1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
15

Which type of system must you connect to and use to make changes to Active Directory?

Computers and Technology
1 answer:
krok68 [10]3 years ago
4 0

Answer:

c.Writable domain controller.

Explanation:

To make changes in an active directory a writable domain controller.

Read Only domain controllers(RODC):- It is basically a server it responds to requests of security authentication and It hosts an active directory database's read-only partitions.

This is not the case with writable domain controller since it can make changes to the Active directory.

You might be interested in
Which of the statements below are true about Digital Signatures?
Leokris [45]

Answer:

The answer is "Option a, and c".

Explanation:

Following are the description of the Digital Signature choices:

  • To change the physical transportation of paper or link files in the computerized messaging system, some processes should be identified and utilized in digital signatures, which enables documentation to be validated unforgivably.
  • Using public-key cryptography, digital signatures, that's an exquisite system, that's why options a and b are correct.
  • Digital signatures are not a central authority, that's why the option B is wrong.
5 0
3 years ago
simplify the expression below and state the value of m for which the simplified expression is not defined 2m² + m - 15/ m² - 9​
motikmotik

Answer:

  • The simplified expression is: \frac{2m-5}{m-3}
  • The simplified expression is undefined for m=3

Explanation:

The given expression is:

\frac{2m^2+m-15}{m^2-9}

The numerator can be siplified by using factorization and denominator will be simplified using the formula

a^2-b^2 = (a+b)(a-b)

So,

= \frac{2m^2+6m-5m-15}{(m)^2-(3)^2}\\=\frac{2m(m+3)-5(m+3)}{(m-3)(m+3)}\\=\frac{(2m-5)(m+3)}{(m-3)(m+3)}\\=\frac{2m-5}{m-3}

A fraction is undefined when the denominator is zero. In order to find the value of m on which the simplified fraction will be undefined we will put denominator equal to zero.

So,

m-3 = 0 => m = 3

Hence,

  • The simplified expression is: \frac{2m-5}{m-3}
  • The simplified expression is undefined for m=3
7 0
3 years ago
You are working with a database table that contains data about music. The table includes columns for track_id, track_name (name
german

The statement that completes the query is: bytes / 1000 AS kilobytes

<h3>SQL (Structured Query Language)</h3>

This is the language that is used to retrieve, update, and store data in the database.

<h3>Columns</h3>

From the question, we have the following table columns

  • track_id
  • track_name (name of the music track)
  • composer
  • bytes (digital storage size of the music track

To retrieve data from the bytes column, we make use of:

SELECT bytes ......

From the question, we understand that this column should be divided by 1000, and the AS command should be used.

So, the query becomes

SELECT bytes / 1000 AS kilobytes .....

Hence, the statement that completes the query is: bytes / 1000 AS kilobytes

Read more about database at:

brainly.com/question/24223730

5 0
2 years ago
How serious are the risks to your computer security?
ASHA 777 [7]

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

<h3>What are the risk results for information and computer security?</h3>

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

brainly.com/question/12010892

#SPJ1

6 0
2 years ago
Universal Containers is designing a new community using the Customer Community license type. They would like to have the users c
motikmotik

Answer:

The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?

A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.

B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access

C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.

D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.

The explanation of the answer is now provided as follows:

Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.

The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.

By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

5 0
3 years ago
Other questions:
  • What can a folder on a computer contain?
    13·2 answers
  • In some cases, certain Hyper-V guest operating system features do not function properly using the operating system's own device
    9·1 answer
  • ICT excel data homework
    10·1 answer
  • "what are the problems with tcp over wireless network?"
    15·1 answer
  • Which of the following represent emerging classes of application software? Check all of the boxes that apply.
    9·3 answers
  • What are 2 plants that grow best in our soil type ​
    9·1 answer
  • An individual who understands and uses a variety of symbols yet uses one symbol at a time to share a message needs more developm
    10·1 answer
  • The command to get out of the loop.<br>a.<br>i exit<br>ii. break<br>iii. comment<br>iv. for​
    12·1 answer
  • Caps lock key is used to type alphabets. _________​
    6·2 answers
  • A company creates a ______by using a wireless access point (WAP) and an Internet connection. Select the two correct answers, the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!