1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ede4ka [16]
3 years ago
10

What type of Windows server has Active Directory installed and is responsible for allowing client computers access to domain res

ources?
Computers and Technology
1 answer:
Basile [38]3 years ago
4 0

Answer:

Domain controller                    

Explanation:

  • A domain controllers is a server which acknowledges authentication requests and validates users access on the computer network in order to use the resources.
  • This is done by the domain controller by verifying the username and password.
  • It also allows user to access the other domain and also access the resources of other domain.
  • For example there is a network of multiple computers and each computer requires authentication i.e user is asked to provide the username and password.
  • Authenticating every computer and managing is not easy so a computer is appointed this task of authentication other computers.
  • This computer  is called domain controller which can easily maintain these authentication details of the users.
  • The authentication information (login details) of users, computers and shared resources is saved in Active Directory database.
  • If a user requests access to the resource via login then the login details (username and password) of the user should match with that stored in the Active Directory in order to grant access to the user.
  • Domain controller enables resources sharing and is good for large networks and provides with improved security.
You might be interested in
What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?
Katarina [22]
MTA (Mail Transfer Agent)
6 0
3 years ago
What effect does social media have on teens?
myrzilka [38]

Answer:

manipulation is the answer

3 0
3 years ago
Read 2 more answers
Five programs are currently being run in a computer. Program 1 is using 10 GiB of RAM, program 2 is using 5 GiB of RAM, program
muminat

Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be  isolated from the other processes.

<h3>How is virtual memory used instead of RAM?</h3>

A system is known to make use of a virtual memory and this is one that tend to make use of a section of the hard drive to act like the RAM.

With the use of virtual memory, a system can be able to load bigger or a lot of programs running at the same time, and this is one that tends to hep one to work as if it has more space, without having to buy more RAM.

Therefore, Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be  isolated from the other processes.

Learn more about virtual memory from

brainly.com/question/13088640

#SPJ1

6 0
1 year ago
Write down the appropriate technical term of following statements.​
MrRa [10]

Answer:

it is not seeing full. please give full

8 0
3 years ago
Stock ____ firms trade financial securities between a buyer and a seller.
diamong [38]
<span>Stock market firms, also known as brokerage firms, assist in the act of buying and selling financial securities. These trades are financed through financial institutions for security.</span>
3 0
3 years ago
Other questions:
  • What Is the output of the following: =OR (5 &lt;7, 16*Rand ()&gt;23,FALSE)
    5·1 answer
  • What type of firewall works on the Session layer that creates a connection and allows packets to flow between the two hosts with
    8·1 answer
  • Write an if/else statement that compares the double variable pH with 7.0 and makes the following assignments to the bool variabl
    6·1 answer
  • You have four DCs in your domain. Active Directory appears to be corrupted on one of the DCs, and you suspect a failing hard dri
    5·1 answer
  • The part of a rocket engine that allows the combustion gases and flames to leave the rocket engine is the
    14·1 answer
  • Write a Java class with the following methods: getArray(int numStrings) is an instance method that takes command line input (use
    11·1 answer
  • Word documents contain how many sections by default?
    9·1 answer
  • Before going into space, astronauts spend many hours training on flight simulators allowing them to learn how to fly without lif
    10·1 answer
  • The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the databas
    14·1 answer
  • Create an java application that will process 3-digit numbers as follows:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!