mobile app, a web app or a desktop backup app? And what platform are you using?

Description : Why does the Striiv Band Activity Tracking App need access to my Identity, Contacts, Location, and Photos/Media/Files?

Last Answer : LuckyGuy Welcome to android, many apps are collecting your meta data.

Description : How do I access my deleted files on my Ipad?

Last Answer : answer:It sounds like you are referring to a deleted email, right? What email client do you use? The stock iOS email client? Gmail app? Sparrow? What is your email provider? Gmail? Anyway, if you use ... be a trash folder that you can access via the email client you are using on iOS and a browser.

Description : How do I access hidden & system folders/files in Windows 7?

Last Answer : In Explorer (Windows key + E), you should be able to access Folder Options in the menu at the top there will be a series of radio button choices for different things, and one of them should be ... 7 on the laptop I'm working on now, but I recall it is very similar across Windows operating systems.

Description : Can I transfer an iPhoto library (Mac) to a Windows computer and still be able to access the files?

Last Answer : iPhoto is a bit tricky. You will find iPhoto Library in your pictures folder. You need to get the pictures out of that. Right click (Command click) on it and select Show Package Contents In ... there you can drag them to a external drive. They will open without a problem on a Windows machine.

Description : How can I safely remove Ubuntu 10.10 from my PC / or How do I access Ubuntu files from inside Windows 7?

Last Answer : answer:I'm used Ubuntu a couple of times, but it's not my distro of choice so some of this may be a bit off. I had thought Ubuntu already had what it needed to read from a Windows partition (these ... to boot from the CD in Recovery mode, I think it's called, and re-write the MBR from there.

Description : ……… is not covered under file management. (a) Secure files (b) Easy access to files (c) Schedule processes (d) Keep backup of files -Technology

Last Answer : (c) Because schedule processes comes under processor management.

Description : What is value of using access control database transaction and firewall log files?

Last Answer : Need answer

Description : What is the best way to remote access files from another computer?

Last Answer : Crossloop is a free online program which anyone can use to access ones files remotely from another computer.You find a helper, share your screen and fix the problem at hand.

Description : Internal Access To Documents and Files?

Last Answer : Everyone in your company should not have access to all of the files and documents that are stored on your servers, even if you use internal cloud computing. You need to set passwords that will protect ... if you want everyone who is employed by your company to be able to access the main servers.

Description : How does one give developers access to trace files (required as input to tkprof)? (for DBA)

Last Answer : The "alter session set sql_trace=true" command generates trace files in USER_DUMP_DEST that can be used by developers as input to tkprof. On Unix the default file mask for these files are "rwx r-- -- ... = true Include this in your INIT.ORA file and bounce your database for it to take effect.

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : Why is it unethical to share copyrighted files withyour friends ? (A) It is notunethical, because it is legal. (B) It is unethical because thefiles arebeing given for free. (C) ... D) It is notunethical becausethe filesarebeing given for free. (E) It is notunethical-anyonecan access acomputer

Last Answer : Sharingcopyrighted files without permission breaks copyright laws

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Why is it unethical to share copyrighted files with your friends: a) It is not unethical because it is legal b) It is unethical because the files are being given for free c) Sharing copyrighted files ... because the files are being given for free e) It is not unethical - anyone can access a computer

Last Answer : c) Sharing copyrighted files without permission breaks copyright laws

Description : Which of the Following is not true of immediate processing: a) It is often used in real time applications b) It can be used in an airline reservation system c) It can occur with either sequential or direct access files d) None of The Above

Last Answer : c) It can occur with either sequential or direct access files

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : It is better to use files than a DBMS when there are (A) Stringent real-time requirements. (B) Multiple users wish to access the data. (C) Complex relationships among data. (D) All of the above.

Last Answer : (B) Multiple users wish to access the data.

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : How does Time Machine store files?

Last Answer : answer:From what I've read, it appears that Time Machine does not do binary diffs or compress backed up files. This has the advantage of giving you faster access to past versions of your files, ... of space, Time Machine will alert you that it will start deleting previous backups, oldest first.

Description : Which folder is used as a convenient place to store important files and folders of a user? -Technology

Last Answer : Documents is a folder that provides convenient place to store important files and folders.When a user saves a file, the file is automatically saved in Documents unless the user has chosen a different ... quickly, user can use Start menu or double click on the Documents icon placed on desktop.

Description : A ………… is a hardware device on which you can store files and folders. -Technology

Last Answer : Adisk driveis a hardware device on which you can store files and folders.

Description : Computer is a folder that provides you with a convenient place to store your important files and folders. -Technology

Last Answer : FalseComputer is an icon on desktop. It does not store files and folders, it simply helps you to display the folders contained on that drive.

Description : Report generatorsare usedto A. store data input bya user B. retrieve information from files C. answer queries D. both (b)and (c) E. None of the above

Last Answer : both (b)and (c)

Description : This operates algorithmically or using a mixture of algorithmic and human input to collect, index, store and retrieve information on the web (e.g. web pages, images, information and other types of files). It makes the ... is referred to as: 1. Banner ads 2. Pop-up ads 3. A search engine 4. Apps

Last Answer : A search engine

Description : gif, jpg, bmp, png are used as extensions for files which store (A) Audio data (B) Image data (C) Video data (D) Text data

Last Answer : (B) Image data

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : If I'm going to return my computer to the store for a replacement or refund, what do I need to do to clear out any passwords or history from being visible to workers who may have access to the computer?

Last Answer : What browser are you using? If Firefox, you can press Ctrl+Shift+Del or click Tools->Clear Recent History. Other browsers probably have similar options.

Description : Is there a trick to get access to ipod store in ipod touch?

Last Answer : Then your connection is just weak. It’s not the iTouch that has the problem.

Description : Can I store Itunes media on an external drive and access it from itunes on my C drive?

Last Answer : Not sure about Windows, but on the Mac, you can set the location of the iTunes Library in iTunes’ Preferences.

Description : When can we access the Itunes App Store?

Last Answer : I was looking at the Macrumors live blog, and that never came up, unless I overlooked it.

Description : Why The fact that companies can store and access emails sent or received on the equipment limits which of your rights?

Last Answer : privacy

Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register

Last Answer : Address register

Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned

Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data

Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register

Last Answer : d. Address register

Description : A jewelry store is more likely than a jewelry manufacturer to conside consider in making a location decision. a. transportation costs b. cost of raw materials materials c. parking and access d. climate

Last Answer : c. parking and access

Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register

Last Answer : d. Address register

Description : Which of the following statements concerning Object-Oriented databases is FALSE? (A) Objects in an object-oriented database contain not only data but also methods for processing the data. (B ... Object-oriented databases store more types of data than relational databases and access that data faster.

Last Answer : (C) Object-oriented databases are more adapt at handling structures (analytical) data than relational databases.