Question 1 what does a directory server provide? 1 point a real-time communication service a network time service a lookup service for an organization a replication service

Answers

Answer 1

What a directory server does is to provide a lookup service for an organization. A directory service enables users to look up information about an organization. Lookup means to look anything up in an online directory.

It is an exclusive directory service created by Microsoft® to control user and machine authentication and authorization on a Windows domain network.

The major part of Active Directory is Active Directory Domain Services (AD DS), which assigns and enforces security policies and verifies access when a user login into a system or attempts to connect to one over the network.

Follow the link below to understand more on directory server

https://brainly.com/question/13818892

#SPJ4


Related Questions

What paradigm is this code based on? How do you know?
What does the number 16 mean in this code? How do you know?
Imagine you wanted to tweak the project so that the list produced by the program included teachers and kept track of how many years they have been working at the school. Using the principles of inheritance and overriding, explain how you could take this code and quickly create the new programs.
How could you apply some of the ideas, principles, or structures of coding to fields of study, industries, or tasks outside of creating computer programs? Propose at least one way to use “coding” or creating programs outside of computer science and explain how it uses coding-related concepts.
Imagine that you were programming without an IDE. What problems might you encounter?

Answers

Answer:

I Don't Know

Explanation:

nsjskdoeowowokskdnekmek biien

Which is an action that an operating system preforms?
A) stores all data
B) gives signals and instructions to the computer
C) gives information processed by the computer
D) facilitates a computers basic functions between hardware and software

Answers

Answer:

acilitates a computers basic functions between hardware and software

Explanation:

For email links, use anchor elements to link to an email address by including the href attribute followed by?

Answers

For email links, use anchor elements to link to an email address by including the href attribute followed by mailto: and then the email address.

What are anchor elements used for?

The anchor element is known to be one that is often used to make hyperlinks that tend to between a source anchor and that of a destination anchor.

Note that the source is said to be the text, image, as well as the button that connect to another resource and the destination is seen as the resource that the source anchor tends to connect to.

Therefore, For email links, use anchor elements to link to an email address by including the href attribute followed by mailto: and then the email address.

Learn more about anchor elements from

https://brainly.com/question/11526390

#SPJ1

For email links, use anchor elements to link to an email address by including the href attribute followed by _____ and then the email address.

Which method of sending a packet allows every computer on the lan to hear the message?

Answers

A method of sending a packet which allows every computer on the local area network (LAN) to hear the message is referred to as: B. Broadcast.

What is a network component?

A network component can be defined as a set of hardware and software resources that makes up a computer network such as:

RouterSwitchBridgeGatewayServer

What is a broadcast?

In Computer networking, a broadcast can be defined as a technique which typically involves the transmission of packets in order to enable every computer and other network components on the local area network (LAN) to hear the message.

Read more on broadcast here: https://brainly.com/question/14447945

#SPJ1

Complete Question:

Which method of sending a packet allows every computer on the LAN to hear the message? A. Omnicast B. Broadcast C. Unicast D. Multicast.

Danielle wants to record a voice-over to add to a presentation. Other than a microphone, what does danielle need to record the audio?.

Answers

Answer:

Sound recorder software

Explanation:

Jonathan spends his free time writing and testing code. what type of software does he work with?

Answers

Since Jonathan spends his free time writing and testing code, the type of software that he work with is Open source software.

What is open source software?

Open source software is known to be some line of code that is said to be set up so as to be publicly available to everyone to see, change, and distribute the code as they want to.

Note that  Open source software is made  in a decentralized as well as collaborative way and as such, Since Jonathan spends his free time writing and testing code, the type of software that he work with is Open source software.

Learn more about Open source software from

https://brainly.com/question/4593389

#SPJ1

What will happen if you are not media literate?

Answers

Answer:

You will be missing out alot. And it will effect you in the long run.

Explanation:

The reason why it will effect you in the long run is

- Unessary cost

What positive integers have the following binary representations?
(a) 10010
(b) 10011
(c) 101010
(d) 10011110000

Answers

The positive integers have the following binary representations  are,

a.18    b.19

c.42  d.1264

What is a positive integer meaning?

An integer is positive if it is greater than zero; otherwise, it is negative. Zero is defined as not having either a positive or negative value. Consequently, the following is a list of positive integers: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. and so on.

The lowest positive integer is 1, and there is no way to calculate the greatest positive integer, whose size is limitless. Zero is a positive integer since it lacks a negative sign. All the numbers on a number line that are to the right of zero are known as positive integers.

To learn more about positive integers, refer to:

https://brainly.com/question/13292955

#SPJ4

Assume double[][][] x = new double[4][5][6], what are x.length, x[2].length, and x[0][0].length?
a. 4, 5, and 4
b. 4, 5, and 6
c. 6, 5, and 4
d. 5, 5, and 5

Answers

If we assume double[][][] x = new double[4][5][6], then  x.length, x[2].length, and x[0][0].length are; b; 4, 5 and 6

How to Interpret Multidimensional Array?

In C/C++, we can define multidimensional arrays in simple words as an array of arrays. Data in multidimensional arrays are stored in tabular form (in row-major order).  

General form of declaring N-dimensional arrays:  

data_type  array_name[size1][size2]....[sizeN];  

data_type: Type of data to be stored in the array.  

Now, if we Assume double[][] x = new double[4][5], then we can say that x.length and x[2].length are; 4 and 5

In a similar form, If we assume double[][][] x = new double[4][5][6], then  x.length, x[2].length, and x[0][0].length are; 4, 5 and 6

Read more about Multidimensional Array at; https://brainly.com/question/23459333

#SPJ1

In a category of games known as _________, millions of players connect to various servers to team up with other players in very large virtual worlds.

Answers

In a category of games known as MMORPGs, millions of players connect to various servers to team up with other players in very large virtual worlds.

What do MMORPGs mean?

The term  MMORPG connote  massively multiplayer online role-playing games.

This is known to be a type of video game that tends to make use of different elements of role-playing games (RPGs) along with those of the gameplay of multiplayer online gaming worlds.

Therefore, In a category of games known as MMORPGs, millions of players connect to various servers to team up with other players in very large virtual worlds.

Learn more about virtual worlds from

https://brainly.com/question/13873769

#SPJ1

The set of analytical techniques that yield a best course of action is _____ analytics.

Answers

The set of analytical techniques that yield the best course of action is prescriptive analytics.

What is Analytics?

This refers to the systematic computational analysis of data or statistics that is used to interpret data and find patterns in the data.

Hence, we can see that The set of analytical techniques that yield the best course of action is prescriptive analytics.

This is because when the best course of action is taken into consideration, it has to do with finding the best solutions.

Finding the best solutions also has to do with finding best courses of action and this type of analysis is known as prescriptive analytics.

Read more about analytical techniques here:

https://brainly.com/question/28139087

#SPJ1

Jamie has just developed a small game. She shows it to her friends, but they are confused about what the point of the game is. What aspect of her game does Jamie need to work on?
A.
the rules of the game
B.
the objective of the game
C.
the outcome of the game
D.
the components of the game

Answers

Answer:

pls I think is the A. the rules of the game

Debra tracks her business finances in a spreadsheet. She wants to figure out how much she could increase profits if she raises prices on some products. What feature should she use to find the answer?.

Answers

On this spreadsheet, a feature which Debra should use to find the answer is the What-if analysis.

In order to execute the following actions on a data collection, a spreadsheet application is a type of computer software that is frequently made with cells that are organised in rows and columns in a tabular fashion:

GenerateSortCalculateFormatArrange

Debra, a short version of the Hebrew female given name Deborah, means "bee." The Book of Judges in the Old Testament has this Biblical phrase. The only female judge described in the Bible, Deborah was a hero and prophetess.

Phyllis Hilton, whose daughter Debra had EB, created DEBRA in 1978; it was the first organisation for EB patients in the globe.

Learn more about Debra:

https://brainly.com/question/28503666

#SPJ4

Machine language is the set of binary-coded instructions that are executed directly by a computer. True or false

Answers

Answer:

true

Explanation:

Which type of threat actor would benefit the most from accessing your enterprise's new machine learning algorithm research and development program?

Answers

A type of threat actor which would benefit the most from accessing your enterprise's new machine learning algorithm research and development program is: D. competitors.

What is machine learning?

Machine learning (ML) is also referred to as deep learning or artificial intelligence (AI) and it can be defined as a subfield in computer science which typically focuses on the use of computer algorithms, data-driven techniques (methods) and technologies to develop a smart computer-controlled robot that has the ability to automatically perform and manage tasks that are exclusively meant for humans or solved by using human intelligence.

Who is a competitor?

A competitor can be defined as a type of threat actor who is generally fond of who launching attacks against its opponent's information system in order to steal sensitive and classified information such as industry research and development program or customer list.

Read more on competitors here: https://brainly.com/question/28431554

#SPJ1

Complete Question:

Which type of threat actor would benefit the most from accessing your enterprise's new machine learning algorithm research and development program? a. Shadow IT b. Brokers c. Criminal syndicates d. Competitors.

When error messages indicate that the windows registry is corrupted and you cannot boot from the hard drive, what tool or method is the first best option to fix the problem?

Answers

The tool or method is the first best option to fix the problem is Use bootable media to launch Windows RE and use System Restore to apply a restore point.

What is the command about?

If  Windows 7 registry is known to be corrupted and a person is unable to boot from the hard drive, one can be able to fix the problem by the use of commands that can be obtained from the Windows Recovery Environment to be used to recover the registry from backup.

Therefore, The tool or method is the first best option to fix the problem is Use bootable media to launch Windows RE and use System Restore to apply a restore point.

Learn more about Windows registry  from

https://brainly.com/question/10621447

#SPJ1

When error messages indicate that the Windows registry is corrupted and you cannot boot from the hard drive, what tool or method is the first best option to fix the problem? The second-best option?

Use bootable media to launch Windows RE and use System Restore to apply a restore point.

Use bootable media to launch Windows RE and perform a startup repair.

Use bootable media to launch Windows RE and then use commands to recover the registry from backup.

Refresh Windows using a system image or custom refresh image.

The most widely used operating systems on larger servers is one of the many versions of ____.

Answers

Answer: UNIX

Explanation: Unix is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

In a file processing environment, descriptions for data and the logic for accessing the data are built into?

Answers

In a file processing environment, descriptions for data and the logic for accessing the data are built into application programs.

What are Computer Application?

In regards to Software classification, one can say that the application program is known to be a kind of a computer program that is said to be set up so that it can be able to carry out a particular work or task.

It is one that is often used by a lot of end-users. A good example of this applications software are Word processors, media players, and others.

Therefore, In a file processing environment, descriptions for data and the logic for accessing the data are built into application programs.

Learn more about application programs from

https://brainly.com/question/24264599

#SPJ1

In database applications, reports are created to display selected information.
a. true
b. false

Answers

In database applications, reports are created to display selected information is a true statement.

What are reports in DBMS?

A report is known to be a kind of a database object that is aid to be used a lot especially if a person want to depict or show the information in their database for:

Show or distribute a summary of data. Save snapshots of the data. Provide details about some records.

Therefore, based on the above,  In database applications, reports are created to display selected information is a true statement.

Learn more about database from

https://brainly.com/question/518894

#SPJ1

In addition to oracle, another source of hypervisors for macos desktops is ________.

Answers

In addition to Oracle, another source of hypervisors for macOS desktops is Parallels. Therefore, the correct answer option is B. Parallels.

What is virtualization?

Virtualization can be defined as the creation of an abstract layer over computer hardware primarily through the use of a software, in order to enable the operating system (OS) such as macOS, storage device, server, etc., to be used by end users over the Internet.

In Cloud computing, some of the components (features) which is not required for a successful virtualization environment include the following:

Virtual machineHost machineHypervisors

In Macintosh computers, oracle and parallel are sources of hypervisors.

Read more on virtualization and hypervisors here: https://brainly.com/question/28528924

#SPJ1

Complete Question:

In addition to Oracle, another source of hypervisors for macOS desktops is _____. A. Microsoft B. Parallels C. Apple D. Intel. B. Host key.

_____ session mode connects the host to a guest vm using rdp and allows cutting and pasting between the machines.

Answers

Enhanced session mode connects the host to a guest vm using RDP and allows cutting and pasting between the machines.

If you've ever used remote desktop to connect to a Windows guest VM, you know that it can be a little tricky to transfer files between the host and guest. Fortunately, there's a feature called enhanced session mode that makes it a breeze.

Enhanced session mode connects the host to a guest vm using RDP and allows cutting and pasting between the machines. This makes it super easy to transfer files between the host and guest, and also makes it possible to use local devices like printers and scanners from within the guest.

To use enhanced session mode, simply connect to your guest VM using RDP and then click the "Enable enhanced session mode" button. Once you do that, you'll be able to use all of your host's devices from within the guest.

Learn more on enhanced session mode here:

https://brainly.com/question/14488447

#SPJ4

The unicode coding scheme supports a variety of characters including those for chinese, japanese, and arabic languages. True or false?.

Answers

The Unicode coding scheme supports a variety of characters including those for Chinese, Japanese, and Arabic languages; True.

What is the Unicode coding scheme?

The Unicode coding scheme is sometimes referred to as the Unicode data set and it typically comprises 65,536 characters in order to provide support for several international languages and symbols.

In this context, we can reasonably infer and logically deduce that it is very true that the Unicode coding scheme supports a variety of characters, symbols, and international languages such as:

The Chinese language.The Japanese language.The Arabic language.YorubaIgboFrench

Read more on Unicode coding scheme here: https://brainly.com/question/24846400

#SPJ1



As a Social Media Strategist you know that which of the following is typically used to build relationships with customers instead of selling products
to them?

Answers

Answer:

Post product reviews and promotions

If you want to become a digital citizen you only have to buy a piece of technology.
a. true
b. false

Answers

If you want to become a digital citizen you only have to buy a piece of technology is a false statement.

What does it means to be a digital citizen?

Digital Citizenship is known to be a term that connote  the ability of a person to be able to engage positively in conversations that are known to be made critically and competently in regards to the digital world.

Note that it is one that is said to be drawing on the use of the skills of effective communication as well as creation, to work on the forms of social participation that are said to be respectful of human rights as well as the dignity via the use of technology.

Therefore, saying that If you want to become a digital citizen you only have to buy a piece of technology is a false statement because not buying it makes you one but using it.

Learn more about digital citizen from

https://brainly.com/question/28433866

#SPJ1

To which state does a process move when the cpu scheduling algorithm determines it may next use the cpu?

Answers

When a process is in Running state, it may be moved by the CPU scheduling algorithm when it is determined that the process may next use the CPU. This can happen for a variety of reasons, including when the process is preempted by another process or when the process itself voluntarily relinquishes the CPU.

There are two types of process Scheduling algorithms- those that preempt running processes, and those that don't. The preemptive scheduling algorithms are further classified as either voluntary or involuntary.

Voluntary algorithms allow a process to voluntarily relinquish the CPU before its time slice is complete- usually in response to an event like an I/O completion. Involuntary algorithms preempt a running process and move it to a waiting state when another process needs the CPU.

The most common involuntary algorithms are priority-based. A process with a higher priority is given the CPU first, regardless of when it last ran. If two processes have the same priority, then the process that has been waiting the longest is given the CPU next.

Learn more here:

https://brainly.com/question/14400616

#SPJ4

You have instructed all administrators to disable all nonessential ports on servers at their sites. why are nonessential protocols a security issue that you should be concerned about?

Answers

The reason nonessential protocols are a security issue that you should be concerned about is that: A. nonessential ports provide additional areas of attack.

What is information security?

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

In Cyber security, the reason nonessential protocols are a security issue that an end user should be concerned about is that nonessential ports would provide additional areas of attack because all protocols have weaknesses based on the principle of least privilege.

Read more on information security here: brainly.com/question/14286078

#SPJ1

Complete Question:

You have instructed all administrators to disable all nonessential ports on servers at their sites. Why are nonessential protocols a security issue that you should be concerned about?

Nonessential ports provide additional areas of attack.

Nonessential ports can't be secured.

Nonessential ports require more administrative effort to secure.

How many residues separate amino acids that are stabilized by hydrogen bonds in α helices?.

Answers

The numbers of residues separate amino acids that are stabilized by hydrogen bonds in α helices is  3.6 amino acid residues.

Why are amino acids called residues?

The  Amino acids are known to be compounds that are said to be called residues if there is  two or more amino acids that are known to be bond with each other.

Note that the amino group on one amino acid is one that tends to interacts with the carboxyl group and as such  form a peptide bond.

Therefore, The numbers of residues separate amino acids that are stabilized by hydrogen bonds in α helices is  3.6 amino acid residues.

Learn more about amino acids from

https://brainly.com/question/2526971

#SPJ1

You have a computer that runs on a windows 10 operating system and supports modern sleep. what will happen if you close the lid of the computer?

Answers

You have a computer that runs on the Windows 10 operating system and supports modern sleep mode what will happen if you close the computer lid is the computer will be put into sleep mode. If Modern Sleep is supported, the settings for closing the lid will be configured to trigger sleep mode.

A computer system is a basic, complete and functional arrangement of hardware and software with everything needed to implement computing performance. That is the basic working definition of a computer system as we know it, but computer systems have gone through many formal changes over the last few decades.

The physical components of a computer can also be interpreted as hardware. This includes the keyboard, mouse, monitor and processor. Hardware consists of input devices and output devices that make up a complete computer system. Examples of input devices are keyboards, optical scanners, mice and joysticks that are used to enter data into a computer.

You can learn more about computer system here https://brainly.com/question/14583494

#SPJ4

When inputting a formula into excel or other spreadsheet software, what components are required for the formula to function properly? lab flow

Answers

The components that are required for the formula to function properly are:

There should be a Closing parentheses for every opening form of parentheses.There should be an equal sign at the start of the formula.

What is a spreadsheet software?

A spreadsheet is known to be a kind of a computer program that is one that functions by helping to take in, display as well as alter data that are arranged in rows and columns.

Note that the Spreadsheets are said to be part of the most famous tools available for every personal computers.

Hence, The components that are required for the formula to function properly are:

There should be a Closing parentheses for every opening form of parentheses.There should be an equal sign at the start of the formula.

Learn more about spreadsheet from

https://brainly.com/question/4965119

#SPJ1

The physical things that hold digitized information such as books and songs are called?

Answers

The physical things that hold digitized information such as books and songs are called Digital Media.

What is digital media and its importance?

Digital media are known to be any kind of device that is said to make use of  technology such as the use of the internet and other forms of electronic devices to make content, for example audio and video, websites, as well as social media things.

Note that the use of  digital media is seen as any kind  of content that needs to use of electronic devices to make, share and view that given media.

Hence, The physical things that hold digitized information such as books and songs are called Digital Media.

Learn more about Digital Media from

https://brainly.com/question/3653791

#SPJ1

Other Questions
The Impact of Macroeconomic Policies on Healthcare Delivery in Kenya: An Analysis of the National Sexual Violence Prevention and Care Response Leso Munala1 , Emily Welle2 , Nene Okunna3 and Emily Hohenshell1The effect of macroeconomic indicators on healthcare expenditure in Iran Mohsen Pakdaman, Sara Geravandi1 , Roohollah Askari, Mohsen Askarishahi2 , Hasan Reza AfzaliRead and compare two articles of your choice from offered in the Forum. Are there similarities in the conclusions? Are there differences? Why?While answering, consider the following-the country profile-the type of study and tools used for data collection -bias and any specific assumptions -political environment and transparency-importance of the issue to the public and government Which types of thinking characterize postformal thought? (choose every correct answer.) A weathering horror twisted and sofa crosses features like a snake lighting swiftly over them and making one little paws with all of its breath intervallations an open site The main concern in the early days of film in the 1920s was the medium's depiction of __________. 58.6 grams to milligrams Amino acids and peptides in the stomach lumen stimulate acid secretion during the ________ phase of gastric secretion. During a cake-eating contest, Dave ate three and a half pizza and Daisyate two-thirds of a pizza. How many pizzas did they eat altogether?HELP EXPLAIN STEP BY STEP! How did voters' perceptions of the economy affect the 2012 presidential election? A line passes through point 6, 1 and has a slope of 43. Write an equation in =+AxByC form for this line. Use integers for A, B, and C. Using health-related data that precede diagnosis and signal a sufficient probability of a case or an outbreak to warrant further public health response is known as:_______. Through observing and imitating others, ______ learning takes place. a. operant b. positive c. vicarious d. social e. classical Kon'nichiwa, everyone! just to make sure you are correct if you answer this question make sure you have a explaination, and a good one with that.ex; you took the test and have proof you took it.ex; explaining how you got your answer also if you happen to need this "" you can just copy paste that and put it in the answerthat's all, thanks for reading this :D Which of the following is defined as the branch of psychology that is concerned with establishing the principles of right and wrong behavior? A. morals B. ethics C. behavior D. actions Please select the best answer from the choices provided A B C D Exercise 1 Circle the participle or participial phrase in each sentence.A girl named Molly introduced herself to Carla. Students must have a minimum of 50 annotations. Be sure to include annotations for all thefocal points, thats at least 6 per focal point. You also want to be sure that your annotationrepresent the entire book from beginning to end.Book link: https://www.camphillsd.k12.pa.us/site/handlers/filedownload.ashx?moduleinstanceid=612&dataid=2019&FileName=gathering_blue_novel-2.pdf Pls help i will give brainly Samaira needs to rent some tents for an outdoor family reunion in july. what is the best type of tent for samaira to rent so that her family members are protected from the heat of the sun? rough, black tents smooth, black tents rough, white tents smooth, white tents Entrepreneurs are considered the driving force in an economy because they are? the greatest number of people in an economy. provide most of the labor. own a great deal of land. start new businesses. A sale at a store is 15%. If the sale price afterthe discount is $35.70. What was the originalprice of the sweatshirt (S)? Q2. Identify the Collective Nouns. Write the collective noun in each sentence in the blank.1. A large crowd stood on the platform.2. The club held a meeting at my house.3. The orchestra tuned up before the concert