1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
3 years ago
5

Computers that belong to the same domain can access a common security database of user and computer account information. This ty

pe of database on Windows Server 2016 domain controller servers is also known as what kind of database?
Computers and Technology
1 answer:
Mashutka [201]3 years ago
6 0

Answer: Active Directory database

Explanation:Active directory database works on ESE (Extensible storage engine) for the functioning.Indexed and sequential access method(ISAM)database persist in the ESE for the management of computer devices.

This functions for providing the quick accessing towards the records through database.The database files contain the data in the ESE indexes and is common to computer information and the user.

You might be interested in
Process is useful for a quick turnaround in game development?
aleksley [76]
Rapid prototyping as it allows the production of a functional program in a short time
7 0
3 years ago
Read 2 more answers
Do all accounts serve the same function? Why or why not?
lora16 [44]

The correct answer is D. No, accounts serve the purpose that their owners choose.

There are different types of bank accounts which are for saving, fixed deposit account, current account, and recurring account.

Basic banking provides amount of customers with a banking comfort.

They also provide cistomer and secure friendly environment.

3 0
3 years ago
Read 2 more answers
Implement function easyCrypto() that takes as input a string and prints its encryption
jasenka [17]

Answer:

The program written in python is as follows;

import string

def easyCrypto(inputstring):

      for i in range(len(inputstring)):

             try:

                    ind = string.ascii_lowercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

                           print(string.ascii_lowercase[ind+1],end="")

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

anystring = input("Enter a string: ")

easyCrypto(anystring)

Explanation:

The first line imports the string module into the program

import string

The functipn easyCrypto() starts here

def easyCrypto(inputstring):

This line iterates through each character in the input string

      for i in range(len(inputstring)):

The try except handles the error in the program

             try:

This line gets the index of the current character (lower case)

                    ind = string.ascii_lowercase.index(inputstring[i])

This line adds 1 to the index

                    pos = ind+1

This line checks if the character is at even position

                    if pos%2 == 0:

If yes, it returns the alphabet before it

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

It returns the alphabet after it, if otherwise

                           print(string.ascii_lowercase[ind+1],end="")

The except block does the same thing as the try block, but it handles uppercase letters

<em>              except: </em>

<em>                     ind = string.ascii_uppercase.index(inputstring[i]) </em>

<em>                     pos = ind+1 </em>

<em>                     if pos%2 == 0: </em>

<em>                            print(string.ascii_uppercase[ind-1],end="") </em>

<em>                     else: </em>

<em>                            print(string.ascii_uppercase[ind+1],end="") </em>

<em />

The main starts here

This line prompts user for input

anystring = input("Enter a string: ")

This line calls the easyCrypto() function

easyCrypto(anystring)

4 0
3 years ago
What does l m a o actually mean?
vladimir2022 [97]

Answer:

L-Laughing m-my a-a*s o-off

Explanation:

8 0
3 years ago
Software testing occurs near the end of the programming process. Because of this, if a project falls behind schedule, testing ti
anyanavicka [17]

Answer:

it seems that the company is following the old waterfall model, and in this first, the development work is completed, and finally, the testing process is being executed. And it seems there is no planning done here as well. Software engineering teaches us the Agile method, and in this after every phase, the testing is done, and that too by the testers of the company, sometimes team leader and project managers as well, and also by the client. And by all the bug is being reported immediately, and details are sent to the developer, who fixes it immediately. However, in the waterfall model, the testing is done at the last, after completion of all processes, and if now the bug is found, it needs to be checked thoroughly the whole software. And this is impossible to complete in time on most of the occasions. And in such cases its better to release products late after complete testing. The worse is certainly to release it on time without fully testing it. And suppose you release and the company loses, 1 billion dollars due to a security bug. It can be deadly, and hence no software company can afford it. Complete testing is a must before the launch. And also it's important to not use the waterfall model, and use the Agile approach for software development. The waterfall model threatens company reputation, and also raises issues like company dissatisfaction. And it also puts the question mark on the company's ability to sell the new or updated products etc.

Explanation:

Please check the answer section.

5 0
3 years ago
Other questions:
  • Which of the following is not a basic networking hardware component? Network interface card
    12·1 answer
  • The Beaufort Wind Scale is used to characterize the strength of winds. The scale uses integer values and goes from a force of 0,
    5·1 answer
  • Which type of movement lets the player control an object's movement?
    5·1 answer
  • A bicycle combination lock has four rings with numbers 0 through 9. Given the actual numbers and the combination to unlock, prin
    13·1 answer
  • Suppose that the format for license plates in a certain state is two letters followed by four numbers. (a) How many different pl
    6·1 answer
  • During a night flight, you observe a steady red light and a flashing red light ahead and at the same altitude. What is the gener
    11·1 answer
  • You are the administrator of a Windows network. When creating a new user account, you specify a security clearance level of top
    8·1 answer
  • ¿Por qué es importante que lo países crezcan a nivel tecnológico?
    15·1 answer
  • What does this mean? And how did I get it?
    12·2 answers
  • (in c++):
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!