1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tasya [4]
3 years ago
15

What is the full path of the directory on this computer containing the SAM registry hive file

Computers and Technology
1 answer:
kompoz [17]3 years ago
3 0

Windows 2000 only supported standard format. It is group of legitimate keys, subkeys, and important in the registry that supports the files and contains backups of its data is called registry.  On versions of Windows that support the latest format, the following hives still use the standard format: HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE\SAM, HKEY_LOCAL_MACHINE\Security, and HKEY_USERS\.DEFAULT; all other hives use the latest format.

You might be interested in
unlike tv or newspaper ads, internet communications are interactive, and consumers can choose which messages and information the
Softa [21]

Companies often engage the services of Advertising firms to market their products. Company web offerings can be tailor-made for the consumers.

  • Advertising agencies are firms that makes, plan and handle the advertising needs of any business. They are known for handling negotiations creating tailored marketing campaigns.

A lot of agencies do not want to talk about pricing until they know what you can afford to spend.

Tailored content are delivered experiences that speak directly to customers.

This agencies uses their connections and resources to make one's campaign successful and cost-efficient.

Learn more from

brainly.com/question/23477855

5 0
2 years ago
In Microsoft Word, when you highlight existing text you want to replace, you are in
kirill115 [55]
The correct answer is C. Typeover mode

This is when you select a text and can then type over it and it automatically replaces it with what you're writing. It also creates a little box that lets you edit the selected part easily if that's what you need with things like bold or italic or change the text color.
6 0
3 years ago
When sharing a file or folder with someone not in your __________ , you need to input the __________ of the recipient.
Ede4ka [16]
Group, name is the answer
6 0
3 years ago
Read 2 more answers
A program that will accept the ages of girls and boys and calculate the total and average age​
Firdavs [7]

Answer:..

hmmm...... i dont any programs that can do that

8 0
2 years ago
Which of the following generally does not apply to all seven domains of an IT infrastructure? Incident response Service level ag
almond37 [142]

Answer:

Option C, Disaster recovery plan

Explanation:

The seven domains of IT are

User Domain

System/Application Domain

LAN Domain

Remote Access Domain

WAN Domain

LAN-to-WAN Domain

Workstation Domain

To these seven domain, the Disaster recovery plan only applies to the LAN-to-WAN Domain as it is vulnerable to corruption of data and information and data. Also, it has  insecure Transmission Control Protocol/Internet Protocol. (TCP/IP) applications and it at the radar of Hackers and attackers

4 0
2 years ago
Other questions:
  • If you want to emphasize the Greek root of a word in a document, which tool in Microsoft® Word could you use?
    6·2 answers
  • What is the digital divide? What does the digital divide mean for the world?
    9·1 answer
  • Well this isn't school related, but how do i watch dubbed and subbed anime for free on my computer?
    7·2 answers
  • The format for the UPDATE command is the word UPDATE, followed by the name of the table to be updated. The next portion of the c
    13·1 answer
  • Să se determine valoarea sumei: l+2+3+…+n pentru un n număr natural citit de la tastatură. Sa se scrie un algoritm care calculea
    13·1 answer
  • What is a cloud in the world of computing
    7·1 answer
  • How do most business applications and websites process credit card transactions?
    13·1 answer
  • Part B - Find the solutions for the following Case Study Real World Problems by applying the appropriate concepts that you learn
    5·1 answer
  • Unscramble the given word and identify the correct statement about it. ATTEPLSR
    10·1 answer
  • In cyber security, one of the best ways to protect a computer or network is with a strategy called defense in depth. This strate
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!