1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnesinka [82]
4 years ago
8

To lock down security settings on an individual system on a network, what would you use?

Computers and Technology
1 answer:
professor190 [17]4 years ago
8 0

Answer:

The answer is "LSS(Local Security Settings)".

Explanation:

The LSS stands for Local Security Settings, it is a set of information about the security of a local computer. LSS allows a feature, that the information on the protection of a local computer is a local safety policy of a device.

  • This option is available on windows.
  • The local security policy information includes the domains, that trust login attempts to be authenticated.

 

You might be interested in
________ programming is a method of writing software that centers on the actions that take place in a program.
Norma-Jean [14]

Answer: Procedural software

Explanation:

Procedural software programming is the programming mechanism that functions through splitting the data and functions of the program.This programming focuses on subroutines or action for functioning as per call of procedure.

  • It can carry out computation through steps in linear manner or top-to-bottom manner.
  • These steps consist of data ,subroutines, routines and other variable and functions for working.
8 0
3 years ago
What is the top folder of the file tree called
m_a_m_a [10]
The root directory, or root folder, is the top-level directory of a file system.
3 0
3 years ago
Read 2 more answers
A ____ network (or workgroup) consists of multiple windows computers that share information, but no computer on the network serv
ra1l [238]
<span>A peer-to-peer network (or workgroup) consists of multiple windows computers that share information, but no computer on the network serves as an authoritative source of user information. domain-based peer-to-peer server-based centralized</span>
5 0
3 years ago
Write a program that prompts the user to enter a string (may contain spaces) and displays its last character. Enter s string: Pr
STALIN [3.7K]

Answer:

<em>The programming language in Python is as follows:-</em>

#Prompt user for input string

userinput = input("Enter a string: ")

#Print the last character of the input

print("The last character is "+userinput[-1])

#End of Program

Explanation:

This line is a comment

#Prompt user for input string

This line prompts user for input

userinput = input("Enter a string: ")

This line is also a comment

#Print the last character of the input

This next line prints the last character of the input string; the last character is defined by the index -1

print("The last character is "+userinput[-1])

3 0
3 years ago
OSHA standards appear in the ___________ and are then broken down into ____________.
Alisiya [41]
OSHA standards appear in the Code of Federal Regulations (CFR) <span>and was then broken down into two parts. It contains standards to ensure a </span>
4 0
3 years ago
Other questions:
  • Gabe Kelp is a fourteen-year-old goalie for the Soaring Eagles soccer team. He and his teammates are each creating a screen name
    11·1 answer
  • What do you call the spreadsheet cell that is in effect and has a heavier black border around it?
    7·2 answers
  • Project manager George is defining project management to his team. How should he define project management in one sentence?
    7·1 answer
  • Device driver:<br> System software or application software
    11·2 answers
  • Answer the queston...........​
    7·2 answers
  • A good practice when using public domain content is to
    7·1 answer
  • Some applications required advanced storage solutions are available to provide fault tolerance and high performance.
    13·1 answer
  • Which of the following are valid variable names? Select 2 options.
    14·1 answer
  • A homeowner uses a smart assistant to set the house alarm, get packages delivery updates, and set time on the outdoor lights. Wh
    14·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!