1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
7

What are the two main functions of user accounts in Active Directory? (Choose all that apply.) Allow users to access resources m

ethod for user authentication to the network Provide detailed information about a user Provide auditing details
Computers and Technology
2 answers:
Alekssandra [29.7K]3 years ago
8 0

Answer:

-Allow users to access resources

-Method for user authentication to the network

Explanation:

User accounts in Active Directory give people and programs the access to resources in a windows domain. These accounts are used to allow people to access resources, manage the access users have to resources like files and directories and allow programs to be able to run in a particular context. According to this, the answer is that the two main functions of user accounts in Active Directory are: allow users to access resources and method for user authentication to the network.

irina [24]3 years ago
3 0

Answer:

method for user authentication to the network

Provide detailed information about a user

Explanation:

An in AD, a user account consists of all the information that includes user names, passwords, and groups. All these information defines a domain user in which a user account has membership access to. With the advanced features of Kerbos, mutual authentication in user accounts to a service is achieved.

You might be interested in
Enterprise application integration (eai) software enables users to model the business processes and interactions that should occ
Tanya [424]
Sorry i need 50 points

6 0
3 years ago
On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * r^n, where n is the distance
vodomira [7]

Answer:

Following are the code to this question:

import math# import math module

def RaiseToPower():   # defining a function RaiseToPower

   r= math.pow(2,1/12)    # defining r variable that calcualte the decimal point value.

   return r # return r variable value.

f0= float(input()) #defining f0 variable that hold input frequency .

for n in range(0,5):#defining for loop to count all frequency

   fn = f * math.pow(RaiseToPower(),n)    # defining fn variable that calls method RaiseToPower and multiply the value by frequency

   print(fn,end=' ')    # use print method to prints all five frequency

Output:

440

440.0 466.1637615180899 493.8833012561241 523.2511306011974 554.3652619537443

Explanation:

Description of the above python code can be defined as follows:

  • In the above code first we import the package of the math module for converting frequency, after importing package a "RaiseToPower" method is declared, inside the method r variable is declared, that counts decimal value and return its value.
  • In the next step, "f0" a frequency variable is declared that input a value from the user and defined a for loop to in the loop fn variable declared, calls the method and pass its input value and stores its decimal points and at the last print its value.

6 0
4 years ago
The information provided in text aids can help us to understand a text’s content before we even read it.
dimaraw [331]
It is true that the information provided in text aids can help us to understand a text's content before we even read it.
These text aids will contain bits and pieces from the text, which will make us understand the overall message even before we actually get down to going through the text itself. I believe it is better to actually read the text, and try to understand it on your own, before going to these aids for help.
7 0
3 years ago
which program monitors the computer by looking for known trouble makers as well as suspicious behavior​
lys-0071 [83]

Answer:

i think spyware because spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.

Explanation:

3 0
3 years ago
11.
dsp73
11. <span><span>their population crashed.
</span><span>
12. </span></span><span>dead zone

13. I believe </span><span>energy efficient</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • In what sense are hardware and software equivalent
    6·1 answer
  • Which of the following are examples of how a company might use consumer data it had collected? a To decide what types of product
    10·1 answer
  • What does the clone tile command do?
    15·2 answers
  • The CMS Quarterly Provider Update (QPU) is an online CMS publication that contains information about __________ currently under
    14·1 answer
  • Which branch of science helps avoid or minimize stress-related injuries at workplace?
    14·2 answers
  • Which type of choir often sings AND dances while they perform?
    9·1 answer
  • is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
    6·1 answer
  • What is the output of this program? age=4 if age &gt;5: print (“more”) else: print (“less”)
    7·1 answer
  • 4. In computers, an integer can be represented by more than 8-bit, what is the largest positive integer that
    9·1 answer
  • Need help finding the totals and with the empty spots
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!