1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
4 years ago
15

Under what circumstance should you always let Windows manage the paging file size when running Windows Server 2012 and newer?

Computers and Technology
1 answer:
FinnZ [79.3K]4 years ago
3 0
<span>The paging file size should be set to the default setting at all times. This setting is meant to have the system manage the paging file size as this allows more virtual memory to be backed.</span>
You might be interested in
Need help asap<br> give the correct answer!!
blagie [28]
It’s either b or c, but my final answer would be C
4 0
3 years ago
Read 2 more answers
Convert 128 GB into KB​
goblinko [34]

Answer:

1,073,741,274  KB

Explanation:

Use an unit convertor or an calculator.

8 0
4 years ago
Read 2 more answers
Only the Windows Server 2016 Standard and Datacenter editions are compatible with the common language runtime used in Microsoft
Yakvenalex [24]

Answer:

False

Explanation:

All Windows Server 2016 version are compatible with the common language runtime used in Microsoft .NET Framework and Microsoft Visual Studio .NET.

Also, Windows Server 2019 is compatible, along with Windows Server 2012 in all its versions

No regular Windows editions are compatible, but that is not strange, because they are not meant to be servers

6 0
3 years ago
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
Order the steps for creating an outlook data file
Nataly_w [17]
On the File menu, point to New, and then choose Outlook Data File. Click Office Outlook Personal Folders File (. pst), and then select OK. In the Create or Open Outlook Data File dialog box, in the File name box, enter a name for the file, and then choose OK.
7 0
3 years ago
Read 2 more answers
Other questions:
  • based on the transcript, what did broadcasting the story through the medium of radio allow welles to do?
    8·1 answer
  • An algorithmic function that takes an input message of arbitrary length and returns an output of fixed-length is called a(n) ___
    10·1 answer
  • teve wants to use Google Display Ads to reach new customers who are looking to purchase products similar to his. Which audience
    14·1 answer
  • Tablets combine the features of which two types of devices?
    10·2 answers
  • Which one of the following will not be considered as a microcomputer?
    12·2 answers
  • Which function would you use to make sure all names are prepared for a mailing label?
    10·2 answers
  • The SmoothWall open source firewall solution uses colors to differentiate networks. Which color indicates the private, trusted s
    9·1 answer
  • When you need to move data over long distances using the internet, for instance across countries or continents to your amazon s3
    5·2 answers
  • For what specific purpose is the TM9400 P25 Mobile designed? What is the benefit of having a mobile communications device that a
    10·1 answer
  • Select the correct answer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!