Opening documents situated on different computers - network, Basic Computer Science

Assignment Help:

Opening Documents Situated on Different Computers

In order to work with documents situated on other computers, you need sufficient rights to access the folder in which it is placed. Just as you have to grant rights to other users to access your folders, other users will also have to grant you rights to access their folders.

This paragraph tells you how to open a document situated on a different computer. It is assumed that you have sufficient rights to access the folder in which the document is placed. 

In this paragraph we will access the remote document "Sample Text Nurse" on computer named "Office-2". The first step to open a document is to access the shared folder in the remote computer. This is easily done through Network Neighborhood. Double-click on the
Network Neighborhood icon on the Desktop and on "OFFICE-2" computer in the Network Neighborhood window. This will list all the share-out folders on "OFFICE-2" machine.

Double-click on the shared folder "My Documents" to access the files placed in it. Double-click on the document to open it. Depending on the applications you loaded on your system, either the MS-Word or WordPad applications will be launched to display the contents of the file. You can now change the contents of this document and save it back on "OFFICE-2" machine.

 


Related Discussions:- Opening documents situated on different computers - network

Array, An array A is said to be special if all its elements are same. Given...

An array A is said to be special if all its elements are same. Given an array, your task is to convert the array to special array by performing some operations. The allowed operati

Describe what are system software and application software, Problem: (a...

Problem: (a) Using appropriate examples describe what are System software and Application Software. (b) Explain four tasks of file management a user frequently performs i

Boolean expression, Problem 1. Obtain the truth table and a Boolean exp...

Problem 1. Obtain the truth table and a Boolean expression for the following conditions: x is 0 if any two of the three variables are 1. x is 1 for all other conditions.

ALP Program to find 10''s complement, I would like to know how to write a p...

I would like to know how to write a program for a 8086 microprocessor in ALP to find 10''s complement of a packed BCD number.

Arrays and strings, This is a C file. 1. The program starts by printing you...

This is a C file. 1. The program starts by printing your name with an end sign ">". For example, "NAME >"; 2. Then, you can type in a string. If the string is not "vi xxx", you pri

Perverse software, is u given is enough for us for this - what is pervere ...

is u given is enough for us for this - what is pervere software and explain in detail?

E-mail, E-MAIL: Internet has changed the art of writing letters to ema...

E-MAIL: Internet has changed the art of writing letters to email.  Email is one of the ways on Internet to send messages to another person across the network. E-mail and posta

Hacking, how can i hack a server

how can i hack a server

Why is the random class in the .net framework not suitable, QUESTION (a...

QUESTION (a) (i) Why is the Random class in the .NET framework not suitable for generating random bytes for cryptography purposes? (ii) Mention two characteristics required

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd