1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cluponka [151]
3 years ago
10

What is the name of the domain controller database that windows server 2016 uses to store data about user access and resources o

n the network?
Computers and Technology
1 answer:
Inessa05 [86]3 years ago
3 0

The name of the domain controller database that Windows Server 2016 uses to store data about user access and resources on the network is Active Directory.

This Microsoft product manages permissions and access to networked resources. The main service in Active Directory is Domain Services (AD DS), which stores directory information and handles the interaction of the user with the domain.

You might be interested in
the history of forensics webquest answer key pdf what did the following people contribute to forensics
Tatiana [17]

A person that is known to have contribute to Forensics is Mathieu Orfila

<h3>Who is known as the father of forensic toxicology and why?</h3>

Mathieu orfila is said to be called  the father of toxicology due to the fact that he was the onw who was known to have published his work as the first scientific treatise on the act of knowing of poisons and as well as their effects on animals.

He is known to have done the work that set up forensic toxicology as a legitimate scientific discipline.

Hence, A person that is known to have contribute to Forensics is Mathieu Orfila

Learn more about Mathieu Orfila from

brainly.com/question/21073600

#SPJ1

3 0
2 years ago
Wireless displays connect to a computer using a wireless networking connection such as wi-fi or ____.
Semmy [17]
Wireless displays connect to a computer using a wireless networking connection such as wi-fi or Bluetooth
7 0
3 years ago
Why would you use cell names in formulas instead of numbers?
ehidna [41]
<span>It is easier to remember cell names. not sure tho</span>
5 0
3 years ago
The position of an element in the periodic table depends on​
shutvik [7]

Answer:

Electrons

Explanation:

Hope it helps

7 0
3 years ago
Loren Truesdale
LuckyWell [14K]

The output printed by the code is 18

<h3>The Code Analysis</h3>

The flow of the program is as follows:

  • The first line initializes a list of numbers named values
  • The second line initializes fred to 0
  • The third line is an iteration that is repeated for all numbers in the list
  • The next statement is a conditional statement that ensures that all 9's in the list are added, and saved in fred

<h3>The Code Computation</h3>

Recall that, the initial value of fred is 0, and there are 2 9's in the list.

So, the computation is:

fred=0 + 9 + 9

fred=18

This means that, the last instruction on line 10 will display 18, as the output

Hence, the output printed by the code is 18

Read more about algorithms at:

brainly.com/question/11623795

7 0
3 years ago
Other questions:
  • Can someone help me
    12·2 answers
  • Which type of RAM is used exclusively in laptops?<br> a) SODIMM<br> b) DDR3<br> c) DDR<br> d) DDR4
    15·1 answer
  • What are the text or graphics that are lighter than the main text located in a document's background called?
    10·1 answer
  • Which computer network component connects two different networks together and allows them to communicate?
    8·2 answers
  • Your it department enforces the use of 128-bit encryption on all company transmissions. your department also protects the compan
    13·1 answer
  • When a company is attempting to go public, they will hire an investment bank to...
    11·2 answers
  • Instructions:Select the correct answer.
    15·1 answer
  • . In an airport, a system consisting of sensors, bar code readers and remote controls is MOST LIKELY used for
    12·2 answers
  • Help please i will give Brainliest
    7·1 answer
  • After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!