Application Sharing - Type of Access

Type of Access

Once the applications or documents to be shared and whom they are to be shared with have been determined, there are generally two types of access that can be granted to remote users.

1. Control access – the host user allows remote users to actually control, edit, and manipulate the shared content; most application sharing software allows the host to revoke control access at any time. During the remote control session, keyboard and mouse are remotely controlled. Usually a hot key is provided to revoke access.

2. View access – the host user only allows remote users to passively view the shared content; remote users have no ability to edit or effect change in the shared content whatsoever.

Read more about this topic:  Application Sharing

Famous quotes containing the words type of, type and/or access:

    Only that type of story deserves to be called moral that shows us that one has the power within oneself to act, out of the conviction that there is something better, even against one’s own inclination.
    Johann Wolfgang Von Goethe (1749–1832)

    A cigarette is the perfect type of a perfect pleasure. It is exquisite, and it leaves one unsatisfied. What more can one want?
    Oscar Wilde (1854–1900)

    The Hacker Ethic: Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total.
    Always yield to the Hands-On Imperative!
    All information should be free.
    Mistrust authority—promote decentralization.
    Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
    You can create art and beauty on a computer.
    Computers can change your life for the better.
    Steven Levy, U.S. writer. Hackers, ch. 2, “The Hacker Ethic,” pp. 27-33, Anchor Press, Doubleday (1984)