1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AleksAgata [21]
1 year ago
12

Which directory service software would be used exclusively on a windows network?.

Computers and Technology
1 answer:
SSSSS [86.1K]1 year ago
7 0

The directory service software that would be used exclusively on a windows network is AD, an active directory service. The correct option is c.

<h3>What is directory service software?</h3>

A directory service is a group of programs and procedures that keep records of data about your business, subscribers, or both.

Microsoft created AD, a directory service solution, specifically for Windows. It offers a user interface for managing shared network objects, including users, user groups, desktop and laptop computers, devices, printers, and services.

Therefore, the correct option is c, Active Directory.

To learn more about directory service software, refer to the link:

brainly.com/question/28110834

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Lightweight Directory Access Protocol (LDAP)

Novell Directory Services (NDS)

Active Directory

Acyclic-Graph Directory Structure

You might be interested in
2 - identifiez fill in the blanks activity 2 attempts left late due november 8th 11:59 pm instructions you will hear a series of
malfutka [58]

Economic sanctions programs are generally administered and enforced by the Office of Foreign Assets Control against nations and specialized categories of people, such as terrorists and drug traffickers.

To achieve aims in foreign policy and national security, sanctions can be either sweeping or selective, using the asset freezing and trade restrictions. Sanctions management has a long history at the Treasury Department. Gallatin, Secretary of the Treasury, oversaw the sanctions against Great Britain for harassing American seamen beginning before the War of 1812. Congress passed a statute during the Civil War that forbade trade with the Confederacy, demanded the loss of products used in such trade, and established a licensing system governed by Treasury-managed rules and regulations.

Learn more about program here-

brainly.com/question/14618533

#SPJ4

5 0
1 year ago
Media literacy teaches today's students how to
STatiana [176]

Answer:

Locate reliable sources

6 0
3 years ago
A class diagram _____.
anastassius [24]

Answer:

provides an overview of class's data and methods

Explanation:

Class Diagram is used in software engineering to represent:

- classes

- attributes

- methods

- relationship between classes

It provides a representation of the static layout of the application in object oriented design. It does not provide method implementation details. In fact code skeleton can be automatically generated from class diagram using appropriate UML tools.

6 0
4 years ago
What METT-TC factor is at the root of the question: Could an improvised explosive device be hidden somewhere along the convoy ro
larisa [96]
At the root of the question: Could an improvised explosive device be hidden somewhere along the METT-TC factor is known as improvised explosive. It j<span>ust a question of more power along the same of what is now known as an improvised explosive device.</span>
4 0
3 years ago
What computer is designed for particular application​
Karo-lina-s [1.5K]

Answer: Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it

Explanation:

5 0
3 years ago
Other questions:
  • If you are asked to bring in agile way of working into the way a meeting runs, which one among the listed options will you imple
    11·1 answer
  • How many different Microsoft Windows file types can be infected with a virus?
    10·1 answer
  • Importance of word processing application​
    15·1 answer
  • Which key prevents movement between cells in a spreadsheet?
    9·1 answer
  • The information that’s displayed in a datalist control is defined by _____.
    10·1 answer
  • Delivering is not considered in supply chain analysis when outside carriers are contracted to move products to customers.
    15·1 answer
  • The "c" key and the "e" key are struck by
    12·2 answers
  • An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
    12·1 answer
  • Can i have help for a ggogle class room
    15·2 answers
  • 12. Fill in the blanks: In a ____________, the root of the tree is labeled _______________, children of the root are the names o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!