0% found this document useful (0 votes)
22 views4 pages

ct2 1

Uploaded by

naitikrawat2007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views4 pages

ct2 1

Uploaded by

naitikrawat2007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1.

Internet Explorer •
2. Internet Explorer(formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly referred
to as Explorer and abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft and
included in the Microsoft Windows line of operating systems, starting in 1995.
3. Windows Remote Assistance • Quick Assist, originally known as Windows Remote Assistance, is a feature of
Windows XP and later that allows a user to temporarily view or control a remote Windows computer over a
network or the Internet to resolve issues without directly touching the unit. It is based on the Remote
Desktop Protocol. or • Windows Remote Assistance is a tool that allows you to remotely give or receive
technical support to or from other Windows users.
4. In order for Windows Remote Assistance to work, there are a few things that you need to set up: • The user
who will receive assistance has to have Windows Remote Assistance enabled in his/her computer's System
Properties. • The user in need of help has to request assistance via Windows Remote Assistance. • The
person providing the technical assistance will need to know the connection password set by the user who
needs help. • The user in need of assistance has to approve the remote connection. • Once the remote
connection is established, both users will see the same computer screen.

To enable Remote Assistance, open the Start Menu and right click on Computer, then select Properties from the
context menu.

What Is Remote Desktop Connection?

• Remote Desktop Connection is a Windows tool that allows you to access and control a computer from a remote
location

 Remote Desktop Connection-

There are a few things you need to know and set, in order to successfully establish a remote desktop connection to
another computer: • The computer to which you will connect has to allow remote connections. This is set from the
host computer's System Properties. • You need to know the name or the IP address of the computer you want to
connect to. If you're trying to connect to a computer in the same LAN as you, you can use its name or IP address. In
case you're trying to connect to a computer over the Internet, you'll need the IP address of the host computer. Using
its name won't work. • You have to know the credentials of an administrator account from the host computer, or the
credentials of a standard user account that has been enabled for Remote Desktop connections.

 Remote Desktop Connection • Once you've connected to a remote computer, you will gain full control of it.
That means you can use the remote computer as if you are in front of it. You can access any documents, run
all programs, use any devices that are connected to it, etc. • The host computer will display nothing on its
screen, so no one will see what you are doing remotely.
 Enabling Remote Desktop -To enable Remote Desktop, open the Start Menu and right click on Computer,
then select Properties from the context menu.
 Using Remote Desktop • Once you have enabled Remote Desktop on a computer it is very easy to connect to
it. To do so, open the Start Menu and expand Accessories, then click on Remote Desktop Connection.
 Now you will need to enter the name or IP address of the machine with Remote Desktop enabled, then click
connect.
Prevent Users From Running Certain Programs •
If you want to stop programs from running, here’s how to use Group Policy or the Registry to prevent users
from running certain programs.
• Option 1 – Apply Group Policy
• Hold down the Windows Key and press “R” to bring up the Run dialog box.
• Type “gpedit.msc“, then press “Enter“. The Group Policy Editor appears. • Expand “User Configuration” >
“Administrative Templates“, then select “System“.
• Open the policy “Don’t run specified Windows applications“.
• Set the policy to “Enabled“, then select “Show…”
• Add the programs you would like to prevent the user from running to the List of disallowed applications.
Use the name of the application launching file such as “itunes.exe“, “bittorent.exe“, etc.
Mobile Computing

• Mobile Computing is a technology that allows transmission of data, voice and video via acomputer or any other
wireless enabled devicewithout having to be connected to a fixed physical link. The main concept involves –

• Mobile communication• Mobile hardware• Mobile software

Mobile software- it is the operating system of the appliance. It's the essential component that operates the

mobile device.

Mobile hardware-• Mobile hardware includes mobile devices or device components that receive or access the
service of mobility. They would range from portable laptops, smartphones, tablet Pc's, Personal Digital Assistants.

 Mobile data communication

• Cellular data service uses technologies GSM, CDMA or GPRS, 3G networks such as WCDMA, EDGE or CDMA2000.

more recently 4G networks such as LTE, LTE- advanced.

Principles of Mobile Computing


• Portability • Social Interactivity • Connectivity • Individuality

mobile computing devices are-


o Portable computers, compact, lightweight units including a full character set keyboard and primarily
intended as host for software that may be parameterized, such as-
1-laptop/desktop 2- smartphones/tablets 3- Smart cards 4- Celllular telephones 5- Wearable computers

 Limitations
• Security standards • Power consumption • Transmission interferences: Weather, terrain etc. • Potential
health hazards.

 What is Cloud?
• The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something,
which is present at remote location. Cloud can provide services over public and private networks, i.e.,
WAN, LAN or VPN.
• Applications such as e-mail, web conferencing, customer relationship management (CRM) execute on
cloud.

 Cloud Computing
• Cloud Computing refers to manipulating, configuring, and accessing the hardware and software resources
remotely. It offers online data storage, infrastructure, and application.

Benefits:-
• One can access applications as utilities, over the Internet.
• One can manipulate and configure the applications online at any time.
• It does not require to install a software to access

or
Managing Applications
• Processes installation, removal, and enumeration requests for software deployed through Group Policy.
If the service is disabled, users will be unable to install, remove, or enumerate software deployed through
Group Policy. If this service is disabled, any services that explicitly depend on it will fail to start.manipulate
cloud application.

• Note-Warning- Serious problems might occur if you modify the registry incorrectly by using Registry
Editor or by using another method. These problems might require that you reinstall the operating system.
Microsoft cannot guarantee that these problems can be solved. Modify the registry at your own risk.

 Services.msc:
o Go to Start
o Locate Application Management observe his current status and open to make changes.
o From General tab you can Start/Stop and change the Startup type of Application
Management finish press ok button and close Services window.

Regedit:
• This method shows you how to change Startup type of Application Management from Registry.
• Please confirm User Account Control pop-up.
 CMD:
• This method shows you how to Start/Stop and change Startup type of Application
Management from Command Prompt.
 Msconfig:

• This method shows you how to prevent Application Management service from starting
with the operating system using Configuration (msconfig.exe)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy