1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
2 years ago
13

What are the main differences between openldap and microsoft's active directory (ad)? check all that apply

Computers and Technology
1 answer:
nikklg [1K]2 years ago
6 0

The main differences between openldap and microsoft's active directory are:

  • Open LDAP works on any OS, AD does not.
  • Open LDAP is open-source, AD is not.

<h3>What is the openldap and microsoft's active directory?</h3>

The LDAP is known to be a kind of an open, vendor-agnostic that functions  with a lot of directory services, such as AD. AD but Microsoft's proprietary directory service is known to often put together a lot of IT assets like computers and its users.

Therefore, The main differences between openldap and microsoft's active directory are:

  • Open LDAP works on any OS, AD does not.
  • Open LDAP is open-source, AD is not.

Learn more about  active directory from

brainly.com/question/24215126

#SPJ12

You might be interested in
2 negative impact of excessive use of computer even in solving mathematical problem.
zlopas [31]

Answer:

Computers are now a days the very important part of each department as well as homes. All people are somehow using computers for their respective needs. As technology always has the negative impacts along with the positive ones so, computer do have some crucial points when taking about students specially.

Following are listed some acts that add to the negativity of computer's usage.

  • Excess use of computers by students while solving mathematical problems lead them to rely totally on the computer. Students don't tend to calculate by their own instead they use computerized calculators for their ease and hence they start lacking even in basic calculations in normal routine also.
  • Computers may impact students routine in such a way that they don't concentrate on their studies while having extreme interest in video games and their favorite seasons and other activities.
  • Using computers more than a certain limit effects eyesight badly. This is the reason today most of the teenagers use spectacles in normal routine.

<h3>I hope it will help you! </h3>
4 0
3 years ago
Can someone please help me write a code for this
Anon25 [30]
When in doubt, decompose (break into smaller parts) the problem!

You need to display a GUI.
You need to accept input from two widgets and convert it integers.
You need to add a range of numbers.
You need to concatenate a string of what you're doing with the addition.
You need to display an answer in a widget and maybe redraw the window.

I've been having success copying the assignment into my source file and decomposing it as comments to frame out my program.
5 0
4 years ago
What command would you issue from a command prompt to see a listing of the computers in your workgroup?
ololo11 [35]
<span>Net View is the command issue from a command prompt to see a listing of the computers in your workgroup.It will display the list of domains,computers resources which have been shared by the specified computer then it will list all computers currently in our domain.The syntax for net view using command prompt NET VIEW [\\computername [/CACHE] | [/ALL] | /DOMAIN[:domainname]].</span>
8 0
3 years ago
Which asynchronous electronic community is also known as a forum?
Semmy [17]
What are the choices?
Message Boarding is the asynchronous electronic that is know as a forum.
3 0
4 years ago
Read 2 more answers
2 Consider the sequence of keys (5,16,22,45,2,10,18,30,50,12,1). Draw the result of inserting entries with these keys (in the gi
Juliette [100K]

Answer:

A) (2,4) tree

  • Insertion of  key 45 makes key unbalanced and this is because it violates the 2,4 tree so we split the node
  • insertion of key 10 makes key unbalanced and this is because it violates the 2,4 tree so we split the node

B) Red-black tree

Explanation:

The diagrams for the solutions are attached showing the results of inserting entries

6 0
3 years ago
Other questions:
  • What type of social engineering attack uses email to direct you to their their website where they claim you need to update/valid
    6·2 answers
  • If there is a slow internet connection or limited access to certain sites it is often better to _________ a video file before st
    9·2 answers
  • Seth is considering advertising his business using paid search results.What do you think makes paid search advertising so effect
    11·2 answers
  • Concept about borderless classroom because of technology​
    9·1 answer
  • I need a explanation for this 02 question for a test I will have .
    11·1 answer
  • Tara is creating a presentation for her science project about volcanoes. She added different animations to every slide for empha
    12·1 answer
  • Menus are attached to the windows by calling
    15·1 answer
  • How to make a harmonic mean algorithm in bash Linux?
    15·1 answer
  • Que relacion tiene Las palabras: fermentacion-vino y clonacion- dolly​
    9·1 answer
  • PLS HURRY<br> Look at the image below
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!