1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
8

What makes Group Policy such a powerful tool is its ability to enable security administrators to:_________.

Computers and Technology
1 answer:
babunello [35]3 years ago
5 0

Answer: Enforce the organization's security policy

Explanation: Group policy provides a robust and centralized control to systems or computers on a particular network by providing a quick and efficient means of maintaining network security by affording network administrators the ability to several policies they wish to apply on users and computers in their network. This way the changes or policies can be applied to every computer on it's network. Hence it allows the network administrators to enforce the organization's security policy which may include restricting access to certain websites, directories, files or settings for all computers on the organization's network.

You might be interested in
When your tire blows out in the middle of a drive, you should _____. A. let go of the steering wheel B. pump the brakes immediat
notsponge [240]
The answer is D. Because you are in the middle of the road so put your caution lights on and steer to the side of the road
3 0
4 years ago
Read 2 more answers
Was LDAP version2 an internet standard in 1998? is it now?
mamaluj [8]

Answer Explanation:

LDAP stand for lightweight directory access protocol 389 is its port number it is an application layer protocol it was first invented in march 1998 and become very popular widespread  internet standard in august 1998 its authentication method is very simple the client send user name and password to LDAP server to access this.

4 0
3 years ago
If Mary makes homemade jams that she sells to her local grocer, she is practicing:
DIA [1.3K]

Answer: c) C2B (Consumer to business)

Explanation: Consumer to business (C2B) is the business technique in which the consumer or customer generates the good or service and then businesses are offered to take that product or service. The case mentioned in the question is also similar where May sells the jams made by her to the local grocer who has his business.

Other options are incorrect because Business to business (B2B) is where two business party trade with each other, Business to consumer (B2C) is business offer the product or service to consumer and Costumer to costumer(C2C) is the private trading of service between two individual parties. Thus,the correct option is option(c).

8 0
3 years ago
( Game Design) The companies who get video games out to consumers are called:
Bad White [126]

Answer:

They are called video game publishers

Explanation:

A video game publisher is responsible for financing a video game’s development, marketing, and release of the game to the consumers. Basically, they are the ones who manage the business end of the gaming field. If the video game company is well established, the publishers of that company will be the ones to distribute while some smaller companies will hire distribution companies to distribute the games for them

3 0
3 years ago
Please give all the answer​
il63 [147K]

Answer:

am/is=was

are=were

do=did

go=went

eat=ate

have=had

make=made

take=took

see=saw

fly=flew

sell=sold

tell=told

find=found

sent=sent

Explanation:

These are all present/ past tense

I hope this helps.

5 0
3 years ago
Read 2 more answers
Other questions:
  • What is a hobbyist for engineering
    7·1 answer
  • While performing Before Operations PMCS, you notice the front right tire appears slightly underinflated. What is the proper acti
    11·1 answer
  • A + B (AC (B +C’) D) = A + BD
    10·2 answers
  • You use ddl to create, modify, and delete the ___________________________ of a database.
    6·1 answer
  • ___________ is an approach to boundary spanning that results from using sophisticated software to search through large amounts o
    8·1 answer
  • What kind of files are automatically blocked in outlook?
    7·1 answer
  • В.
    11·1 answer
  • Which of the following commands appears in the INSERT menu or tab?
    10·1 answer
  • When is it appropriate to utilize the nat network connection type?
    8·1 answer
  • 2. Cryptography relies on open standards - a protocol or standard that is publicly available. Why are open standards necessary
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!