Opening documents situated on different computers - network, Basic Computer Science

Assignment Help:

Opening Documents Situated on Different Computers

In order to work with documents situated on other computers, you need sufficient rights to access the folder in which it is placed. Just as you have to grant rights to other users to access your folders, other users will also have to grant you rights to access their folders.

This paragraph tells you how to open a document situated on a different computer. It is assumed that you have sufficient rights to access the folder in which the document is placed. 

In this paragraph we will access the remote document "Sample Text Nurse" on computer named "Office-2". The first step to open a document is to access the shared folder in the remote computer. This is easily done through Network Neighborhood. Double-click on the
Network Neighborhood icon on the Desktop and on "OFFICE-2" computer in the Network Neighborhood window. This will list all the share-out folders on "OFFICE-2" machine.

Double-click on the shared folder "My Documents" to access the files placed in it. Double-click on the document to open it. Depending on the applications you loaded on your system, either the MS-Word or WordPad applications will be launched to display the contents of the file. You can now change the contents of this document and save it back on "OFFICE-2" machine.

 


Related Discussions:- Opening documents situated on different computers - network

Discuss the advantages and disadvantages of printed indexes, QUESTION 1 ...

QUESTION 1 Discuss the advantages and disadvantages of printed indexes. QUESTION 2 (i) The Library of Congress Subject Headings List and the Sears Subject Headings List

Need a help, i am currently studying my computer science engineering 2nd yr...

i am currently studying my computer science engineering 2nd yr. i am unable to select what specification should i take please help me

Generic techniques in artificial intelligence, G e ne ric Techniques Dev...

G e ne ric Techniques Developed: In  the  pursuit  of  solutions  to  many   problems  in  the  above  categories,  serval specific  techniques have sprung up which have bee

Multi-valued attribute dbms, Multi-valued Attribute DBMS Each multi valued ...

Multi-valued Attribute DBMS Each multi valued attribute maps into a separate table. Include also an attribute for the primary key of the entity and relationship type which the attr

Cp, I NEED FLOW CHART ANT DRAWINGS OF BASIC OPERATIONS OF COMPUTER

I NEED FLOW CHART ANT DRAWINGS OF BASIC OPERATIONS OF COMPUTER

Assembly language, write and run the following programs using 8086 assembly...

write and run the following programs using 8086 assembly language that interchange the upper and lower four bits of AL register.

Distinguish between s-http and ssl, QUESTION (a) Distinguish between S...

QUESTION (a) Distinguish between S-HTTP and SSL (b) What are the three basic security provided by SSL? (c) Discuss the limitations of SSL (d) State the port number us

Construct a conditional profits table, Question (a) A dairy wants to de...

Question (a) A dairy wants to determine the quantity of butter it should produce to meet the demand. Past records have shown the following demand pattern:

Explain public code archive, Question 1 Explain the various tools used for...

Question 1 Explain the various tools used for open source software development Question 2 Discuss the OSS licensing strategies Question 3 Explain the software developmen

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd