1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
13

Number of byte required to store illumination

Computers and Technology
1 answer:
Rina8888 [55]3 years ago
5 0
If we are talking about light that’s an whole different subject
You might be interested in
In which format is information stored on a hard drive?
Natalija [7]
The answer is binary
6 0
3 years ago
There is a feature that allows you to lock the document, to avoid others making changes. True or False
Burka [1]

Answer:

yes there is

Explanation:

6 0
3 years ago
According to the book, if your CPU usage levels are greater than ________ during most of your work session, a faster CPU can gre
Zanzabum

Answer:

90%

Explanation:

3 0
3 years ago
Filtering of packets as they leave the network destined for the internet is called ____________ .
e-lub [12.9K]
<span>Filtering of packets as they leave the network destined for the internet is called packet filtering. This firewall technique is also known as static filtering, and it is mainly used to control network access through the process of monitoring both outgoing and incoming packets. Along with monitoring, it functions to allow the packets to pass or halt which takes place based on the source of Internet Protocol.</span>
6 0
3 years ago
Which of the following is the most common tool that Windows administrators use on the domain controller?
baherus [9]

Answer:

D. The Active Directory Users and Computers

Explanation:

The Active Directory Users and Computers (ADUC) is one of the many tools used to administer the Active Directory and it is the most common tool that Windows admins use on the domain controller. It provides most of the admins functions such as

i. resetting of password

ii. unlocking users

iii. delegating of permissions to users to manage group policy

iv. managing Active Directory objects - users, computers, contacts, groups - and their attributes.

Other tools are Active Directory Component Services (allows to manage component services), Active Directory Domains and Trusts (allows to manage trusts between forests and domains), Active Directory Administrative Center (allows to manage password policies and even get the history of PowerShell logs).

<em>Hope this helps!</em>

3 0
3 years ago
Other questions:
  • A typical serial cable has
    13·1 answer
  • A c++ member function that uses, but does not change, the value of a member variable is called
    13·1 answer
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • Carrie is creating a personal balance sheet. The heading includes the period of time that the balance sheet
    11·1 answer
  • The worlds two highest dams are both in tajikistan. the rogun dam is 35 meters taller than the nurek dam. together they are 635
    13·1 answer
  • What do you like and dislike about school? ANDWER FAST!!!
    5·2 answers
  • The HTTP protocol operates at which layer?
    7·1 answer
  • Is anyone else having issues with brainly not working? Everytime I click on a answer it only comes up with the 7 month trail thi
    12·1 answer
  • Is Invader Zim gonna come back?
    7·1 answer
  • The scope of a temporary table is limited to what?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!