1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
3 years ago
10

In order to use the Active Directory Recycle Bin, all DCs in the forest must be running at least what Windows Server operating s

ystem?
Computers and Technology
1 answer:
AleksAgata [21]3 years ago
4 0

Answer:

Windows Server 2008 R2

Explanation:

The Windows Server 2008 R2 is a window server operating system that was developed by Microsoft. The server was developed on the enhancement of the Window Server 2008. This type of window server came with different improvements and benefits (such as power consumption) over the previous window servers in the market.

You might be interested in
The method of loci, peg-word system, substitute word system, and method of word association are all examples of _____.
Yakvenalex [24]
The answer is Mnemonic devices

Mnemonics enable us remember things more easily and often refer to such internal strategies like reciting a rhythm or reciting the order of colors of the rainbow. In cognitive psychology of memory, peg-word method, keyword method, and the method of loci are discussed as formal mnemonic techniques.



5 0
3 years ago
What does it mean by MYRIAD of data?
pentagon [3]

Answer:

The term Myriad means an indefinitely large number of things. And when we say Myriad of data, we mean an indefinitely large amount of data like in Petabytes.

Explanation:

What it does implies is that you are dealing with a large amount of data. And hence we are dealing with something like bigData. And hence, technologies related to BigData are going to operate. And this term is used as a noun as well as an adjective when we talk about English. And hence, you can use it with "a" or without the "a" as well. It has been a part of reputable English and has been repeatedly used by top authors like Milton.

5 0
3 years ago
1. which of the following tools can be used to mesure mass. (answer = 5 +??? points)
krek1111 [17]
B. a triple-beam balance
4 0
3 years ago
Read 2 more answers
Alison discovers that a system under her control has been infected with malware, which is using a key logger to report user keys
Bond [772]

Mostly the spyware and malware protection for desktop and laptop or workstations are to protected with anti-virus regular updates. All workstation or desktop or laptops are to updated operating systems patches.

If any operating systems patched update to be schedule and checked regularly. Schedule scanning by virus scanner to be made for desktop and laptop or workstations in regular interval basis

There are third parties tools such as malware and ADWCLEANER are also available free scanner software through internet where end user can download and scanner so software will clean the malware.

Mostly end user do mistake keep the files in desktop. Most of the malware software will affect the desktop folder only.

It will also affect c:\users folder and register enter keys.

7 0
3 years ago
Photographs, illustrations, and videos are increasingly created an and viewed in digital formats. True or False​
lutik1710 [3]

Answer:

I think it's True but I don't know sorry if I'm wrong

6 0
2 years ago
Read 2 more answers
Other questions:
  • Imagine that the following two lines of code are placed inside a
    11·1 answer
  • Which of the following commands would instruct OSPF to advertise ONLY the 192.168.10.0/24 network in Area 0?
    13·1 answer
  • I'd like to edit a picture so that I can remove the background behind an object and have it replaced with a transparent backgrou
    13·2 answers
  • Nested if-else structures can contain many blocks of code. How many of those blocks of code might be executed?
    14·1 answer
  • When you make taffy (a pliable candy), you must heat the candy mixture to 270 degrees Fahrenheit.
    8·1 answer
  • To what would you compare the transport layer?
    12·1 answer
  • I need help thanks please!
    8·2 answers
  • Which devices are used in networking
    15·1 answer
  • Through the use of computational thinking techniques, models and algorithms can be created. A(n)
    11·1 answer
  • Firestick optimizing system storage and applications loop
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!