1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
belka [17]
3 years ago
9

You are an administrator for contoso.com. you have two servers called server1 and server2 that run windows server 2012 and have

the failover clustering feature installed. you decide to add two more nodes to the cluster. you have a folder that you want all the servers to provide service for. what should you configure?
Computers and Technology
1 answer:
gogolik [260]3 years ago
6 0
You should configure a joint sever

You might be interested in
What food does swiss eat on christmas?
UkoKoshka [18]
The main Christmas meal is eaten on Christmas Eve and popular foods include a Christmas ham and scalloped potatoes with melted cheese and milk baked into it. Desert is often a walnut cake and Christmas cookies.
7 0
3 years ago
What do I do if my friend wants me to watch a video at my house?
steposvetlana [31]

Have him email the link to you and click on the it.

hope this helps, have a great day!

3 0
3 years ago
Read 2 more answers
The house had a wonderful pool of ... (his/its/our) own.​
-BARSIC- [3]

Answer:

its

Explanation:

"It" used in a number of different forms of sentences and has several rules. 'It' can be used in a sentence either for a Subject or an Object. It can be used as an introductory word in a sentence when there is no mention of the subject. It used for the singular, third-person pronoun. While it has many uses and according to the question, it is used to refer to a lifeless object (home).

6 0
3 years ago
Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a
Evgesh-ka [11]

Answer:

b) False.

Explanation:

Port explorers ​are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, anAn IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message., is a FALSE statement.

5 0
3 years ago
President Roosevelt's Fireside Chats were:
larisa86 [58]
C. Entertaining radio shows that families listened to in the evening. He did these chats to inform the public on what he was going to do about the problems facing the public.
3 0
3 years ago
Read 2 more answers
Other questions:
  • According to Mintzberg's classification of managerial roles, the role of a(n) ______ is to transmit information received from ou
    7·1 answer
  • What can you do with someone's ip address?
    9·1 answer
  • Human factors is the study of:
    5·1 answer
  • Why are ethics important in PR?
    8·1 answer
  • All systems have ___________.
    9·2 answers
  • Suppose that a server sends four packets of audio data, in 15 seconds each. The first is sent by the server exactly at noon (12:
    14·1 answer
  • 1) which of the following is not a characteristic of valuable information?
    8·1 answer
  • Outline four types of cyber law.
    14·1 answer
  • HELP ME PLEASE ASAP
    6·1 answer
  • Va rog urgent
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!