1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
k0ka [10]
3 years ago
12

An OU structure in your domain has one OU per department, and all the computer and user accounts are in their respective OUs. Yo

u have configured several GPOs defining computer and user policies and linked the GPOs to the domain. A group of managers in the Marketing Department need different policies that differ from those of the rest of the Marketing Department users and computers, but you don't want to change the top-level OU structure. Which of the following GPO processing features are you most likely to use?
a, Block inheritance
b, GPO enforcement
c, WMI filtering
d, Loopback processing
Computers and Technology
1 answer:
tamaranim1 [39]3 years ago
6 0

Answer:

Block Inheritance.

Explanation:

Block Inheritance:-It is used to block the inheritance of the GPOs.If in the setting Block inheritance is enabled the inheritance of GPOs will get blocked.This is the way to block GPOs inheritance as they can be inherited by default .So the for the case given Block Inheritance is best suited.

You might be interested in
How can you best protect yourself when using social media?
Blababa [14]
D. Because reviewing the privacy settings can help you set who can see what you post or say on the social media
3 0
3 years ago
Read 2 more answers
Why is this app here to help but wont let me see answers to my questions?
UkoKoshka [18]

Answer:

maybe you need to reload the page and press the little bell on the right side and u should get a notification when somebody answers your question and if that doesnt help go to your profile and press the tab (on this tab if that makes since) it should say sumin like questions you asked and u should press the ones u need the answers to

Explanation:

lmk if this helped

5 0
3 years ago
Read 2 more answers
Inattentional blindness occurs when individuals do not observe certain objects or events because they are focused on something e
PSYCHO15rus [73]
The answer is True have a good day
5 0
4 years ago
Read 2 more answers
Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company
Arisa [49]

Answer:

Losing jobs. Fire. Destruction of property.

Explanation:

Having a company shut down due to lack of protection and having people testify products unsafe. If software blows up it could cause desturction of property therefore causing the effect of many people losing their jobs.

4 0
3 years ago
Write a function gcd in assembly language, which takes two parameters, calculates and returns the gcd of those two numbers. You
Inga [223]

Answer:

Explanation:

The following is written in Java. It creates the function that takes in two int values to calculate the gcd. It includes step by step comments and prints the gcd value to the console.

       public static void calculateGCD(int x, int y) {

           //x and y are the numbers to find the GCF which is needed first

           x = 12;

           y = 8;

           int gcd = 1;

           //loop through from 1 to the smallest of both numbers

           for(int i = 1; i <= x && i <= y; i++)

           {

               //returns true if both conditions are satisfied

               if(x%i==0 && y%i==0)

                   //once we have both values as true we store i as the greatest common denominator

                   gcd = i;

           }

           //prints the gcd

           System.out.printf("GCD of " + x + " and " + y + " is: " + gcd);

       }

4 0
3 years ago
Other questions:
  • Which steps will complete adding the cells A45 to A55?
    8·1 answer
  • Whats the 7 internal components found in a computer tower
    11·1 answer
  • A/An is a series of instructions or commands that a computer follows; used to create software
    10·2 answers
  • In pre-shared key mode, a passphrase should be at least ________ characters long.
    15·1 answer
  • Write the header for a function addOne that accepts a single integer reference parameter and returns nothing. Name the parameter
    5·1 answer
  • What is the program that searches through data bases?
    10·1 answer
  • can Results shown at the top of the Google search engine results page (SERP) always get high Needs Met ratings
    10·1 answer
  • Which of the following in not part of the CIA triad that is one of the cornerstones of information security? a. Confidentiality
    14·1 answer
  • I have a question involving do and for loops while using arrays.
    8·1 answer
  • 1.The ___________ method adds a new element onto the end of the array.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!