1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
3 years ago
7

Microsoft has developed the Active Directory Domain structure so that a central authority, called the __________, is the reposit

ory for all domain security records.
Computers and Technology
1 answer:
Sliva [168]3 years ago
8 0

Answer:

Domain Controller

Explanation:

Microsoft has developed the Active Directory Domain structure so that a central authority, called the domain controller, is the repository for all domain security records.

You might be interested in
If you don't know whether to write too, two, or to, you should use the spell-checker to help you decide. true or false?
Charra [1.4K]
I can see this going two ways

-True, if you are not sure if you've used the right kind of spelling for that sentence and want an instant proof read.

-False, there's a chance it can get it wrong so you should ask another person for help.

Take you pick on either one.
4 0
3 years ago
The basic work area of the computer is it screen that you when you first fire up your computer
Dvinal [7]

True.

The desktop as it is famously known is a computer display area that represents the most fundamental element of a computer’s GUI. It is the default display of a computer when it boots up. It can be contained in a window that can be a part or a full screen.

8 0
3 years ago
Where else can the computer send the results of processing other than to output​
hjlf

Explanation:

it can also be sent through flashdrive

3 0
2 years ago
Columns are most useful for which tasks ?
amid [387]
Laying out newsletters and creating a visual appeal without images
5 0
3 years ago
What kind of server connects a remote system through the internet to local serial ports using tcp/ip?
zaharov [31]
A proxy server. A system requests information from the internet, and that traffic is routed through the proxy server before arriving to the requesting system.

This is why proxy servers are used for hiding identity and being more secure, as internet traffic would show the IP address of the proxy server, and not the requesting system, though this often depends on the type of proxy server, as some proxy server's main objective isn't anonymousity, but rather efficiency.
4 0
2 years ago
Other questions:
  • Desktop, laptop, and tablet computers, and mobile devices are classified as _______.
    7·1 answer
  • What aspect do you need to keep in mind when you add images in a word document?
    11·2 answers
  • What are the benefits of organizing your thoughts before you begin your speech
    14·1 answer
  • Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
    12·1 answer
  • Which increases the rate of soil formation?
    10·1 answer
  • What are the different ways to represent compounds? Check all that apply. a structural formula a ball model a space-filling mode
    13·2 answers
  • An HTML document is composed of ______ that represent distinct items in the Web Page, such as a paragraph, the page heading, or
    9·1 answer
  • What is the difference between i++ and ++ii?
    6·1 answer
  • What Are the Benefits of Using Leads Automation Tool?
    5·1 answer
  • What are the characteristics of Instant Search in Outlook 2016? Check all that apply. A)Typing whole phrases makes your search m
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!