1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
4 years ago
10

F a domain consists of dcs that are running verions of windows server earlier than windows server 2008, what replication method

is used?
Computers and Technology
1 answer:
garri49 [273]4 years ago
5 0
F is the grade I would give you if I were teaching you because your a 2008 Skid. You probably don't even know Html.

You might be interested in
Dеclarе and allocatе mеmory (on thе hеap) for a onе-dimеnsional array of 256 doublеs namеd pricеs
Zigmanuir [339]

Answer:

double *prices=new double [256];

Explanation:

To allocate memory on heap we use new keyword.In the above statement an array name prices is declared and the memory allocated to it is on the heap memory.

First look at double * prices.It is a pointer this pointer is created on the stack memory which holds starting address of the array present on the heap memory of size 256..

4 0
3 years ago
A hard drive cannot be partitioned until the device _________ is set.
Sophie [7]
I think the answer is shut down.
8 0
4 years ago
What is programming? ​
tankabanditka [31]
The process or activity of writing computer programs.
8 0
3 years ago
Read 2 more answers
Which of the following is an example of an open-ended question?
Tpy6a [65]

Answer:

<em>What are your thoughts about this?</em>

Explanation:

A question that can be answered with yes or no is a closed question.

4 0
3 years ago
Which of the following is true about protected access?
goldenfox [79]

Answer:(A) Protected members may be accessed by methods in the same package or in a subclass, even when the subclass is in a different package.

Explanation:

Methods,constructors and variables, that are protected in superclass they can be only accessed by any class within the package of the protected members class and methods in the same package or they can be of a subclass or the subclasses that may be present in other package .

5 0
3 years ago
Other questions:
  • WhyTheCombOfNatashaOtomoskiHas21Teeth?.txt
    14·1 answer
  • Alguna aplicación que copie lo que dice una imagen a un pdf?
    7·1 answer
  • Create pseudocode to compute the volume of a sphere. Use the formula: V= (4/3)* π r3 where π is equal to 3.1416 approximately, w
    14·2 answers
  • What are some of the unique benefits and challenges of flash drives as a way to store data?
    9·1 answer
  • HURRY 50 POINTS A human is needed to create the algorithms that computers use.<br> True<br> False
    14·2 answers
  • Study the original and changed passages.
    8·2 answers
  • 1
    13·1 answer
  • Manny has drafted an email message and configured a delivery option "Do not deliver before: 5:00 P.M. and today's date." He shut
    6·1 answer
  • Is this free to ask any question because when i tried to do it it said i have to pay money
    11·1 answer
  • For a list of numbers entered by the user and terminated by 0, find the sum of the positive number and the sum of the negative n
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!