1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tasya [4]
3 years ago
15

What is the full path of the directory on this computer containing the SAM registry hive file

Computers and Technology
1 answer:
kompoz [17]3 years ago
3 0

Windows 2000 only supported standard format. It is group of legitimate keys, subkeys, and important in the registry that supports the files and contains backups of its data is called registry.  On versions of Windows that support the latest format, the following hives still use the standard format: HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE\SAM, HKEY_LOCAL_MACHINE\Security, and HKEY_USERS\.DEFAULT; all other hives use the latest format.

You might be interested in
Network layer protocols specify the _______ structure and processing used to carry data between hosts.
kari74 [83]

Network layer protocols specify the  <u>packet structure</u> and processing used to carry data between hosts.

<h3>What is the Network layer protocols  about?</h3>

The header, payload, as well as the trailer of a network packet are its three component pieces. The underlying network architecture or protocol employed determines the format and size of a network packet. A network packet resembles a package in concept.

Therefore, Network layer protocols define the packet format and processing needed to transfer data from one host to another host, in contrast to the Transmission layer (OSI Layer 4), which controls the data transport between the programs operating on each end computer.

Learn more about Network layer from

brainly.com/question/14476736
#SPJ1

3 0
1 year ago
Who wants to join my team that goes against bullying?
weeeeeb [17]
I would be glad to. :D
6 0
4 years ago
How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability
Tresset [83]
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
7 0
3 years ago
What is a dbms in full
Alika [10]

database management system

5 0
3 years ago
What is the primary difference between a task and an appointment?
ivolga24 [154]

Answer:

The correct option is B) Task has a due date instead of a specific time and place.

Explanation:

Task can be defined as any piece of work which is to be done in a specific, given period of time. On the other hand, appointment can be described as assigning a specific time to some one or scheduling a certain meet- up with someone. An appointment will have a specific time and place whereas a task will have a given time, not a specific time.  Hence, the correct option is B.

7 0
4 years ago
Other questions:
  • True or False: Metadata is not visible to the website user
    11·2 answers
  • Write an expression that evaluates to true if and only if the value of the integer variable workedOvertime is true.
    7·1 answer
  • Binary code what does this mean I was sick so I don't under stand
    7·2 answers
  • The voluntary linkage of computer networks around the world is called the ______.
    7·1 answer
  • Your company runs several databases on a single MySQL instance. They need to take backups of a specific database at regular inte
    12·1 answer
  • A gamer typing their name into the computer is an example of:
    14·2 answers
  • What are the trinity of the computer system
    15·1 answer
  • Um i'm new here... and i don't know really how to use this... i was wondering if som 1 can help me
    6·2 answers
  • Technology trends in education play a key role in a student’s: social life. motivation. career readiness. job search.
    8·2 answers
  • Suppose you are asked to design a rotating disk where the number of bits per track is constant. You know that the number of bits
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!